Contents

Contents

Sherlock - Phantom Check

Contents
Question

Which WMI class did the attacker use to retrieve model and manufacturer information for virtualization detection?

First, let’s check at the Get-WMI cmdlet:

We find the query pretty fast.

Answer

Win32_ComputerSystem

Question

Which WMI query did the attacker execute to retrieve the current temperature value of the machine?

Let’s search for further Get-WMIObject commands:

Answer

SELECT * FROM MSAcpi_ThermalZoneTemperature

Question

The attacker loaded a PowerShell script to detect virtualization. What is the function name of the script?

We can leverage the event ID 4104 in order to see the PowerShell scripts that have been executed. Inside one of the events, we can see the whole script that checks if the system is virtualized.

Answer

Check-VM

Question

Which registry key did the above script query to retrieve service details for virtualization detection?

Inside the same event, we can scroll down and see that it checks the HKLM:\SYSTEM\ControlSet001\Services registry key to check if the system is virtualized:

Answer

HKLM:\SYSTEM\ControlSet001\Services

Question

The VM detection script can also identify VirtualBox. Which processes is it comparing to determine if the system is running VirtualBox?

Inside the same script, we can see it checks if the vboxservice.exe and vboxtray.exe processes are up and running with the Get-Process cmdlet:

Answer

vboxservice.exe, vboxtray.exe

Question

The VM detection script prints any detection with the prefix ‘This is a’. Which two virtualization platforms did the script detect?

Let’s do a basic ctrl+f and search for This is a that have been printed:

Answer

Hyper-V, VMWare