Skip to content

Latest commit

 

History

History
30 lines (23 loc) · 1.39 KB

exe-code-virtualize.md

File metadata and controls

30 lines (23 loc) · 1.39 KB
ID B0008
Objective(s) Anti-Behavioral Analysis, Anti-Static Analysis
Related ATT&CK Technique None

Executable Code Virtualization

Original executable code is virtualized by translating the code into a special format that only a special virtual machine (VM) can run; the VM uses a customized virtual instruction set. A "stub" function calls the VM when the code is run. Virtualized code makes static analysis and reverse engineering more difficult; dumped code won’t run without the VM.

Virtualized code is a software protection technique. Themida is a commercial tool; WPProtect is an open source tool. [1]

Methods

Name ID Description
Multiple VMs B0008.001 Multiple virtual machines with different architectures (CISC, RISC, etc.) can be used inside of a single executable in order to make reverse engineering even more difficult.

Malware Examples

Name Date Description
Locky Bart January 2017 Code virtualization is added to the Locky Bart binary using WPProtect. [2]

References

[1] https://github.com/xiaoweime/WProtect

[2] https://blog.malwarebytes.com/threat-analysis/2017/01/locky-bart-ransomware-and-backend-server-analysis/