We read every piece of feedback, and take your input very seriously.
To see all available qualifiers, see our documentation.
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
While not a full-proof detection vector, using common default VM resolutions (I.e. 800x600 or 1024x768), could be a good test for default sandboxes.
https://www.bleepingcomputer.com/news/security/trickbot-malware-now-checks-screen-resolution-to-evade-analysis/
The text was updated successfully, but these errors were encountered:
Appears there are a bunch of potential artifacts we can use here:
SM_CXSCREEN
SM_CYSCREEN
GetSystemMetrics
SM_CXVIRTUALSCREEN
SM_CYVIRTUALSCREEN
SM_REMOTECONTROL
SPI_GETWORKAREA
SystemParametersInfo
DISPLAY_DEVICE.DeviceString
EnumDisplayDevices
SetupDiEnumDeviceInfo
SetupDiOpenDevRegKey
HORZRES
VERTRES
GetDeviceCaps
DESKTOPHORZRES
DESKTOPVERTRES
HORZSIZE
VERTSIZE
LOGCOLORSPACE
GetColorSpace
GetLogColorSpace
Sorry, something went wrong.
gsuberland
No branches or pull requests
While not a full-proof detection vector, using common default VM resolutions (I.e. 800x600 or 1024x768), could be a good test for default sandboxes.
https://www.bleepingcomputer.com/news/security/trickbot-malware-now-checks-screen-resolution-to-evade-analysis/
The text was updated successfully, but these errors were encountered: