Tuesday, April 29, 2025
HomeMalwareProcess Doppelgänging Attack Works on all version of Windows Evade AV products...

Process Doppelgänging Attack Works on all version of Windows Evade AV products and Forensics tools

Published on

SIEM as a Service

Follow Us on Google News

Security researchers from Endpoint Security firm Ensilo discovered a new Evasion technique dubbed Process Doppelgänging which works with all the versions of windows and can Evade well-known security products forensics tools.

Doppelgänging introduced in BLACKHAT EUROPE 2017, with Doppelgänging they load and execute an arbitrary as, like a legitimate process, it is similar to Process Hollowing, but it uses NTFS Transactions.

Evasion techniques depend upon the memory manipulation, but researchers here uses windows loader and abuses it to load their code and to evade security scanners.

- Advertisement - Google News

Researchers said that code would not be saved on the disk resembles like fileless attacks, and it hides from the security scanners and advanced forensic tools.

Also Read DOWNAD Malware using Dictionary Attack to Control the Servers & Remotely Execute Code

Doppelgänging works by utilizing two key distinct features together to mask the loading of a modified executable. By using NTFS transactions, we make changes to an executable file that will never actually be committed to disk. We will then use undocumented implementation details of the process loading mechanism to load our modified executable, but not before rolling back the changes we made to the executable. The result of this procedure is creating a process from the modified executable, while deployed security mechanisms in the dark.

Transact – Researchers created a transaction with the legitimate file and then injects the malicious code. Here is the twist we are inside of the transaction, so the changes are invisible.

Load – Session created from the infected file and pointed to malicious executable.

Rollback – Here they rollbacked the changes to the file, but still the section have the malicious code.

Animate – Here they bring Doppelgänger back to life, by creating a process from session object using NtreateProcessEx, so the process looks legitimate, but it runs the malicious code.

Process Doppelgänging
Researchers said it would evade following Antiviruses.
Process Doppelgänging

They demonstrated with Windows 10 running Mimikatz favorite post-exploitation tool when executed it usually blocked by Windows Defender. So they created a Doppelgänging and mimicat hosted an encryption file with it to evade windows defender.

Preventive measures – Process Doppelgänging

It is hard to patch as Doppelgänging exploiting fundamental and core process of the windows loading mechanism, also it hard for attackers to implement Doppelgänging as it requires a keen understanding of Binaries and process creations.

Researchers suggested some real-time preventive measures

1.Scan using file object available in create process notification routine.
2.Scan all sections, even data sections – performance issue to consider.

Gurubaran
Gurubaran
Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Latest articles

Blinded from Above: How Relentless Cyber-Attacks Are Knocking Satellites Out of Sight

According to the Center for Strategic & International Studies' (CSIS) 2025 Space Threat Assessment,...

Google Chrome Vulnerability Allows Attackers to Bypass Sandbox Restrictions – Technical Details Revealed

A severe vulnerability, identified as CVE-2025-2783, has been discovered in Google Chrome, specifically targeting...

Threat Actors Accelerate Transition from Reconnaissance to Compromise – New Report Finds

Cybercriminals are leveraging automation across the entire attack chain, drastically reducing the time from...

ResolverRAT Targets Healthcare and Pharmaceutical Sectors Through Sophisticated Phishing Attacks

A previously undocumented remote access trojan (RAT) named ResolverRAT has surfaced, specifically targeting healthcare...

Resilience at Scale

Why Application Security is Non-Negotiable

The resilience of your digital infrastructure directly impacts your ability to scale. And yet, application security remains a critical weak link for most organizations.

Application Security is no longer just a defensive play—it’s the cornerstone of cyber resilience and sustainable growth. In this webinar, Karthik Krishnamoorthy (CTO of Indusface) and Phani Deepak Akella (VP of Marketing – Indusface), will share how AI-powered application security can help organizations build resilience by

Discussion points


Protecting at internet scale using AI and behavioral-based DDoS & bot mitigation.
Autonomously discovering external assets and remediating vulnerabilities within 72 hours, enabling secure, confident scaling.
Ensuring 100% application availability through platforms architected for failure resilience.
Eliminating silos with real-time correlation between attack surface and active threats for rapid, accurate mitigation

More like this

RansomHub Ransomware Deploys Malware to Breach Corporate Networks

The eSentire’s Threat Response Unit (TRU) in early March 2025, a sophisticated cyberattack leveraging...

Advanced Multi-Stage Carding Attack Hits Magento Site Using Fake GIFs and Reverse Proxy Malware

A multi-stage carding attack has been uncovered targeting a Magento eCommerce website running an...

Hannibal Stealer: Cracked Variant of Sharp and TX Malware Targets Browsers, Wallets, and FTP Clients

A new cyber threat, dubbed Hannibal Stealer, has surfaced as a rebranded and cracked...