Sunday, December 3, 2023

Process Doppelgänging Attack Works on all version of Windows Evade AV products and Forensics tools

Security researchers from Endpoint Security firm Ensilo discovered a new Evasion technique dubbed Process Doppelgänging which works with all the versions of windows and can Evade well-known security products forensics tools.

Doppelgänging introduced in BLACKHAT EUROPE 2017, with Doppelgänging they load and execute an arbitrary as, like a legitimate process, it is similar to Process Hollowing, but it uses NTFS Transactions.

Evasion techniques depend upon the memory manipulation, but researchers here uses windows loader and abuses it to load their code and to evade security scanners.

Researchers said that code would not be saved on the disk resembles like fileless attacks, and it hides from the security scanners and advanced forensic tools.

Also Read DOWNAD Malware using Dictionary Attack to Control the Servers & Remotely Execute Code

Doppelgänging works by utilizing two key distinct features together to mask the loading of a modified executable. By using NTFS transactions, we make changes to an executable file that will never actually be committed to disk. We will then use undocumented implementation details of the process loading mechanism to load our modified executable, but not before rolling back the changes we made to the executable. The result of this procedure is creating a process from the modified executable, while deployed security mechanisms in the dark.

Transact – Researchers created a transaction with the legitimate file and then injects the malicious code. Here is the twist we are inside of the transaction, so the changes are invisible.

Load – Session created from the infected file and pointed to malicious executable.

Rollback – Here they rollbacked the changes to the file, but still the section have the malicious code.

Animate – Here they bring Doppelgänger back to life, by creating a process from session object using NtreateProcessEx, so the process looks legitimate, but it runs the malicious code.

Process Doppelgänging
Researchers said it would evade following Antiviruses.
Process Doppelgänging

They demonstrated with Windows 10 running Mimikatz favorite post-exploitation tool when executed it usually blocked by Windows Defender. So they created a Doppelgänging and mimicat hosted an encryption file with it to evade windows defender.

Preventive measures – Process Doppelgänging

It is hard to patch as Doppelgänging exploiting fundamental and core process of the windows loading mechanism, also it hard for attackers to implement Doppelgänging as it requires a keen understanding of Binaries and process creations.

Researchers suggested some real-time preventive measures

1.Scan using file object available in create process notification routine.
2.Scan all sections, even data sections – performance issue to consider.

Website

Latest articles

Active Attacks Targeting Google Chrome & ownCloud Flaws: CISA Warns

The CISA announced two known exploited vulnerabilities active attacks targeting Google Chrome & own...

Cactus Ransomware Exploiting Qlik Sense code execution Vulnerability

A new Cactus Ransomware was exploited in the code execution vulnerability to Qlik Sense...

Hackers Bypass Antivirus with ScrubCrypt Tool to Install RedLine Malware

The ScrubCrypt obfuscation tool has been discovered to be utilized in attacks to disseminate the RedLine Stealer...

Hotel’s Booking.com Hacked Logins Let Attacker Steal Guest Credit Cards

According to a recent report by Secureworks, a well-planned and advanced phishing attack was...

Critical Zoom Vulnerability Let Attackers Take Over Meetings

Zoom, the most widely used video conferencing platform has been discovered with a critical...

Hackers Using Weaponized Invoice to Deliver LUMMA Malware

Hackers use weaponized invoices to exploit trust in financial transactions, embedding malware or malicious...

US-Seized Crypto Currency Mixer Used by North Korean Lazarus Hackers

The U.S. Treasury Department sanctioned the famous cryptocurrency mixer Sinbad after it was claimed...

API Attack Simulation Webinar

Live API Attack Simulation

In the upcoming webinar, Karthik Krishnamoorthy, CTO and Vivek Gopalan, VP of Products at Indusface demonstrate how APIs could be hacked.The session will cover:an exploit of OWASP API Top 10 vulnerability, a brute force account take-over (ATO) attack on API, a DDoS attack on an API, how a WAAP could bolster security over an API gateway

Related Articles