143. Hunting for Qemu Emulator Abuse

Hello everyone!

One more interesting technique covered in Sophos report - abusing Qemu emulator to run a Windows 7 virtual machine with a QDoor trojan pre-installed.

The adversary executed the following command:

“C:\ProgramData\UpdatePackage_excic\wexe” -m 4096 – hda Update_excic.acow2 – netdev user,id=myneto -device e1000,netdev=mynetO – cpu max – display none

As you can see, the virtual machine is connected to the targeted system’s network interface. Of course, we can use it for hunting:

event_type: "processcreatewin"

AND

proc_file_productname: "qemu"

AND

cmdline: "netdev"

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge