Powershell Detect Virtualization Environment
Adversaries may employ various system checks to detect and avoid virtualization and analysis environments. This may include changing behaviors based on the results of checks for the presence of artifacts indicative of a virtual machine environment (VME) or sandbox
Sigma rule (View on GitHub)
 1title: Powershell Detect Virtualization Environment
 2id: d93129cd-1ee0-479f-bc03-ca6f129882e3
 3status: test
 4description: |
 5    Adversaries may employ various system checks to detect and avoid virtualization and analysis environments.
 6    This may include changing behaviors based on the results of checks for the presence of artifacts indicative of a virtual machine environment (VME) or sandbox    
 7references:
 8    - https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1497.001/T1497.001.md
 9    - https://techgenix.com/malicious-powershell-scripts-evade-detection/
10author: frack113, Duc.Le-GTSC
11date: 2021-08-03
12modified: 2022-03-03
13tags:
14    - attack.discovery
15    - attack.defense-evasion
16    - attack.t1497.001
17logsource:
18    product: windows
19    category: ps_script
20    definition: 'Requirements: Script Block Logging must be enabled'
21detection:
22    selection_action:
23        ScriptBlockText|contains:
24            - Get-WmiObject
25            - gwmi
26    selection_module:
27        ScriptBlockText|contains:
28            - MSAcpi_ThermalZoneTemperature
29            - Win32_ComputerSystem
30    condition: all of selection*
31falsepositives:
32    - Unknown
33level: medium
References
Related rules
- System Information Discovery Via Sysctl - MacOS
- System Information Discovery Using System_Profiler
- HackTool - SharpUp PrivEsc Tool Execution
- Hacktool Ruler
- Operation Wocao Activity