SlideShare a Scribd company logo
Paula Januszkiewicz
CQURE: CEO, Penetration Tester / Security Expert
CQURE Academy: Trainer
MVP: Enterprise Security, MCT
Contact: paula@cqure.us | http://cqure.us
@paulacqure
@CQUREAcademy
Microsoft Ignite session: Look under the hood: bypassing antimalware tactics and infrastructure response method”
Microsoft Ignite session: Look under the hood: bypassing antimalware tactics and infrastructure response method”
Microsoft Ignite session: Look under the hood: bypassing antimalware tactics and infrastructure response method”
Microsoft Ignite session: Look under the hood: bypassing antimalware tactics and infrastructure response method”
Microsoft Ignite session: Look under the hood: bypassing antimalware tactics and infrastructure response method”
Microsoft Ignite session: Look under the hood: bypassing antimalware tactics and infrastructure response method”
Signature-based
Behavior-based
Attempts to open, view, delete, and/or modify files
Attempts to format disk drives and other unrecoverable disk
operations
Modifications to the logic of executable files, scripts of macros
Modification of critical system settings, such as start-up settings
Scripting of e-mail and instant messaging clients to send
executable content
Initiation of network communications
Wrapping
ttaches the malicious payload (the installer or the
malware itself) to a legitimate file.
Microsoft Ignite session: Look under the hood: bypassing antimalware tactics and infrastructure response method”
Microsoft Ignite session: Look under the hood: bypassing antimalware tactics and infrastructure response method”
Custom code
User Mode Loaders
Executable is extracted and decrypted in memory
Code is loaded and executed dynamically
In Powershell.exe – not every module is embedded – they
can be created and loaded during the execution
In Win32API: Custom code mimics LoadLibrary()
Interesting: During the compilation, that’s what helps us:
CompilerParameters.CompilerOptions =
"/platform:x64";
Microsoft Ignite session: Look under the hood: bypassing antimalware tactics and infrastructure response method”
Microsoft Ignite session: Look under the hood: bypassing antimalware tactics and infrastructure response method”
Microsoft Ignite session: Look under the hood: bypassing antimalware tactics and infrastructure response method”
Microsoft Ignite session: Look under the hood: bypassing antimalware tactics and infrastructure response method”
Attacker Victim
Firefox RCE+payload
Firefox GET
Connect 888
Remote session 888: download files
Remote session 888: SCHTASKS: elevate, 777
Connect 777
Remote session 777: Infect WMI
Connect 666
Microsoft Ignite session: Look under the hood: bypassing antimalware tactics and infrastructure response method”
Microsoft Ignite session: Look under the hood: bypassing antimalware tactics and infrastructure response method”
Microsoft Ignite session: Look under the hood: bypassing antimalware tactics and infrastructure response method”
Antimalware Scan Interface (AMSI)
It is a generic interface standard that allows applications and
services to integrate with any antimalware product
Techniques used
It supports a calling structure allowing for file and memory or
stream scanning, content source URL/IP reputation checks, and
other techniques
Allows correlation of events
The different fragments of a malicious payload can be associated to
reach a more informed decision, which would be much harder to
reach just by looking at those fragments in isolation.
Microsoft Ignite session: Look under the hood: bypassing antimalware tactics and infrastructure response method”
Microsoft Ignite session: Look under the hood: bypassing antimalware tactics and infrastructure response method”
Microsoft Ignite session: Look under the hood: bypassing antimalware tactics and infrastructure response method”
1. The only cure is a _complete_
code execution prevention
2. Anti-Exploit solutions make a lot
of sense
3. Sysmon (absolutely!)
4. At the end it is a matter of
budged and price
5. Code execution prevention
solutions are often misconfigured
Microsoft Ignite session: Look under the hood: bypassing antimalware tactics and infrastructure response method”
Microsoft Ignite session: Look under the hood: bypassing antimalware tactics and infrastructure response method”
Microsoft Ignite session: Look under the hood: bypassing antimalware tactics and infrastructure response method”
http://myignite.microsoft.com
https://aka.ms/ignite.mobileapp

More Related Content

PPTX
Microsoft Ignite session: Explore adventures in the underland: forensic techn...
PPTX
12 Crucial Windows Security Skills for 2018
PPTX
Top 10 ways to make hackers excited: All about the shortcuts not worth taking
PPTX
RSA Conference 2017 session: Hacker’s Perspective on Your Windows Infrastruct...
PDF
The hacker playbook: How to think and act like a cybercriminal to reduce risk...
PPTX
RSA 2018: Adventures in the Underland: Techniques against Hackers Evading the...
PDF
rsa-usa-2019-keynote-paula-januszkiewicz
PPTX
12 Crucial Windows Security Skills for 2017
Microsoft Ignite session: Explore adventures in the underland: forensic techn...
12 Crucial Windows Security Skills for 2018
Top 10 ways to make hackers excited: All about the shortcuts not worth taking
RSA Conference 2017 session: Hacker’s Perspective on Your Windows Infrastruct...
The hacker playbook: How to think and act like a cybercriminal to reduce risk...
RSA 2018: Adventures in the Underland: Techniques against Hackers Evading the...
rsa-usa-2019-keynote-paula-januszkiewicz
12 Crucial Windows Security Skills for 2017

What's hot (20)

PDF
Top 10 Ways To Make Hackers Excited: All About The Shortcuts Not Worth Taking
PPTX
RSA Conference 2017 session: What System Stores on the Disk Without Telling You
PDF
30 Cybersecurity Skills You Need To Become a Windows Security Pro
PPTX
Adventures in Underland: Is encryption solid as a rock or a handful of dust?
PDF
Dear Hacker: Infrastructure Security Reality Check
PDF
Gartner Security & Risk Management Summit 2018
PDF
Hacker techniques for bypassing existing antivirus solutions & how to build a...
PPTX
Fatal signs: 10 symptoms when you think you’ve been hacked
PDF
Avoiding the 10 Deadliest and Most Common Sins for Securing Windows
PPTX
OWASP Serverless Top 10
PDF
Virtual Networking Security - Network Security
PDF
Shields up - improving web application security
PDF
CMS Website Security Threat Protection Oriented Analyzer System
PDF
Virtual Networking Security - Perimeter Security
PPT
Design for security in operating system
PPTX
SqlSa94
PPTX
AlienVault Brute Force Attacks- Keeping the Bots at Bay with AlienVault USM +...
PPTX
Pentesting with linux
PDF
BlueHat v18 || Malicious user profiling using a deep neural net
PDF
Immutable Infrastructure Security
Top 10 Ways To Make Hackers Excited: All About The Shortcuts Not Worth Taking
RSA Conference 2017 session: What System Stores on the Disk Without Telling You
30 Cybersecurity Skills You Need To Become a Windows Security Pro
Adventures in Underland: Is encryption solid as a rock or a handful of dust?
Dear Hacker: Infrastructure Security Reality Check
Gartner Security & Risk Management Summit 2018
Hacker techniques for bypassing existing antivirus solutions & how to build a...
Fatal signs: 10 symptoms when you think you’ve been hacked
Avoiding the 10 Deadliest and Most Common Sins for Securing Windows
OWASP Serverless Top 10
Virtual Networking Security - Network Security
Shields up - improving web application security
CMS Website Security Threat Protection Oriented Analyzer System
Virtual Networking Security - Perimeter Security
Design for security in operating system
SqlSa94
AlienVault Brute Force Attacks- Keeping the Bots at Bay with AlienVault USM +...
Pentesting with linux
BlueHat v18 || Malicious user profiling using a deep neural net
Immutable Infrastructure Security
Ad

Similar to Microsoft Ignite session: Look under the hood: bypassing antimalware tactics and infrastructure response method” (19)

PPTX
Let's Talk Technical: Malware Evasion and Detection
PPTX
Developing High-Impact Malware with Minimal Effort.pptx
PDF
Bypassing anti virus scanners
PDF
DEF CON 27 - workshop ANTHONY ROSE - introduction to amsi bypasses and sandbo...
PDF
DEF CON 27 - workshop ANTHONY ROSE - introduction to amsi bypasses and sandbo...
PDF
DEF CON 27 - AMIT WAISEL and HILA COHEN - malproxy
PDF
DEF CON 27 - workshop - MAURICIO VELAZCO - writing custom paylods
PDF
Defcon 27 - Writing custom backdoor payloads with C#
PDF
CheckPlease: Payload-Agnostic Targeted Malware
PDF
Bypassing anti virus scanners
PPTX
Anti-virus Mechanisms and Various Ways to Bypass Antivirus detection
PPTX
Antivirus Evasion Techniques and Countermeasures
PPTX
Anti-Virus Evasion Techniques and Countermeasures
PDF
[若渴計畫] Challenges and Solutions of Window Remote Shellcode
PPTX
Antimalware
PDF
The Art of AV Evasion - Or Lack Thereof
PDF
A Battle Against the Industry - Beating Antivirus for Meterpreter and More
PPTX
Introduction to Malware Analysis
PPTX
Windows custom shellcoding
Let's Talk Technical: Malware Evasion and Detection
Developing High-Impact Malware with Minimal Effort.pptx
Bypassing anti virus scanners
DEF CON 27 - workshop ANTHONY ROSE - introduction to amsi bypasses and sandbo...
DEF CON 27 - workshop ANTHONY ROSE - introduction to amsi bypasses and sandbo...
DEF CON 27 - AMIT WAISEL and HILA COHEN - malproxy
DEF CON 27 - workshop - MAURICIO VELAZCO - writing custom paylods
Defcon 27 - Writing custom backdoor payloads with C#
CheckPlease: Payload-Agnostic Targeted Malware
Bypassing anti virus scanners
Anti-virus Mechanisms and Various Ways to Bypass Antivirus detection
Antivirus Evasion Techniques and Countermeasures
Anti-Virus Evasion Techniques and Countermeasures
[若渴計畫] Challenges and Solutions of Window Remote Shellcode
Antimalware
The Art of AV Evasion - Or Lack Thereof
A Battle Against the Industry - Beating Antivirus for Meterpreter and More
Introduction to Malware Analysis
Windows custom shellcoding
Ad

Recently uploaded (20)

PPTX
Week 4 Term 3 Study Techniques revisited.pptx
PPTX
master seminar digital applications in india
PPTX
PPH.pptx obstetrics and gynecology in nursing
PDF
O7-L3 Supply Chain Operations - ICLT Program
PDF
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
Insiders guide to clinical Medicine.pdf
PDF
FourierSeries-QuestionsWithAnswers(Part-A).pdf
PPTX
Microbial diseases, their pathogenesis and prophylaxis
PDF
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
PDF
The Final Stretch: How to Release a Game and Not Die in the Process.
PPTX
GDM (1) (1).pptx small presentation for students
PDF
Business Ethics Teaching Materials for college
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PPTX
Open Quiz Monsoon Mind Game Prelims.pptx
PDF
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
PDF
Introduction-to-Social-Work-by-Leonora-Serafeca-De-Guzman-Group-2.pdf
PPTX
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
PDF
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
PPTX
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...
Week 4 Term 3 Study Techniques revisited.pptx
master seminar digital applications in india
PPH.pptx obstetrics and gynecology in nursing
O7-L3 Supply Chain Operations - ICLT Program
Saundersa Comprehensive Review for the NCLEX-RN Examination.pdf
Abdominal Access Techniques with Prof. Dr. R K Mishra
Insiders guide to clinical Medicine.pdf
FourierSeries-QuestionsWithAnswers(Part-A).pdf
Microbial diseases, their pathogenesis and prophylaxis
grade 11-chemistry_fetena_net_5883.pdf teacher guide for all student
The Final Stretch: How to Release a Game and Not Die in the Process.
GDM (1) (1).pptx small presentation for students
Business Ethics Teaching Materials for college
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
Open Quiz Monsoon Mind Game Prelims.pptx
Mark Klimek Lecture Notes_240423 revision books _173037.pdf
Introduction-to-Social-Work-by-Leonora-Serafeca-De-Guzman-Group-2.pdf
Introduction_to_Human_Anatomy_and_Physiology_for_B.Pharm.pptx
Physiotherapy_for_Respiratory_and_Cardiac_Problems WEBBER.pdf
Introduction to Child Health Nursing – Unit I | Child Health Nursing I | B.Sc...

Microsoft Ignite session: Look under the hood: bypassing antimalware tactics and infrastructure response method”

  • 1. Paula Januszkiewicz CQURE: CEO, Penetration Tester / Security Expert CQURE Academy: Trainer MVP: Enterprise Security, MCT Contact: paula@cqure.us | http://cqure.us @paulacqure @CQUREAcademy
  • 8. Signature-based Behavior-based Attempts to open, view, delete, and/or modify files Attempts to format disk drives and other unrecoverable disk operations Modifications to the logic of executable files, scripts of macros Modification of critical system settings, such as start-up settings Scripting of e-mail and instant messaging clients to send executable content Initiation of network communications
  • 9. Wrapping ttaches the malicious payload (the installer or the malware itself) to a legitimate file.
  • 12. Custom code User Mode Loaders Executable is extracted and decrypted in memory Code is loaded and executed dynamically In Powershell.exe – not every module is embedded – they can be created and loaded during the execution In Win32API: Custom code mimics LoadLibrary() Interesting: During the compilation, that’s what helps us: CompilerParameters.CompilerOptions = "/platform:x64";
  • 17. Attacker Victim Firefox RCE+payload Firefox GET Connect 888 Remote session 888: download files Remote session 888: SCHTASKS: elevate, 777 Connect 777 Remote session 777: Infect WMI Connect 666
  • 21. Antimalware Scan Interface (AMSI) It is a generic interface standard that allows applications and services to integrate with any antimalware product Techniques used It supports a calling structure allowing for file and memory or stream scanning, content source URL/IP reputation checks, and other techniques Allows correlation of events The different fragments of a malicious payload can be associated to reach a more informed decision, which would be much harder to reach just by looking at those fragments in isolation.
  • 25. 1. The only cure is a _complete_ code execution prevention 2. Anti-Exploit solutions make a lot of sense 3. Sysmon (absolutely!) 4. At the end it is a matter of budged and price 5. Code execution prevention solutions are often misconfigured

Editor's Notes

  • #8: W10 -> McAffion – remember to preset it! StopmeIfyoucan
  • #9: IMPHash -> Lista importow, powiedziec, ze mozna skorzystac ze standardowego ladowania Load Library Nastolatek, google, stackoverflow -> 5 NY Minutes.
  • #10: Wrappery – from 90s old school but not so old! Skrypty powershellowe pod skrypty powershellowe. Wrapping: Using static signatures to detect wrapper files is largely ineffective since new ones are easily and regularly created and often generates false positives. This technique is commonly used by Windows and OS X malware distributed via pirated software and P2P networks. . IceFog is a well-known malware commonly wrapped with a legitimate-looking CleanMyMac application and used to target OS X users. On the Windows platform, OnionDuke has been used with legitimate Adobe installers shared over Tor networks to infect machines. Obfuscation Using XOR encoding is one way to do this. Hiding process and file names, registry entries, URLs and other useful information can significantly slow down the investigation/reverse engineering of new malware samples.
  • #11: Hyperion – wykrywalne – Mimikatza Helloword
  • #12: Obfuscation – zmianie kodu, po kompilacji wyglada inaczej, zmiana nazw fukcji, inny zapis stale, inne zmienne, a lot of spaghetti code. Wrapping: Using static signatures to detect wrapper files is largely ineffective since new ones are easily and regularly created and often generates false positives. This technique is commonly used by Windows and OS X malware distributed via pirated software and P2P networks. . IceFog is a well-known malware commonly wrapped with a legitimate-looking CleanMyMac application and used to target OS X users. On the Windows platform, OnionDuke has been used with legitimate Adobe installers shared over Tor networks to infect machines. Obfuscation Using XOR encoding is one way to do this. Hiding process and file names, registry entries, URLs and other useful information can significantly slow down the investigation/reverse engineering of new malware samples. Anti debugging: . For example, the ZeroAccess malware implemented a self-debugging technique in order to block external debugging attempts. Another example is malware attempting to delay its execution (or sleep) for an extended period of time. This is useful for bypassing sandboxing solutions since these only keep binaries in an emulated environment for a specific period of time before classifying them as benign and releasing them to the network. Targeting. This technique is implemented when malware is designed to attack a specific type of system (e.g. Windows XP SP 3), application (e.g. Internet Explorer 10) and/or configuration (e.g. detecting a machine not running VMWare tools, which is often a telltale sign for usage of virtualization). Targeting ensures that the malware is only triggered and installed when specific conditions are met, which enables it to evade detection in sandboxes because they do not resemble the host being attacked.
  • #13: Kompilator nie ma pojecia o tym co bedzie ladowane. Z metadanych 9.2 z Rootkit Arsenal 417
  • #19: Mypaypalservices.com musi byc rozpoznawany na Victimie. Polaczenie na porcie 666.
  • #20: cmd.Exe - przekierowane wejscie I wyjscie na socket
  • #21: cdb.exe -cf x64_calc.wds -o notepad.exe
  • #26: Licence: Common Nie ochroni przed WinDBG Nie udostepniamy miejsc, ktore sa wykonywane