Gruber, JanFreiling, Felix C.Christian Wressnegger, Delphine Reinhardt2023-01-242023-01-242022978-3-88579-717-3https://dl.gi.de/handle/20.500.12116/40145Sandboxes are an indispensable tool in dynamic malware analysis today. However, modern malware often employs sandbox-detection methods to exhibit non-malicious behavior within sandboxes and therefore evade automatic analysis. One category of sandbox-detection techniques are reverse Turing tests (RTTs) to determine the presence of a human operator. In order to pass these RTTs, we propose a novel approach which builds upon virtual machine introspection (VMI) to automatically reconstruct the graphical user interface, determine clickable buttons and inject human interface device events via direct control of virtualized human interface devices in a stealthy way. We extend the VMI-based open-source sandbox DRAKVUF with our approach and show that it successfully passes RTTs commonly employed by malware in the wild to detect sandboxesenMalware AnalysisSandboxingVirtual Machine IntrospectionReverse Turing TestFighting Evasive Malware: How to Pass the Reverse Turing Test By Utilizing a VMI-Based Human Interaction Simulator10.18420/sicherheit2022_03How to Pass the Reverse Turing Test By Utilizing a VMI-Based Human Interaction Simulator1617-5468