143. Hunting for Qemu Emulator Abuse
Hello everyone!
One more interesting technique covered in Sophos report - abusing Qemu emulator to run a Windows 7 virtual machine with a QDoor trojan pre-installed.
The adversary executed the following command:
“C:\ProgramData\UpdatePackage_excic\wexe” -m 4096 – hda Update_excic.acow2 – netdev user,id=myneto -device e1000,netdev=mynetO – cpu max – display none
As you can see, the virtual machine is connected to the targeted system’s network interface. Of course, we can use it for hunting:
event_type: "processcreatewin"
AND
proc_file_productname: "qemu"
AND
cmdline: "netdev"
See you tomorrow!
Comments
Post a Comment