Home >
Enterprise >
Participants >
SentinelOne >
Virtualization/Sandbox Evasion (T1497)
|
|
Carbanak+FIN7 |
||||||
Step | ATT&CK Pattern |
|
||||
13.A.4
|
Tactic Defense Evasion (TA0005) Subtechnique Virtualization/Sandbox Evasion: System Checks (T1497.001) |
|
APT29 |
||||||||
Step | ATT&CK Pattern |
|
||||||
11.A.3
|
Tactic Defense Evasion (TA0005) Subtechnique Virtualization/Sandbox Evasion: System Checks (T1497.001) |
|
Procedure
Checked that the BIOS version and serial number are not associated with VirtualBox or VMware using PowerShell
Criteria
powershell.exe executing a Get-WmiObject query for Win32_BIOS
Footnotes
- Though no image was captured, MITRE confirmed that the vendor has the capability to show available telemetry in a separate view.
APT3 |
||
The technique was not in scope. |