EDR Evasion

Detection labs:

Quick wins

  • PPID spoofing -Parent child process relationship - very important

  • Argue - use when running commands to confuse Blue Teams (see https://blog.xpnsec.com/how-to-argue-like-cobalt-strike)

  • blockdlls start - Windows supports blocking 3rd party DLL except those run by Microsoft

Breaking Proces Ancestry:

Comproxies

SysMon:

Use the sysmon-configs that have been used below to try and identify potential injection areas: https://github.com/SwiftOnSecurity/sysmon-config https://github.com/ion-storm/sysmon-config https://github.com/olafhartong/sysmon-modular e.g. Event ID 1 - Process Injection:

Further down in the file we can see that "C:\Windows\system32\svchost.exe -k netsvcs" - this value can be set as our spawnto value

Event ID 2 - File Creation:

Event ID 3 - Network Connection:

Event ID 8: Create Remote Thread:

Event ID 10 - ProcessAccess:

Event ID 17-18 - PipeEvents:

Chrome creates a bunch of \\.\\pip\\mojo\\2212.2272.123123123123123 - maybe use that as default pipe

Event ID 19-21 - WMI Events:

Data sources

Last updated