Native VHD Booting Malware Analysis

Discussion in 'sandboxing & virtualization' started by Tertan, Aug 3, 2015.

  1. Tertan

    Tertan Registered Member

    Joined:
    Aug 3, 2015
    Posts:
    1
    There are VM-Aware malware that doesn't run on virtualization and so the analysis has to be done to bare metal. I am thinking of using the native VHD boot for malware analysis. I managed to setup the VHD boot with snapshot capability (via differencing VHDs). The idea is to analyse the malware on that VHD machine, and after that I can revert to the previous state easily.
    However I realize that malware could actually be able to detect if the C drive is running on a VHD via the registry (\SYSTEM\CurrentControlSet\services\Disk\Enum) and disk management also shows that the drive is a VHD. I am wondering if there are any malware nowadays that does check if it is running on a VHD, and are there any methods to prevent that from happening? (e.g. modifying the registry keys)
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.