Bypassing VirtualBox Process Hardening on Windows
Common Information
Type Value
UUID fa278b66-8966-434d-873e-3bbe0be9010d
Fingerprint 6f38c8151da56084
Analysis status DONE
Considered CTI value 2
Text language
Published Aug. 23, 2017, 9:10 a.m.
Added to db Jan. 18, 2023, 9:44 p.m.
Last updated Nov. 14, 2024, 2:04 p.m.
Headline Project Zero
Title Bypassing VirtualBox Process Hardening on Windows
Detected Hints/Tags/Attributes 79/2/16
Attributes
Details Type #Events CTI Value
Details CVE 1
cve-2017-3563
Details CVE 1
cve-2017-10204
Details CVE 1
cve-2017-10129
Details Domain 372
wscript.shell
Details File 1
supdrv-win.cpp
Details File 4
virtualbox.exe
Details File 2
vboxc.dll
Details File 1
vboxhardening.log
Details File 1
c:\dummy\testdll.dll
Details File 62
scrobj.dll
Details File 27
jscript.dll
Details File 1
c:\test\abc.dll
Details File 1
c:\test\abc    c:\test\abc.dll
Details File 1
%systemroot%\system32\tasks\dummy\abc.dll
Details File 2
abc.dll
Details File 9
file.dll