Raspberry Robin and its new anti-emulation trick
Common Information
Type Value
UUID 46b63aaf-463b-4c3b-904d-0465fb4f11e5
Fingerprint 8260a0af61f8e4f3
Analysis status DONE
Considered CTI value 2
Text language
Published April 3, 2024, 2:34 p.m.
Added to db Aug. 31, 2024, 10:52 a.m.
Last updated Nov. 17, 2024, 5:58 p.m.
Headline Raspberry Robin and its new anti-emulation trick
Title Raspberry Robin and its new anti-emulation trick
Detected Hints/Tags/Attributes 32/1/45
RSS Feed
Details Id Enabled Feed title Url Added to db
Details 422 Inside The Lab - HarfangLab https://harfanglab.io/insidethelab/feed 2024-08-30 22:08
Attributes
Details Type #Events CTI Value
Details Domain 2
keygenguru.com
Details Domain 5
harfanglab.io
Details Domain 67
microsoft.windows
Details File 748
kernel32.dll
Details File 1
c:\myapp.exe
Details File 1
c:\mirc c:\mirc\mirc.ini
Details File 1
c:\mirc\script.ini
Details File 1
hrtbddd69.dll
Details File 10
myapp.exe
Details File 1
c:\\mirc\\mirc.ini
Details File 1
c:\\mirc\\script.ini
Details File 5
mrt.exe
Details File 12
mpengine.dll
Details sha256 1
242851abe09cc5075d2ffdb8e5eba2f7dcf22712625ec02744eecb52acd6b1bf
Details sha256 1
483adf61d7d932003659d5d6242eace29ea8416ec810749333793e0efa91610d
Details sha256 1
50158e22481acabc56d8e3d318d6d709fcb7a9e442e76157b518d19e13f8e520
Details sha256 1
93672d67e8100bb984f866888cb042727567d302b30b91356a2b2bc8cd3f7912
Details sha256 1
b5637231e25aa7da8fe925f5b97a2ccbfd082a5463b2a05d2b3221adb35e43d9
Details sha256 1
b81e857427411577552d1ecdd444efaeab23ec903192812d40ab3dd69df98ec5
Details sha256 1
c8d37df88009122c890cb95dc79d895d39339fe1efdcfa5e033d0aea171ffc3d
Details sha256 1
10b4b7e9469366bfe459c3cd674aeab0692cfd9272fe369ef56d2811623e4866
Details Pdb 1
mpengine.pdb
Details Pdb 1
msmpengcp.pdb
Details Pdb 1
msmpengsvc.pdb
Details Pdb 1
mpgear.pdb
Details Pdb 1
mrtstub.pdb
Details Pdb 1
mrt.pdb
Details Pdb 2
ntoskrnl.pdb
Details Pdb 1
mscorlib.pdb
Details Pdb 1
dbghelp.pdb
Details Pdb 1
msvcrt.pdb
Details Pdb 1
appvisvsubsystems32.pdb
Details Pdb 1
eventing.pdb
Details Pdb 1
appvisvsubsystems64.pdb
Details Pdb 1
appventsubsystems.pdb
Details Pdb 1
shell32.pdb
Details Pdb 1
version.pdb
Details Pdb 1
mscoree.pdb
Details Pdb 1
ws2_32.pdb
Details Pdb 1
advapi32.pdb
Details Pdb 1
appventsubsystems64.pdb
Details Pdb 1
appventsubsystems32.pdb
Details Pdb 1
appvisvsubsystems.pdb
Details Url 1
https://harfanglab.io/en/insidethelab/raspberry-robin-and-its-new-anti-emulation-trick
Details Yara rule 1
rule anti_emulation_defender {
	meta:
		description = "Research Windows Defender Emulator artefacts that can be used as anti-emulator by malware"
		references = "https://harfanglab.io/en/insidethelab/raspberry-robin-and-its-new-anti-emulation-trick/"
		hash = "242851abe09cc5075d2ffdb8e5eba2f7dcf22712625ec02744eecb52acd6b1bf"
		date = "2024-04-03"
		author = "Harfanglab"
		context = "file"
	strings:
		$s_00 = "aaa_TouchMeNot_" ascii wide nocase
		$s_01 = "_TouchMeNot_" ascii wide nocase
		$s_03 = "C:\\myapp.exe" ascii wide nocase
		$s_04 = "C:\\Mirc\\" ascii wide nocase
		$s_05 = "C:\\Mirc\\mirc.ini" ascii wide nocase
		$s_06 = "C:\\Mirc\\script.ini" ascii wide nocase
		$s_07 = "HAL9TH" ascii wide nocase fullword
		$s_09 = "MpSockVendor" ascii wide nocase fullword
		$s_10 = "MPGoodStatus" ascii wide nocase fullword
		$s_11 = "MpDisableSehLimit" ascii wide nocase fullword
		$s_12 = "NtControlChannel" ascii wide nocase fullword
		$s_13 = "ObjMgr_ValidateVFSHandle" ascii wide nocase fullword
		$s_14 = "ThrdMgr_GetCurrentThreadHandle" ascii wide nocase fullword
		$s_15 = "ThrdMgr_SaveTEB" ascii wide nocase fullword
		$s_16 = "ThrdMgr_SwitchThreads" ascii wide nocase fullword
		$s_17 = "VFS_DeleteFileByHandle" ascii wide nocase fullword
		$s_18 = "VFS_DeleteFile" ascii wide nocase fullword
		$s_19 = "VFS_DeleteFileByHandle" ascii wide nocase fullword
		$s_20 = "VFS_FileExists" ascii wide nocase fullword
		$s_21 = "VFS_FindClose" ascii wide nocase fullword
		$s_22 = "VFS_FindFirstFile" ascii wide nocase fullword
		$s_23 = "VFS_FindNextFile" ascii wide nocase fullword
		$s_24 = "VFS_FlushViewOfFile" ascii wide nocase fullword
		$s_25 = "VFS_GetAttrib" ascii wide nocase fullword
		$s_26 = "VFS_GetHandle" ascii wide nocase fullword
		$s_27 = "VFS_GetLength" ascii wide nocase fullword
		$s_28 = "VFS_MapViewOfFile" ascii wide nocase fullword
		$s_29 = "VFS_MoveFile" ascii wide nocase fullword
		$s_30 = "VFS_Open" ascii wide nocase fullword
		$s_31 = "VFS_Read" ascii wide nocase fullword
		$s_32 = "VFS_SetAttrib" ascii wide nocase fullword
		$s_33 = "VFS_SetCurrentDir" ascii wide nocase fullword
		$s_34 = "VFS_SetLength" ascii wide nocase fullword
		$s_35 = "VFS_UnmapViewOfFile" ascii wide nocase fullword
		$s_37 = "MpAddToScanQueue" ascii wide nocase fullword
		$s_38 = "MpCreateMemoryAliasing" ascii wide nocase fullword
		$s_39 = "MpCallPostEntryPointCode" ascii wide nocase fullword
		$s_40 = "MpCallPreEntryPointCode" ascii wide nocase fullword
		$s_41 = "MpDispatchException" ascii wide nocase fullword
		$s_42 = "MpExitThread" ascii wide nocase fullword
		$s_43 = "MpFinalize" ascii wide nocase fullword
		$s_44 = "MpGetCurrentThreadHandle" ascii wide nocase fullword
		$s_45 = "MpGetCurrentThreadId" ascii wide nocase fullword
		$s_46 = "MpGetLastSwitchResult" ascii wide nocase fullword
		$s_47 = "MpGetPseudoThreadHandle" ascii wide nocase fullword
		$s_48 = "MpGetSelectorBase" ascii wide nocase fullword
		$s_49 = "MpGetVStoreFileHandle" ascii wide nocase fullword
		$s_50 = "MpHandlerCodePost" ascii wide nocase fullword
		$s_51 = "MpIntHandler" ascii wide nocase fullword
		$s_52 = "MpIntHandlerParam" ascii wide nocase fullword
		$s_53 = "MpIntHandlerReturnAddress" ascii wide nocase fullword
		$s_54 = "MpNtdllDatatSection" ascii wide nocase fullword
		$s_55 = "MpReportEvent" ascii wide nocase fullword
		$s_56 = "MpReportEventEx" ascii wide nocase fullword
		$s_57 = "MpReportEventW" ascii wide nocase fullword
		$s_58 = "MpSehHandler" ascii wide nocase fullword
		$s_59 = "MpSetSelectorBase" ascii wide nocase fullword
		$s_60 = "MpStartProcess" ascii wide nocase fullword
		$s_61 = "MpSwitchToNextThread" ascii wide nocase fullword
		$s_62 = "MpSwitchToNextThread_WithCheck" ascii wide nocase fullword
		$s_63 = "MpSwitchToNextThread_NewObjManager" ascii wide nocase fullword
		$s_64 = "MpTimerEvent" ascii wide nocase fullword
		$s_65 = "MpTimerEventData" ascii wide nocase fullword
		$s_66 = "MpUfsMetadataOp" ascii wide nocase fullword
		$s_67 = "MpValidateVFSHandle" ascii wide nocase fullword
		$s_68 = "MpVmp32Entry" ascii wide nocase fullword
		$s_69 = "MpVmp32FastEnter" ascii wide nocase fullword
		$filter_00 = "mpengine.pdb" ascii nocase
		$filter_01 = "MsMpEngCP.pdb" ascii nocase
		$filter_02 = "MsMpEngSvc.pdb" ascii nocase
		$filter_03 = "MpGear.pdb" ascii nocase
		$filter_04 = "mrtstub.pdb" ascii nocase
		$filter_05 = "mrt.pdb" ascii nocase
		$filter_06 = "ntoskrnl.pdb" ascii nocase
		$filter_07 = "mscorlib.pdb" ascii nocase
		$filter_08 = "dbghelp.pdb" ascii nocase
		$filter_09 = "msvcrt.pdb" ascii nocase
		$filter_10 = "mrt.exe" ascii wide nocase
		$filter_11 = "PEBMPAT:Obfuscator_EW2" ascii wide
		$filter_12 = "Unimplemented type change to VT_" ascii wide
		$filter_13 = "Initialize engine first!" ascii wide
		$filter_14 = "VirTool:Win32/Obfuscator" ascii wide
		$filter_15 = "VDMConsoleOperation" ascii wide
		$filter_16 = "VDMOperationStarted" ascii wide
		$filter_17 = "sigutils\\vdlls\\"
		$filter_18 = "Microsoft.Windows.MalwareRemovalTool" ascii wide
		$filter_19 = "AppVISVSubsystems32.pdb" ascii nocase
		$filter_20 = "Microsoft.AppV.ClientProgrammability.Eventing.pdb" ascii nocase
		$filter_21 = "AppVISVSubsystems64.pdb" ascii nocase
		$filter_22 = "AppVEntSubsystems.pdb" ascii nocase
		$filter_24 = "shell32.pdb" ascii nocase
		$filter_25 = "version.pdb" ascii nocase
		$filter_26 = "mscoree.pdb" ascii nocase
		$filter_27 = "ws2_32.pdb" ascii nocase
		$filter_28 = "advapi32.pdb" ascii nocase
		$filter_29 = "AppVEntSubsystems64.pdb" ascii nocase
		$filter_30 = "AppVEntSubsystems32.pdb" ascii nocase
		$filter_31 = "AppVISVSubsystems.pdb" ascii nocase
		$filter_32 = "mpengine.dll" ascii wide nocase
		$filter_33 = "VFSAPI_VFS_" ascii wide
	condition:
		uint16(0) == 0x5A4D and uint32(uint32(0x3C)) == 0x00004550 and filesize < 5MB and 1 of ($s_*) and not 1 of ($filter*)
}