← Back to Explore
sigmamediumHunting
Suspicious VBoxDrvInst.exe Parameters
Detect VBoxDrvInst.exe run with parameters allowing processing INF file. This allows to create values in the registry and install drivers. For example one could use this technique to obtain persistence via modifying one of Run or RunOnce registry keys
Detection Query
selection:
Image|endswith: \VBoxDrvInst.exe
CommandLine|contains|all:
- driver
- executeinf
condition: selection
Author
Konstantin Grishchenko, oscd.community
Created
2020-10-06
Data Sources
windowsProcess Creation Events
Platforms
windows
References
Tags
attack.persistenceattack.defense-evasionattack.t1112
Raw Content
title: Suspicious VBoxDrvInst.exe Parameters
id: b7b19cb6-9b32-4fc4-a108-73f19acfe262
status: test
description: |
Detect VBoxDrvInst.exe run with parameters allowing processing INF file.
This allows to create values in the registry and install drivers.
For example one could use this technique to obtain persistence via modifying one of Run or RunOnce registry keys
references:
- https://github.com/LOLBAS-Project/LOLBAS/blob/4db780e0f0b2e2bb8cb1fa13e09196da9b9f1834/yml/LOLUtilz/OtherBinaries/VBoxDrvInst.yml
- https://twitter.com/pabraeken/status/993497996179492864
author: Konstantin Grishchenko, oscd.community
date: 2020-10-06
modified: 2021-11-27
tags:
- attack.persistence
- attack.defense-evasion
- attack.t1112
logsource:
category: process_creation
product: windows
detection:
selection:
Image|endswith: '\VBoxDrvInst.exe'
CommandLine|contains|all:
- 'driver'
- 'executeinf'
condition: selection
falsepositives:
- Legitimate use of VBoxDrvInst.exe utility by VirtualBox Guest Additions installation process
level: medium