{"id":96648,"date":"2019-09-09T12:05:58","date_gmt":"2019-09-09T19:05:58","guid":{"rendered":"https:\/\/securingtomorrow.mcafee.com\/?p=96648"},"modified":"2025-06-01T20:18:15","modified_gmt":"2025-06-02T03:18:15","slug":"evolution-of-malware-sandbox-evasion-tactics-a-retrospective-study","status":"publish","type":"post","link":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/evolution-of-malware-sandbox-evasion-tactics-a-retrospective-study\/","title":{"rendered":"Evolution of Malware Sandbox Evasion Tactics \u2013 A Retrospective Study"},"content":{"rendered":"<h2>Executive Summary<\/h2>\n<p>Malware evasion techniques are widely used to circumvent detection as well as analysis and understanding. One of the dominant categories of evasion is anti-sandbox detection, simply because today\u2019s sandboxes are becoming the fastest and easiest way to have an overview of the threat. Many companies use these kinds of systems to detonate malicious files and URLs found, to obtain more indicators of compromise to extend their defenses and block other related malicious activity. Nowadays we understand security as a global process, and sandbox systems are part of this ecosystem, and that is why we must take care with the methods used by malware and how we can defeat it.<\/p>\n<p>Historically, sandboxes had allowed researchers to visualize the behavior of malware accurately within a short period of time. As the technology evolved over the past few years, malware authors started producing malicious code that delves much deeper into the system to detect the sandboxing environment.<\/p>\n<p>As sandboxes became more sophisticated and evolved to defeat the evasion techniques, we observed multiple strains of malware that dramatically changed their tactics to remain a step ahead. In the following sections, we look back on some of the most prevalent sandbox evasion techniques used by malware authors over the past few years and validate the fact that malware families extended their code in parallel to introducing more stealthier techniques.<\/p>\n<p>The following diagram shows one of the most prevalent sandbox evasion tricks we will discuss in this blog, although many others exist.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-96649\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/09\/Sandbox-evasion-techniques.png\" alt=\"\" width=\"745\" height=\"600\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/Sandbox-evasion-techniques.png 745w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/Sandbox-evasion-techniques-300x242.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/Sandbox-evasion-techniques-621x500.png 621w\" sizes=\"auto, (max-width: 745px) 100vw, 745px\" \/><\/p>\n<h2>Delaying Execution<\/h2>\n<p>Initially, several strains of malware were observed using timing-based evasion techniques [latent execution], which primarily boiled down to delaying the execution of the malicious code for a period using known Windows APIs like NtDelayExecution, CreateWaitTableTImer, SetTimer and others. These techniques remained popular until sandboxes started identifying and mitigating them.<\/p>\n<h2>GetTickCount<\/h2>\n<p>As sandboxes identified malware and attempted to defeat it by accelerating code execution, it resorted to using acceleration checks using multiple methods. One of those methods, used by multiple malware families including <strong>Win32\/Kovter<\/strong>, was using Windows API GetTickCount followed by a code to check if the expected time had elapsed. However, we observed several variations of this method across malware families.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-96650\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/09\/gettickcount.png\" alt=\"\" width=\"525\" height=\"170\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/gettickcount.png 525w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/gettickcount-300x97.png 300w\" sizes=\"auto, (max-width: 525px) 100vw, 525px\" \/><\/p>\n<p>This anti-evasion technique could be easily bypassed by the sandbox vendors simply creating a snapshot with more than 20 minutes to have the machine running for more time.<\/p>\n<h2>API Flooding<\/h2>\n<p>Another approach that subsequently became more prevalent, observed with Win32\/Cutwail malware, is calling the garbage API in the loop to introduce the delay, dubbed API flooding. Below is the code from the malware that shows this method.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-96653\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/09\/API-flooding.png\" alt=\"\" width=\"800\" height=\"264\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/API-flooding.png 800w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/API-flooding-300x99.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/API-flooding-768x253.png 768w\" sizes=\"auto, (max-width: 800px) 100vw, 800px\" \/><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<h2>Inline Code<\/h2>\n<p>We observed how this code resulted in a DOS condition since sandboxes could not handle it well enough. On the other hand, this sort of behavior is not too difficult to detect by more involved sandboxes. As they became more capable of handling the API based stalling code, yet another strategy to achieve a similar objective was to introduce inline assembly code that waited for more than 5 minutes before executing the hostile code. We found this technique in use as well.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-96652\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/09\/inline-code.png\" alt=\"\" width=\"374\" height=\"396\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/inline-code.png 374w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/inline-code-283x300.png 283w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/inline-code-24x24.png 24w\" sizes=\"auto, (max-width: 374px) 100vw, 374px\" \/><\/p>\n<p>Sandboxes are now much more capable and armed with code instrumentation and full system emulation capabilities to identify and report the stalling code. This turned out to be a simplistic approach which could sidestep most of the advanced sandboxes. In our observation, the following depicts the growth of the popular timing-based evasion techniques used by malware over the past few years.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-96654\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/09\/evolution.png\" alt=\"\" width=\"878\" height=\"119\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/evolution.png 878w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/evolution-300x41.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/evolution-768x104.png 768w\" sizes=\"auto, (max-width: 878px) 100vw, 878px\" \/><\/p>\n<h2>Hardware Detection<\/h2>\n<p>Another category of evasion tactic widely adopted by malware was fingerprinting the hardware, specifically a check on the total physical memory size, available HD size \/ type and available CPU cores.<\/p>\n<p>These methods became prominent in malware families like Win32\/Phorpiex, Win32\/Comrerop, Win32\/Simda and multiple other prevalent ones. Based on our tracking of their variants, we noticed Windows API DeviceIoControl() was primarily used with specific Control Codes to retrieve the information on Storage type and Storage Size.<\/p>\n<p>Ransomware and cryptocurrency mining malware were found to be checking for total available physical memory using a known GlobalMemoryStatusEx () trick. A similar check is shown below.<\/p>\n<p><strong><u>Storage Size check:<\/u><\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-96655\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/09\/storage-size-check.png\" alt=\"\" width=\"688\" height=\"232\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/storage-size-check.png 688w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/storage-size-check-300x101.png 300w\" sizes=\"auto, (max-width: 688px) 100vw, 688px\" \/><\/p>\n<p>Illustrated below is an example API interception code implemented in the sandbox that can manipulate the returned storage size.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-96656\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/09\/API-interception-code.png\" alt=\"\" width=\"1254\" height=\"490\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/API-interception-code.png 1254w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/API-interception-code-300x117.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/API-interception-code-768x300.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/API-interception-code-1024x400.png 1024w\" sizes=\"auto, (max-width: 1254px) 100vw, 1254px\" \/><\/p>\n<p>Subsequently, a Windows Management Instrumentation (WMI) based approach became more favored since these calls could not be easily intercepted by the existing sandboxes.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-96657 aligncenter\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/09\/1.png\" alt=\"\" width=\"638\" height=\"484\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/1.png 638w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/1-300x228.png 300w\" sizes=\"auto, (max-width: 638px) 100vw, 638px\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-96658 aligncenter\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/09\/2.png\" alt=\"\" width=\"440\" height=\"297\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/2.png 440w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/2-300x203.png 300w\" sizes=\"auto, (max-width: 440px) 100vw, 440px\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-96659 aligncenter\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/09\/3.png\" alt=\"\" width=\"1132\" height=\"775\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/3.png 1132w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/3-300x205.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/3-768x526.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/3-1024x701.png 1024w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/3-730x500.png 730w\" sizes=\"auto, (max-width: 1132px) 100vw, 1132px\" \/><\/p>\n<p>Here is our observed growth path in the tracked malware families with respect to the Storage type and size checks.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-96660 aligncenter\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/09\/growth-path.png\" alt=\"\" width=\"803\" height=\"100\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/growth-path.png 803w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/growth-path-300x37.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/growth-path-768x96.png 768w\" sizes=\"auto, (max-width: 803px) 100vw, 803px\" \/><\/p>\n<h2>CPU Temperature Check<\/h2>\n<p>Malware authors are always adding new and interesting methods to bypass sandbox systems. Another check that is quite interesting involves checking the temperature of the processor in execution.<\/p>\n<p>A code sample where we saw this in the wild is:<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-96661 aligncenter\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/09\/code-sample.jpg\" alt=\"\" width=\"793\" height=\"452\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/code-sample.jpg 793w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/code-sample-300x171.jpg 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/code-sample-768x438.jpg 768w\" sizes=\"auto, (max-width: 793px) 100vw, 793px\" \/><\/p>\n<p>The check is executed through a WMI call in the system. This is interesting as the VM systems will never return a result after this call.<\/p>\n<h2>CPU Count<\/h2>\n<p>Popular malware families like Win32\/Dyreza were seen using the CPU core count as an evasion strategy. Several malware families were initially found using a trivial API based route, as outlined earlier. However, most malware families later resorted to WMI and stealthier PEB access-based methods.<\/p>\n<p>Any evasion code in the malware that does not rely on APIs is challenging to identify in the sandboxing environment and malware authors look to use it more often. Below is a similar check introduced in the earlier strains of malware.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-96662\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/09\/4.png\" alt=\"\" width=\"457\" height=\"209\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/4.png 457w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/4-300x137.png 300w\" sizes=\"auto, (max-width: 457px) 100vw, 457px\" \/><\/p>\n<p>There are number of ways to get the CPU core count, though the stealthier way was to access the PEB, which can be achieved by introducing inline assembly code or by using the intrinsic functions.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-96663\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/09\/5.png\" alt=\"\" width=\"416\" height=\"373\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/5.png 416w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/5-300x269.png 300w\" sizes=\"auto, (max-width: 416px) 100vw, 416px\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-96664\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/09\/6.png\" alt=\"\" width=\"520\" height=\"393\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/6.png 520w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/6-300x227.png 300w\" sizes=\"auto, (max-width: 520px) 100vw, 520px\" \/><\/p>\n<p>One of the relatively newer techniques to get the CPU core count has been outlined in a blog, <u><a href=\"https:\/\/www.lastline.com\/labsblog\/malware-evasion-techniques\/\">here<\/a><\/u>. However, in our observations of the malware using CPU core count to evade automated analysis systems, the following became adopted in the outlined sequence.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-96665\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/09\/adopted-sequence.png\" alt=\"\" width=\"917\" height=\"138\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/adopted-sequence.png 917w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/adopted-sequence-300x45.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/adopted-sequence-768x116.png 768w\" sizes=\"auto, (max-width: 917px) 100vw, 917px\" \/><\/p>\n<h2>User Interaction<\/h2>\n<p>Another class of infamous techniques malware authors used extensively to circumvent the sandboxing environment was to exploit the fact that automated analysis systems are never manually interacted with by humans. Conventional sandboxes were never designed to emulate user behavior and malware was coded with the ability to determine the discrepancy between the automated and the real systems. Initially, multiple malware families were found to be monitoring for Windows events and halting the execution until they were generated.<\/p>\n<p>Below is a snapshot from a Win32\/Gataka variant using GetForeGroundWindow and checking if another call to the same API changes the Windows handle. The same technique was found in Locky ransomware variants.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-96666\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/09\/7.png\" alt=\"\" width=\"595\" height=\"242\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/7.png 595w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/7-300x122.png 300w\" sizes=\"auto, (max-width: 595px) 100vw, 595px\" \/><\/p>\n<p>Below is another snapshot from the Win32\/Sazoora malware, checking for mouse movements, which became a technique widely used by several other families.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-96667\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/09\/8.png\" alt=\"\" width=\"602\" height=\"449\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/8.png 602w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/8-300x224.png 300w\" sizes=\"auto, (max-width: 602px) 100vw, 602px\" \/><\/p>\n<p>Malware campaigns were also found deploying a range of techniques to check historical interactions with the infected system. One such campaign, delivering the Dridex malware, extensively used the Auto Execution macro that triggered only when the document was closed. Below is a snapshot of the VB code from one such campaign.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-96668\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/09\/9.png\" alt=\"\" width=\"1033\" height=\"492\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/9.png 1033w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/9-300x143.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/9-768x366.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/9-1024x488.png 1024w\" sizes=\"auto, (max-width: 1033px) 100vw, 1033px\" \/><\/p>\n<p>The same malware campaign was also found introducing Registry key checks in the code for MRU (Most Recently Used) files to validate historical interactions with the infected machine. Variations in this approach were found doing the same check programmatically as well.<\/p>\n<p><strong>MRU check using Registry key: <\/strong>\\HKEY_CURRENT_USER\\Software\\Microsoft\\Office\\16.0\\Word\\User MRU<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-96669\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/09\/MRU-check.png\" alt=\"\" width=\"1511\" height=\"219\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/MRU-check.png 1511w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/MRU-check-300x43.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/MRU-check-768x111.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/MRU-check-1024x148.png 1024w\" sizes=\"auto, (max-width: 1511px) 100vw, 1511px\" \/><\/p>\n<p><strong>Programmatic version of the above check:<\/strong><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-96670\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/09\/Programatic-check.png\" alt=\"\" width=\"1243\" height=\"410\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/Programatic-check.png 1243w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/Programatic-check-300x99.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/Programatic-check-768x253.png 768w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/Programatic-check-1024x338.png 1024w\" sizes=\"auto, (max-width: 1243px) 100vw, 1243px\" \/><\/p>\n<p>Here is our depiction of how these approaches gained adoption among evasive malware.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-96671\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/09\/evasive-malware.png\" alt=\"\" width=\"808\" height=\"110\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/evasive-malware.png 808w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/evasive-malware-300x41.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/evasive-malware-768x105.png 768w\" sizes=\"auto, (max-width: 808px) 100vw, 808px\" \/><\/p>\n<h2>Environment Detection<\/h2>\n<p>Another technique used by malware is to fingerprint the target environment, thus exploiting the misconfiguration of the sandbox. At the beginning, tricks such as Red Pill techniques were enough to detect the virtual environment, until sandboxes started to harden their architecture. Malware authors then used new techniques, such as checking the hostname against common sandbox names or the registry to verify the programs installed; a very small number of programs might indicate a fake machine. Other techniques, such as checking the filename to detect if a hash or a keyword (such as malware) is used, have also been implemented as has detecting running processes to spot potential monitoring tools and checking the network address to detect blacklisted ones, such as AV vendors.<\/p>\n<p>Locky and Dridex were using tricks such as detecting the network.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-96672\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/09\/10.png\" alt=\"\" width=\"735\" height=\"159\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/10.png 735w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/10-300x65.png 300w\" sizes=\"auto, (max-width: 735px) 100vw, 735px\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-96673\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/09\/11.png\" alt=\"\" width=\"568\" height=\"62\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/11.png 568w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/11-300x33.png 300w\" sizes=\"auto, (max-width: 568px) 100vw, 568px\" \/><\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter size-full wp-image-96674\" src=\"https:\/\/securingtomorrow.mcafee.com\/wp-content\/uploads\/2019\/09\/12.png\" alt=\"\" width=\"807\" height=\"109\" srcset=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/12.png 807w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/12-300x41.png 300w, https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/09\/12-768x104.png 768w\" sizes=\"auto, (max-width: 807px) 100vw, 807px\" \/><\/p>\n<h2>Using Evasion Techniques in the Delivery Process<\/h2>\n<p>In the past few years we have observed how the use of sandbox detection and evasion techniques have been increasingly implemented in the delivery mechanism to make detection and analysis harder. Attackers are increasingly likely to add a layer of protection in their infection vectors to avoid burning their payloads. Thus, it is common to find evasion techniques in malicious Word and other weaponized documents.<\/p>\n<h2>McAfee Advanced Threat Defense<\/h2>\n<p><strong>McAfee Advanced Threat Defense<\/strong>\u00a0(ATD) is a sandboxing solution which replicates the sample under analysis in a controlled environment, performing malware detection through advanced Static and Dynamic behavioral analysis. As a sandboxing solution it defeats evasion techniques seen in many of the adversaries. McAfee\u2019s sandboxing technology is armed with multiple advanced capabilities that complement each other to bypass the evasion techniques attempted to the check the presence of virtualized infrastructure, and mimics sandbox environments to behave as real physical machines. The evasion techniques described in this paper, where adversaries widely employ the code or behavior to evade from detection, are bypassed by\u00a0<strong>McAfee Advanced Threat Defense<\/strong>\u00a0sandbox which includes:<\/p>\n<ul>\n<li>Usage of windows API&#8217;s to delay the execution of sample, hard disk size, CPU core numbers and other environment information .<\/li>\n<li>Methods to identify the human interaction through mouse clicks , keyboard strokes , Interactive Message boxes.<\/li>\n<li>Retrieval of hardware information like hard disk size , CPU numbers, hardware vendor check through registry artifacts.<\/li>\n<li>System up time to identify the duration of system alive state.<\/li>\n<li>Check for color bit and resolution of Windows .<\/li>\n<li>Recent documents and files used.<\/li>\n<\/ul>\n<p>In addition to this,\u00a0<strong>McAfee Advanced Threat Defense<\/strong>\u00a0is equipped with smart static analysis engines as well as machine-learning based algorithms that play a significant detection role when samples detect the virtualized environment and exit without exhibiting malware behavior. One of McAfee\u2019s flagship capability, the Family Classification Engine, works on assembly level and provides significant traces once a sample is loaded in memory, even though the sandbox detonation is not completed, resulting in enhanced detection for our customers.<\/p>\n<h2>Conclusion<\/h2>\n<p>Traditional sandboxing environments were built by running virtual machines over one of the available virtualization solutions (VMware, VirtualBox, KVM, Xen) which leaves huge gaps for evasive malware to exploit.<\/p>\n<p>Malware authors continue to improve their creations by adding new techniques to bypass security solutions and evasion techniques remain a powerful means of detecting a sandbox. As technologies improve, so also do malware techniques.<\/p>\n<p>Sandboxing systems are now equipped with advanced instrumentation and emulation capabilities which can detect most of these techniques. However, we believe the next step in sandboxing technology is going to be the bare metal analysis environment which can certainly defeat any form of evasive behavior, although common weaknesses will still be easy to detect.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Executive Summary Malware evasion techniques are widely used to circumvent detection as well as analysis and understanding. One of the&#8230;<\/p>\n","protected":false},"author":839,"featured_media":96272,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"footnotes":""},"categories":[442],"tags":[],"coauthors":[4688,786],"class_list":["post-96648","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-mcafee-labs"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v25.4 - https:\/\/yoast.com\/wordpress\/plugins\/seo\/ -->\n<title>Evolution of Malware Sandbox Evasion Tactics \u2013 A Retrospective Study | McAfee Blog<\/title>\n<meta name=\"description\" content=\"Executive Summary Malware evasion techniques are widely used to circumvent detection as well as analysis and understanding. One of the dominant categories\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Evolution of Malware Sandbox Evasion Tactics \u2013 A Retrospective Study | McAfee Blog\" \/>\n<meta property=\"og:description\" content=\"Executive Summary Malware evasion techniques are widely used to circumvent detection as well as analysis and understanding. One of the dominant categories\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/evolution-of-malware-sandbox-evasion-tactics-a-retrospective-study\/\" \/>\n<meta property=\"og:site_name\" content=\"McAfee Blog\" \/>\n<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/McAfee\/\" \/>\n<meta property=\"article:published_time\" content=\"2019-09-09T19:05:58+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2025-06-02T03:18:15+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/thumbnail-2.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"2048\" \/>\n\t<meta property=\"og:image:height\" content=\"1350\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Thomas Roccia, Chintan Shah\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@fr0gger_\" \/>\n<meta name=\"twitter:site\" content=\"@McAfee\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Thomas Roccia, Chintan Shah\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"9 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\/\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/evolution-of-malware-sandbox-evasion-tactics-a-retrospective-study\/#article\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/evolution-of-malware-sandbox-evasion-tactics-a-retrospective-study\/\"},\"author\":{\"name\":\"Thomas Roccia\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/84a85fe82c49f836915869700f5168e7\"},\"headline\":\"Evolution of Malware Sandbox Evasion Tactics \u2013 A Retrospective Study\",\"datePublished\":\"2019-09-09T19:05:58+00:00\",\"dateModified\":\"2025-06-02T03:18:15+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/evolution-of-malware-sandbox-evasion-tactics-a-retrospective-study\/\"},\"wordCount\":1843,\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/evolution-of-malware-sandbox-evasion-tactics-a-retrospective-study\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/thumbnail-2.jpeg\",\"articleSection\":[\"McAfee Labs\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/evolution-of-malware-sandbox-evasion-tactics-a-retrospective-study\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/evolution-of-malware-sandbox-evasion-tactics-a-retrospective-study\/\",\"name\":\"Evolution of Malware Sandbox Evasion Tactics \u2013 A Retrospective Study | McAfee Blog\",\"isPartOf\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/evolution-of-malware-sandbox-evasion-tactics-a-retrospective-study\/#primaryimage\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/evolution-of-malware-sandbox-evasion-tactics-a-retrospective-study\/#primaryimage\"},\"thumbnailUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/thumbnail-2.jpeg\",\"datePublished\":\"2019-09-09T19:05:58+00:00\",\"dateModified\":\"2025-06-02T03:18:15+00:00\",\"description\":\"Executive Summary Malware evasion techniques are widely used to circumvent detection as well as analysis and understanding. One of the dominant categories\",\"breadcrumb\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/evolution-of-malware-sandbox-evasion-tactics-a-retrospective-study\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/evolution-of-malware-sandbox-evasion-tactics-a-retrospective-study\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/evolution-of-malware-sandbox-evasion-tactics-a-retrospective-study\/#primaryimage\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/thumbnail-2.jpeg\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/thumbnail-2.jpeg\",\"width\":2048,\"height\":1350},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/evolution-of-malware-sandbox-evasion-tactics-a-retrospective-study\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Blog\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Other Blogs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"McAfee Labs\",\"item\":\"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/\"},{\"@type\":\"ListItem\",\"position\":4,\"name\":\"Evolution of Malware Sandbox Evasion Tactics \u2013 A Retrospective Study\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#website\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"name\":\"McAfee Blog\",\"description\":\"Internet Security News\",\"publisher\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#organization\",\"name\":\"McAfee\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png\",\"width\":1286,\"height\":336,\"caption\":\"McAfee\"},\"image\":{\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/\"},\"sameAs\":[\"https:\/\/www.facebook.com\/McAfee\/\",\"https:\/\/x.com\/McAfee\",\"https:\/\/www.linkedin.com\/company\/mcafee\/\",\"https:\/\/www.youtube.com\/McAfee\"]},{\"@type\":\"Person\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/84a85fe82c49f836915869700f5168e7\",\"name\":\"Thomas Roccia\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/219099eb1ee40018f72bf1e381c6bd75\",\"url\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/08\/2-1-96x96.png\",\"contentUrl\":\"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/08\/2-1-96x96.png\",\"caption\":\"Thomas Roccia\"},\"description\":\"Thomas Roccia is senior security researcher on the Advanced Threat Research team. He works on threat intelligence, tracking cybercrime campaigns and collaborating with law enforcement agencies. In a previous role, Thomas worked on the McAfee Foundstone team, performing worldwide incident response, malware hunting, and penetration testing. He has helped customers during major outbreaks and managed highly critical situations. Thomas has developed workshops, training courses, presentations, he leads the Unprotect Project, an open-source database dedicated to malware evasion techniques. His work in security research includes threat intelligence, malware, reverse engineering, vulnerabilities as well as innovation and patenting. He speaks regularly at security conferences.\",\"sameAs\":[\"http:\/\/troccia.tdgt.org\",\"https:\/\/www.linkedin.com\/in\/thomas-roccia\/\",\"https:\/\/x.com\/fr0gger_\"],\"url\":\"https:\/\/www.mcafee.com\/blogs\/author\/thomas-roccia\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Evolution of Malware Sandbox Evasion Tactics \u2013 A Retrospective Study | McAfee Blog","description":"Executive Summary Malware evasion techniques are widely used to circumvent detection as well as analysis and understanding. One of the dominant categories","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"og_locale":"en_US","og_type":"article","og_title":"Evolution of Malware Sandbox Evasion Tactics \u2013 A Retrospective Study | McAfee Blog","og_description":"Executive Summary Malware evasion techniques are widely used to circumvent detection as well as analysis and understanding. One of the dominant categories","og_url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/evolution-of-malware-sandbox-evasion-tactics-a-retrospective-study\/","og_site_name":"McAfee Blog","article_publisher":"https:\/\/www.facebook.com\/McAfee\/","article_published_time":"2019-09-09T19:05:58+00:00","article_modified_time":"2025-06-02T03:18:15+00:00","og_image":[{"width":2048,"height":1350,"url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/thumbnail-2.jpeg","type":"image\/jpeg"}],"author":"Thomas Roccia, Chintan Shah","twitter_card":"summary_large_image","twitter_creator":"@fr0gger_","twitter_site":"@McAfee","twitter_misc":{"Written by":"Thomas Roccia, Chintan Shah","Est. reading time":"9 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/evolution-of-malware-sandbox-evasion-tactics-a-retrospective-study\/#article","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/evolution-of-malware-sandbox-evasion-tactics-a-retrospective-study\/"},"author":{"name":"Thomas Roccia","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/84a85fe82c49f836915869700f5168e7"},"headline":"Evolution of Malware Sandbox Evasion Tactics \u2013 A Retrospective Study","datePublished":"2019-09-09T19:05:58+00:00","dateModified":"2025-06-02T03:18:15+00:00","mainEntityOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/evolution-of-malware-sandbox-evasion-tactics-a-retrospective-study\/"},"wordCount":1843,"publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/evolution-of-malware-sandbox-evasion-tactics-a-retrospective-study\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/thumbnail-2.jpeg","articleSection":["McAfee Labs"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/evolution-of-malware-sandbox-evasion-tactics-a-retrospective-study\/","url":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/evolution-of-malware-sandbox-evasion-tactics-a-retrospective-study\/","name":"Evolution of Malware Sandbox Evasion Tactics \u2013 A Retrospective Study | McAfee Blog","isPartOf":{"@id":"https:\/\/www.mcafee.com\/blogs\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/evolution-of-malware-sandbox-evasion-tactics-a-retrospective-study\/#primaryimage"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/evolution-of-malware-sandbox-evasion-tactics-a-retrospective-study\/#primaryimage"},"thumbnailUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/thumbnail-2.jpeg","datePublished":"2019-09-09T19:05:58+00:00","dateModified":"2025-06-02T03:18:15+00:00","description":"Executive Summary Malware evasion techniques are widely used to circumvent detection as well as analysis and understanding. One of the dominant categories","breadcrumb":{"@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/evolution-of-malware-sandbox-evasion-tactics-a-retrospective-study\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/evolution-of-malware-sandbox-evasion-tactics-a-retrospective-study\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/evolution-of-malware-sandbox-evasion-tactics-a-retrospective-study\/#primaryimage","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/thumbnail-2.jpeg","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2019\/08\/thumbnail-2.jpeg","width":2048,"height":1350},{"@type":"BreadcrumbList","@id":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/evolution-of-malware-sandbox-evasion-tactics-a-retrospective-study\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Blog","item":"https:\/\/www.mcafee.com\/blogs\/"},{"@type":"ListItem","position":2,"name":"Other Blogs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/"},{"@type":"ListItem","position":3,"name":"McAfee Labs","item":"https:\/\/www.mcafee.com\/blogs\/other-blogs\/mcafee-labs\/"},{"@type":"ListItem","position":4,"name":"Evolution of Malware Sandbox Evasion Tactics \u2013 A Retrospective Study"}]},{"@type":"WebSite","@id":"https:\/\/www.mcafee.com\/blogs\/#website","url":"https:\/\/www.mcafee.com\/blogs\/","name":"McAfee Blog","description":"Internet Security News","publisher":{"@id":"https:\/\/www.mcafee.com\/blogs\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.mcafee.com\/blogs\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.mcafee.com\/blogs\/#organization","name":"McAfee","url":"https:\/\/www.mcafee.com\/blogs\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2023\/02\/mcafee-logo.png","width":1286,"height":336,"caption":"McAfee"},"image":{"@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/www.facebook.com\/McAfee\/","https:\/\/x.com\/McAfee","https:\/\/www.linkedin.com\/company\/mcafee\/","https:\/\/www.youtube.com\/McAfee"]},{"@type":"Person","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/84a85fe82c49f836915869700f5168e7","name":"Thomas Roccia","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.mcafee.com\/blogs\/#\/schema\/person\/image\/219099eb1ee40018f72bf1e381c6bd75","url":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/08\/2-1-96x96.png","contentUrl":"https:\/\/www.mcafee.com\/blogs\/wp-content\/uploads\/2021\/08\/2-1-96x96.png","caption":"Thomas Roccia"},"description":"Thomas Roccia is senior security researcher on the Advanced Threat Research team. He works on threat intelligence, tracking cybercrime campaigns and collaborating with law enforcement agencies. In a previous role, Thomas worked on the McAfee Foundstone team, performing worldwide incident response, malware hunting, and penetration testing. He has helped customers during major outbreaks and managed highly critical situations. Thomas has developed workshops, training courses, presentations, he leads the Unprotect Project, an open-source database dedicated to malware evasion techniques. His work in security research includes threat intelligence, malware, reverse engineering, vulnerabilities as well as innovation and patenting. He speaks regularly at security conferences.","sameAs":["http:\/\/troccia.tdgt.org","https:\/\/www.linkedin.com\/in\/thomas-roccia\/","https:\/\/x.com\/fr0gger_"],"url":"https:\/\/www.mcafee.com\/blogs\/author\/thomas-roccia\/"}]}},"_links":{"self":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/96648","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/users\/839"}],"replies":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/comments?post=96648"}],"version-history":[{"count":5,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/96648\/revisions"}],"predecessor-version":[{"id":214758,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/posts\/96648\/revisions\/214758"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media\/96272"}],"wp:attachment":[{"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/media?parent=96648"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/categories?post=96648"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/tags?post=96648"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www.mcafee.com\/blogs\/wp-json\/wp\/v2\/coauthors?post=96648"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}