Categories: Malware

Process Doppelgänging Attack Works on all version of Windows Evade AV products and Forensics tools

Security researchers from Endpoint Security firm Ensilo discovered a new Evasion technique dubbed Process Doppelgänging which works with all the versions of windows and can Evade well-known security products forensics tools.

Doppelgänging introduced in BLACKHAT EUROPE 2017, with Doppelgänging they load and execute an arbitrary as, like a legitimate process, it is similar to Process Hollowing, but it uses NTFS Transactions.

Evasion techniques depend upon the memory manipulation, but researchers here uses windows loader and abuses it to load their code and to evade security scanners.

Researchers said that code would not be saved on the disk resembles like fileless attacks, and it hides from the security scanners and advanced forensic tools.

Also Read DOWNAD Malware using Dictionary Attack to Control the Servers & Remotely Execute Code

Doppelgänging works by utilizing two key distinct features together to mask the loading of a modified executable. By using NTFS transactions, we make changes to an executable file that will never actually be committed to disk. We will then use undocumented implementation details of the process loading mechanism to load our modified executable, but not before rolling back the changes we made to the executable. The result of this procedure is creating a process from the modified executable, while deployed security mechanisms in the dark.

Transact – Researchers created a transaction with the legitimate file and then injects the malicious code. Here is the twist we are inside of the transaction, so the changes are invisible.

Load – Session created from the infected file and pointed to malicious executable.

Rollback – Here they rollbacked the changes to the file, but still the section have the malicious code.

Animate – Here they bring Doppelgänger back to life, by creating a process from session object using NtreateProcessEx, so the process looks legitimate, but it runs the malicious code.

Researchers said it would evade following Antiviruses.

They demonstrated with Windows 10 running Mimikatz favorite post-exploitation tool when executed it usually blocked by Windows Defender. So they created a Doppelgänging and mimicat hosted an encryption file with it to evade windows defender.

Preventive measures – Process Doppelgänging

It is hard to patch as Doppelgänging exploiting fundamental and core process of the windows loading mechanism, also it hard for attackers to implement Doppelgänging as it requires a keen understanding of Binaries and process creations.

Researchers suggested some real-time preventive measures

1.Scan using file object available in create process notification routine.
2.Scan all sections, even data sections – performance issue to consider.

Gurubaran

Gurubaran is a co-founder of Cyber Security News and GBHackers On Security. He has 10+ years of experience as a Security Consultant, Editor, and Analyst in cybersecurity, technology, and communications.

Recent Posts

Zyxel RCE Flaw Lets Attackers Run Commands Without Authentication

Security researcher Alessandro Sgreccia (aka "rainpwn") has revealed a set of critical vulnerabilities in Zyxel’s…

13 minutes ago

Redis DoS Flaw Allows Attackers to Crash Servers or Drain Memory

A high-severity denial-of-service (DoS) vulnerability in Redis, tracked as CVE-2025-21605, allows unauthenticated attackers to crash servers…

3 hours ago

Google Warns: Threat Actors Growing More Sophisticated, Exploiting Zero-Day Vulnerabilities

Google’s Mandiant team has released its M-Trends 2025 report, highlighting the increasing sophistication of threat…

3 hours ago

Critical Langflow Flaw Enables Malicious Code Injection – Technical Breakdown Released

A critical remote code execution (RCE) vulnerability, identified as CVE-2025-3248 with a CVSS score of…

3 hours ago

GitLab Releases Critical Patch for XSS, DoS, and Account Takeover Bugs

GitLab, a leading DevOps platform, has released a critical security patch impacting both its Community…

4 hours ago

SonicWall SSLVPN Flaw Allows Hackers to Crash Firewalls Remotely

SonicWall has issued an urgent advisory (SNWLID-2025-0009) warning of a high-severity vulnerability in its SSLVPN…

5 hours ago