SlideShare ist ein Scribd-Unternehmen logo
1 von 58
Downloaden Sie, um offline zu lesen
Return of the kernel rootkit
malware
(on Windows 10)
Matt Oh (jeongoh@Microsoft.com)
Microsoft
‹#›
Whoami?
• Microsoft WDATP research team
• EDR, Blueteam
• Special interests in new exploit and malware technique
• Reverse engineer
• Tearing down exploits, malware
• Use the knowledge for better defense tactics/strategy
• 1-day researcher
• DarunGrim – opensource binary diffing tool
‹#›
Rootkits: Subverting the Windows
Kernel
• Rootkits: Subverting the Windows
Kernel was published in 2005
• This is the reference for Windows
rootkits
• Many techniques were used by
malware in the wild (DKOM, SSDT
hooks)
2
Windows driver signing requirements
https://docs.microsoft.com/en-us/windows-hardware/drivers/install/kernel-mode-
code-signing-policy--windows-vista-and-later-
• The Windows rootkit era
ended with the release of
Windows Vista, mainly due to
Windows signing requirements
and Kernel Patch Protection
(aka KPP, PatchGuard)
• Now malware authors need to
overcome signing requirement
• Only very advanced actors
used rootkits so far
(Equation, Duqu2, etc)
3
Zacinlo ad fraud operation
• Bitdefender reported Zacinlo Ad Fraud operation in
June of 2018
• Microsoft detection – Trojan:Win64/Detrahere
• Seemed very usual until it mentioned “digitally signed
rootkit”
• The report focused on the ad fraud aspects of the malware
• This presentation will focus on the rootkit aspects of
the Zacinlo malware
4
Detrahere: low detections
• It is believed that the
threat has been running
since early 2012
• According to VirusTotal,
Malwarebytes identified
the rootkit component of
this threat as early as
September 2017
• Low detection rates
(6/67) until June 2018
5
Detrahere: Stealthiness+Persistency
• The threat was under the radar for a long time
• It infects other executable to propagate
• The infected file will run the original executable after
infecting victim machine
• It installs a kernel driver that loads additional payload
drivers from the hidden file system
• The rootkit component blocks visibility into the related malware
files using hidden file system
• It registered it as a shutdown handler and also put
itself in the early phase of driver loading order
• Remediation can be challenging because it installs a shutdown
handler to reinstall itself for persistency
6
Components
Name Functionality Descriptions
DriverProtect
Shutdown handler
registration
Register a shutdown handler to regain persistence when the
service is removed
Hidden file system Hide file contents of the malware files
Anti-
analysis/debugging
Block security products and analysts tools process launch and
check for attached kernel debugger
User-mode
process
USB file infection
When a USB drive is connected, all PE files on it will be
infected
Network traffic
injection
Modify network traffic and inject Ad Fraud
C&C Connect to C&C servers
Netfilter2
Network traffic
injection (driver)
Provides driver-level support for network traffic injection
which will be used by user-mode process
udiskMgr Anti-remediation
Blocks security products and analysts tools process launch
Blocks some files creation (ex. FIXLISTS.TXT) used by a system
recovery tool
7
Infection/propagation
8
USB file infection: threat
delivery mechanism
9
USB file infection: threat delivery
mechanism
• Bitdefender report focused on one case where malware is delivered through fake
VPN client.
• In reality, the threat can spread through USB infections. When a user inserts a
USB drive into the infected machine, the rootkit component will infect the PE
files on the USB drive
• Probably the VPN client found by Bitdefender might be infected in the first place.
10
File infection
Verified: Signed
Signing date: 2:45 AM 7/16/2016
Publisher: Microsoft Windows
Company: Microsoft Corporation
Description: Notepad
Product: Microsoft« Windows«
Operating System
Prod version: 10.0.14393.0
File version: 10.0.14393.0
(rs1_release.160715-1616)
MachineType: 64-bit
Verified: Unsigned
Link date: 5:24 AM 11/21/2017
Publisher: n/a
Company: Microsoft Corporation
Description: Notepad
Product: Microsoft« Windows« Operating
System
Prod version: 10.0.14393.0
File version: 10.0.14393.0
(rs1_release.160715-1616)
MachineType: 32-bit
Infection
The file becomes unsigned and the machine type becomes 32-bit because the
malware only has a 32-bit infector.
The original 64-bit file will run by this infector later after being
extracted from resource section of the infected file.
11
Original PE file is inserted as a
resource
12
Running original PE payload
13
Running the infected executable
14
Loading kernel driver
15
Stolen and revoked certificate
Countersignatures
are missing – no way
to verify validity
of the certificate
Stolen and revoked certificate
16
And expired
• The certificate used for this
driver was issued to “Handan City
Congtai District LiKang Daily
Goods Department” and was revoked
• The malware performs system time
change to sign this driver on-the-
fly to generate expired
certificate intentionally
• For compatibility reasons, Windows
will accept this certificate
thinking it was previously
generated for legacy driverExpired valid time range
17
Mitigations
• Windows 10 S mode will prevent loading of these
drivers
• More strict driver requirements:
• Windows Defender Application Control policy (Device Guard)
• SecureBoot + HVCI (Memory Integrity) + VBS
• More of anti-rootkit, exploit approach
18
Detections: WDATP
• RS5 detection: certificate telemetry + machine
learning
• The revoked and expired certificate from a vendor never
signed Windows kernel driver
• Using machine learning to mass analyze the certificate
information
• When it fits into the profile, detection will be made
19
Variant drivers
• Searching VTI (Virus Total
Intelligence) will return
thousands of files with
revoked certificate from
“Handan City Congtai
District LiKang Daily Goods
Department”
• These are all variants files
generated by the infector
20
Variant drivers
Variants are
basically
same except
some padded
bytes
21
Persistence
22
Infection/persistence
23
Shutdown handler registration
• The DriverProtect component will register its main
infection routine as a shutdown handler
• With next reboot, the threat will be persistent
• Traditional remediation fails because it doesn’t
have control over this handler
24
Shutdown handler registration
• This routine shows how the shutdown handler is
registered
• Remediation is extremely tricky
• The system will be re-infected with each reboot of
the system unless the resident kernel driver is
unloaded
25
Shutdown handler registration
26
Group order list
• The DriverProtect kernel module is in very early
stages of the driver loading order
• Will affect following security product related
drivers detection attempts
27
Windows Defender Offline
• Windows Defender Offline can provide offline
remediation capability
• When threat is detected, WDO will:
• Guide through offline remediation process
• Cut down the reloading of the rootkit modules
28
Windows Defender Offline
• WDO will be able to remove
the threat
• WDO is a special Defender
service where Defender runs
scanning from clean OS image
from WINRE (Windows Recovery)
partition
• Once system reboots, the
kernel malicious drivers
clean up itself, before any
AV scans.
29
Anti-analysis/debugging
30
Anti-analysis/debugging
31
Anti-analysis tools
• Process creation callback
• Also CreateProcess callback is installed by DriverProtect to prevent
some analysis tools
• WorkItem queue is used to terminate the process from the callback
32
Anti-analysis tools
• Image load callback
• Usual analyst tools are
prohibited from launching
on the target system from
LoadImage callback
installed by DriverProtect
module.
33
Anti-detection
• Monitor Kernel Driver
Loading
• If security product related
kernel drivers are loaded, it
will nop out the entry point
(xor eax, eax; ret)
34
Anti-detection
• Disable ProcessCreateCallbacks
and FLT callbacks
• The anti-analysis code will
enumerate
PspCreateProcessNotifyCallback
and FLT driver routines
• If it is registered by a
security products, it will put
nop return instructions over the
callback
• The determination logic for
security products include driver
path comparison and driver PE
header scanning for version
information
35
Anti-detection: Security products
• The DriverProtect has extensive list of Anti-
malware product processes. They are encoded in file
and decoded dynamically.
Decoded
36
Anti-detection: Security products
• Scanning happens upon PE
header
• ReadFile ->
ScanSecurityProductPatterns
37
Anti-debugging:
Kernel debugger check
• The rootkit
checks whether
kernel debugger
is enabled
• If enabled, it
will call
KeBugCheck.
38
Anti-analysis: obfuscations
• Some rootkit kernel
images are obfuscated in
file (VMProtect)
• When it is loaded in the
kernel, it will unpack
itself with original
contents
• It will not create new
+RWX kernel memory, but
will use existing
section memory to de-
obfuscate itself
Interfering with recovery tool
• If any process
tries to write
contents to
FIXLIST.TXT, the
contents will be
replaced with
NULLs.
• FIXLIST.TXT is
used by Farbar
Recovery Scan Tool
40
Hidden file system
41
Hidden file system – loading
components
42
Creating user-mode process
43
Hidden file system
• The DriverProtect module installs filter driver
module to limit access to it’s components
• The other core drivers (netfilter2 and udiskMgr)
will be directly loaded from the DriverProtect
itself
• Security products’ operation in user-mode will have
limited visibility into the core files because they
are loaded from hidden file location
44
Hidden file system
• DriverProtect will
filter out access to
protected files
(malware components).
• Security products run
in userspace will fail
to access malware
components
• The file contents
inside protected
storage is broken PE
and will patched up
when loaded into memory
• It is implemented as
filtering driver
45
Hidden file system
• The rootkit drivers show missing files
• When DriverProtect driver runs, it will:
• Prevent access to the real file contents on the file system
• The components reside on the hidden location have
intentionally broken PE header
• Act as a proxy and load the real contents from the protected
storage after modifying the contents to be a valid PE file
46
WDATP visibility into driver
loading
• Even though the file never touches the file system,
WDATP still detects the driver loading activity
• DriverProtect protection only works against user-mode tools
• WDATP sensor works in kernel level
47
Hidden file system
• Through this Filter driver, the malware components are protected from
investigations and false information on path is provided to the system. This
will confuse security products and analysis tools.
• Ex) C:windowssystem32sncibkt.exe image is actually
C:WindowsSystem32spsatrmsncibkt.exe
48
Network traffic
injection
49
Network traffic injection
50
Network traffic injection –
netfilter2.sys
There is a MITM kernel
component that are written
based upon commercial
netfilter2 driver code from
netfiltersdk.com
51
Netfilter2 – transparent proxy
The filter driver provides functionality to inject
packets on the fly.
https://netfiltersdk.com/nfsdk.html
52
Network traffic injection –
netfilter2.sys
• The netfilter2.sys driver will be loaded with random
names through hidden file system
• It looks like this netfilter2.sys has close
similarity to the NetFilterSDK.com provided one
• We believe the attackers have access to the
netfilter2.sys source code
• The source code is commercially available
53
Adding new root certificate
• The malicious user-mode component will add new root
certificate
• Used to hijack HTTPS sessions on the system
54
Installed root
certificate
Conclusion
• Detrahere (Zacinlo) is a threat that intercepts network traffic on
a machine to inject ads
• It has multiple self-protection mechanisms
• Hidden file system to hide core drivers
• Anti-analysis/debug/detection
• It abuses feature in Windows driver verification to load kernel
drivers using revoked certificate
• WDATP has a good visibility into the detailed behaviors from the
threat
• WDO can be used to remediate the threat overriding persistence
mechanism 55
C&C Servers
IP Description
119.28.136.132:80
(gpt5.com)
ASN: 132203
City: Beijing
State: Beijing
Country: China
Organization: TENCENT CLOUD COMPUTING (BEIJING) CO. LTD.
104.193.88.77:80
(www.baidu.com)
ASN: 55967
City: Cupertino
State: California
Country: United States
Organization: BAIDU USA LLC
211.159.220.234:80
(adxco.cn)
ASN: 45090
City: Beijing
State: Beijing
Country: China
Organization: TENCENT CLOUD COMPUTING (BEIJING) CO. LTD.
119.28.137.94:8080
(www.user2best.com)
ASN: 132203
City: Beijing
State: Beijing
Country: China
Organization: TENCENT CLOUD COMPUTING (BEIJING) CO. LTD.
56
IOCs
SHA1 SHA256 Filename Defender/descriptions
deb585177e3fb4a935ca177260b02
714ab511353
5edeba23daabdeaaefea7d0ba3c15
3a8db07363a16c659cd120e3aa998
1f485b
setup.exe Infector
954e690318768729b2e825622c883
b803fcb8433
bf57248c47bb1fc44bafad7bb257d
1e03e04128d847e5d895a05ec83ce
a5bd27
C:WindowsSystem32spsatrmsncibk
t.exe
Trojan:Win64/Detrahere
94ec03ad3168a1b8bead60555f062
9b9186e00e6
8f0d55b54ddccf97ea798b40fc0a9
21f59010e5f02118251438ffcf79f
19847a
C:windowssystem32sncibktsvc.exe NULL filled file
86218530d9043ff51e1d581a96e89
140820c8fcb
d9fcc3554d657d68c94001438ebce
24842cec393ad97d3789a30c07426
1519ad
C:WindowsSystem32spsatrmsncibk
t.sys
VirTool:Win64/Detrahere
0cbe4787b9a25bdbd8978e477d1d4
bcbe06ae341
fcbce0027b85069790b25b08444ac
c4ebcb24567d6f461e63ca20f067e
7284e6
bfilps.sys Trojan:Win64/Detrahere.S
1cb1f70a120a61ee9c97d8f7c5ba6
e9ea8674e51
78ac863f8ccea5cd81a3361c203ba
792379735ba5a311d8607f1f1e587
2edb2d
lsswzcgj.sys Trojan:Win64/Detrahere.S
9258b5d3a559ed02a4afaf0dd8079
820ebff3bc8
c86de08ac277735e62bef81a30685
36b43cccf8f278e6cd59e50a6a887
4c4973
rtdsuxz.exe Trojan:Win32/Detrahere.B
!dr
69d209cb78d8e37de47bc697169f6
bb7de4fa738
69d209cb78d8e37de47bc697169f6
bb7de4fa738
notepad.exe Trojan:Win32/Detrahere.B
!dr 57

Weitere ähnliche Inhalte

Was ist angesagt?

PHP unserialization vulnerabilities: What are we missing?
PHP unserialization vulnerabilities: What are we missing?PHP unserialization vulnerabilities: What are we missing?
PHP unserialization vulnerabilities: What are we missing?Sam Thomas
 
Unix vs Linux | Difference Between Unix & Linux | Edureka
Unix vs Linux | Difference Between Unix & Linux | EdurekaUnix vs Linux | Difference Between Unix & Linux | Edureka
Unix vs Linux | Difference Between Unix & Linux | EdurekaEdureka!
 
Database in Kubernetes: Diagnostics and Monitoring
Database in Kubernetes: Diagnostics and MonitoringDatabase in Kubernetes: Diagnostics and Monitoring
Database in Kubernetes: Diagnostics and MonitoringSveta Smirnova
 
A Case Study in Attacking KeePass
A Case Study in Attacking KeePassA Case Study in Attacking KeePass
A Case Study in Attacking KeePassWill Schroeder
 
Presentation on basics of Registry Editor
Presentation on basics of Registry EditorPresentation on basics of Registry Editor
Presentation on basics of Registry EditorSanjeev Kumar Jaiswal
 
XXE Exposed: SQLi, XSS, XXE and XEE against Web Services
XXE Exposed: SQLi, XSS, XXE and XEE against Web ServicesXXE Exposed: SQLi, XSS, XXE and XEE against Web Services
XXE Exposed: SQLi, XSS, XXE and XEE against Web ServicesAbraham Aranguren
 
writing self-modifying code and utilizing advanced assembly techniques
writing self-modifying code and utilizing advanced assembly techniqueswriting self-modifying code and utilizing advanced assembly techniques
writing self-modifying code and utilizing advanced assembly techniquesRussell Sanford
 
李宏毅/當語音處理遇上深度學習
李宏毅/當語音處理遇上深度學習李宏毅/當語音處理遇上深度學習
李宏毅/當語音處理遇上深度學習台灣資料科學年會
 
MySQL Technology Cafe #12 MDS HA検証 ~パラメータからパフォーマンスまで~
MySQL Technology Cafe #12 MDS HA検証 ~パラメータからパフォーマンスまで~MySQL Technology Cafe #12 MDS HA検証 ~パラメータからパフォーマンスまで~
MySQL Technology Cafe #12 MDS HA検証 ~パラメータからパフォーマンスまで~オラクルエンジニア通信
 
Android Multimedia Framework
Android Multimedia FrameworkAndroid Multimedia Framework
Android Multimedia FrameworkPicker Weng
 
Accelerate Your Analytic Queries with Amazon Aurora Parallel Query (DAT362) -...
Accelerate Your Analytic Queries with Amazon Aurora Parallel Query (DAT362) -...Accelerate Your Analytic Queries with Amazon Aurora Parallel Query (DAT362) -...
Accelerate Your Analytic Queries with Amazon Aurora Parallel Query (DAT362) -...Amazon Web Services
 
Obscure Go Optimisations
Obscure Go OptimisationsObscure Go Optimisations
Obscure Go OptimisationsBryan Boreham
 
PowerShell Inside Out: Applied .NET Hacking for Enhanced Visibility by Satosh...
PowerShell Inside Out: Applied .NET Hacking for Enhanced Visibility by Satosh...PowerShell Inside Out: Applied .NET Hacking for Enhanced Visibility by Satosh...
PowerShell Inside Out: Applied .NET Hacking for Enhanced Visibility by Satosh...CODE BLUE
 
Android audio system(audio_hardwareinterace)
Android audio system(audio_hardwareinterace)Android audio system(audio_hardwareinterace)
Android audio system(audio_hardwareinterace)fefe7270
 
Introduction to python programming
Introduction to python programmingIntroduction to python programming
Introduction to python programmingSrinivas Narasegouda
 
Sigreturn Oriented Programming
Sigreturn Oriented ProgrammingSigreturn Oriented Programming
Sigreturn Oriented ProgrammingAngel Boy
 

Was ist angesagt? (20)

PHP unserialization vulnerabilities: What are we missing?
PHP unserialization vulnerabilities: What are we missing?PHP unserialization vulnerabilities: What are we missing?
PHP unserialization vulnerabilities: What are we missing?
 
MySQL and its basic commands
MySQL and its basic commandsMySQL and its basic commands
MySQL and its basic commands
 
Python
PythonPython
Python
 
Unix vs Linux | Difference Between Unix & Linux | Edureka
Unix vs Linux | Difference Between Unix & Linux | EdurekaUnix vs Linux | Difference Between Unix & Linux | Edureka
Unix vs Linux | Difference Between Unix & Linux | Edureka
 
PL/SQL TRIGGERS
PL/SQL TRIGGERSPL/SQL TRIGGERS
PL/SQL TRIGGERS
 
Database in Kubernetes: Diagnostics and Monitoring
Database in Kubernetes: Diagnostics and MonitoringDatabase in Kubernetes: Diagnostics and Monitoring
Database in Kubernetes: Diagnostics and Monitoring
 
A Case Study in Attacking KeePass
A Case Study in Attacking KeePassA Case Study in Attacking KeePass
A Case Study in Attacking KeePass
 
Presentation on basics of Registry Editor
Presentation on basics of Registry EditorPresentation on basics of Registry Editor
Presentation on basics of Registry Editor
 
XXE Exposed: SQLi, XSS, XXE and XEE against Web Services
XXE Exposed: SQLi, XSS, XXE and XEE against Web ServicesXXE Exposed: SQLi, XSS, XXE and XEE against Web Services
XXE Exposed: SQLi, XSS, XXE and XEE against Web Services
 
writing self-modifying code and utilizing advanced assembly techniques
writing self-modifying code and utilizing advanced assembly techniqueswriting self-modifying code and utilizing advanced assembly techniques
writing self-modifying code and utilizing advanced assembly techniques
 
李宏毅/當語音處理遇上深度學習
李宏毅/當語音處理遇上深度學習李宏毅/當語音處理遇上深度學習
李宏毅/當語音處理遇上深度學習
 
MySQL Technology Cafe #12 MDS HA検証 ~パラメータからパフォーマンスまで~
MySQL Technology Cafe #12 MDS HA検証 ~パラメータからパフォーマンスまで~MySQL Technology Cafe #12 MDS HA検証 ~パラメータからパフォーマンスまで~
MySQL Technology Cafe #12 MDS HA検証 ~パラメータからパフォーマンスまで~
 
Android Multimedia Framework
Android Multimedia FrameworkAndroid Multimedia Framework
Android Multimedia Framework
 
Sql ppt
Sql pptSql ppt
Sql ppt
 
Accelerate Your Analytic Queries with Amazon Aurora Parallel Query (DAT362) -...
Accelerate Your Analytic Queries with Amazon Aurora Parallel Query (DAT362) -...Accelerate Your Analytic Queries with Amazon Aurora Parallel Query (DAT362) -...
Accelerate Your Analytic Queries with Amazon Aurora Parallel Query (DAT362) -...
 
Obscure Go Optimisations
Obscure Go OptimisationsObscure Go Optimisations
Obscure Go Optimisations
 
PowerShell Inside Out: Applied .NET Hacking for Enhanced Visibility by Satosh...
PowerShell Inside Out: Applied .NET Hacking for Enhanced Visibility by Satosh...PowerShell Inside Out: Applied .NET Hacking for Enhanced Visibility by Satosh...
PowerShell Inside Out: Applied .NET Hacking for Enhanced Visibility by Satosh...
 
Android audio system(audio_hardwareinterace)
Android audio system(audio_hardwareinterace)Android audio system(audio_hardwareinterace)
Android audio system(audio_hardwareinterace)
 
Introduction to python programming
Introduction to python programmingIntroduction to python programming
Introduction to python programming
 
Sigreturn Oriented Programming
Sigreturn Oriented ProgrammingSigreturn Oriented Programming
Sigreturn Oriented Programming
 

Ähnlich wie BlueHat v18 || Return of the kernel rootkit malware (on windows 10)

Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4Qualcomm Developer Network
 
how-to-bypass-AM-PPL
how-to-bypass-AM-PPLhow-to-bypass-AM-PPL
how-to-bypass-AM-PPLnitinscribd
 
Project Malware AnalysisCS 6262 Project 3Agenda.docx
Project Malware AnalysisCS 6262 Project 3Agenda.docxProject Malware AnalysisCS 6262 Project 3Agenda.docx
Project Malware AnalysisCS 6262 Project 3Agenda.docxbriancrawford30935
 
Captain Hook: Pirating AVs to Bypass Exploit Mitigations
Captain Hook: Pirating AVs to Bypass Exploit MitigationsCaptain Hook: Pirating AVs to Bypass Exploit Mitigations
Captain Hook: Pirating AVs to Bypass Exploit MitigationsenSilo
 
Piratng Avs to bypass exploit mitigation
Piratng Avs to bypass exploit mitigationPiratng Avs to bypass exploit mitigation
Piratng Avs to bypass exploit mitigationPriyanka Aash
 
technical overview - endpoint protection 10.3.3
technical overview - endpoint protection 10.3.3technical overview - endpoint protection 10.3.3
technical overview - endpoint protection 10.3.3Muhammad Denis Iqbal
 
Black Energy18 - Russian botnet package analysis
Black Energy18 - Russian botnet package analysisBlack Energy18 - Russian botnet package analysis
Black Energy18 - Russian botnet package analysisRoberto Suggi Liverani
 
CNIT 126: 10: Kernel Debugging with WinDbg
CNIT 126: 10: Kernel Debugging with WinDbgCNIT 126: 10: Kernel Debugging with WinDbg
CNIT 126: 10: Kernel Debugging with WinDbgSam Bowne
 
Preventing Supply Chain Attacks on Open Source Software
Preventing Supply Chain Attacks on Open Source SoftwarePreventing Supply Chain Attacks on Open Source Software
Preventing Supply Chain Attacks on Open Source SoftwareAll Things Open
 
CNIT 126 Ch 11: Malware Behavior
CNIT 126 Ch 11: Malware BehaviorCNIT 126 Ch 11: Malware Behavior
CNIT 126 Ch 11: Malware BehaviorSam Bowne
 
Implementing Secure DevOps on Public Cloud Platforms
Implementing Secure DevOps on Public Cloud PlatformsImplementing Secure DevOps on Public Cloud Platforms
Implementing Secure DevOps on Public Cloud PlatformsGaurav "GP" Pal
 
Contain your risk: Deploy secure containers with trust and confidence
Contain your risk: Deploy secure containers with trust and confidenceContain your risk: Deploy secure containers with trust and confidence
Contain your risk: Deploy secure containers with trust and confidenceBlack Duck by Synopsys
 
MNSEC 2018 - Windows forensics
MNSEC 2018 - Windows forensicsMNSEC 2018 - Windows forensics
MNSEC 2018 - Windows forensicsMNCERT
 
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docxeugeniadean34240
 
openioc_scan - IOC scanner for memory forensics
openioc_scan - IOC scanner for memory forensicsopenioc_scan - IOC scanner for memory forensics
openioc_scan - IOC scanner for memory forensicsTakahiro Haruyama
 
Windows Threat Hunting
Windows Threat HuntingWindows Threat Hunting
Windows Threat HuntingGIBIN JOHN
 
CNIT 152: 12b Windows Registry
CNIT 152: 12b Windows RegistryCNIT 152: 12b Windows Registry
CNIT 152: 12b Windows RegistrySam Bowne
 
CNIT 126 11. Malware Behavior
CNIT 126 11. Malware BehaviorCNIT 126 11. Malware Behavior
CNIT 126 11. Malware BehaviorSam Bowne
 
Hirens Boot CD 15.2 ppt
Hirens Boot CD 15.2 pptHirens Boot CD 15.2 ppt
Hirens Boot CD 15.2 pptSuman Sudheer
 

Ähnlich wie BlueHat v18 || Return of the kernel rootkit malware (on windows 10) (20)

Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
Developing for Industrial IoT with Linux OS on DragonBoard™ 410c: Session 4
 
how-to-bypass-AM-PPL
how-to-bypass-AM-PPLhow-to-bypass-AM-PPL
how-to-bypass-AM-PPL
 
Project Malware AnalysisCS 6262 Project 3Agenda.docx
Project Malware AnalysisCS 6262 Project 3Agenda.docxProject Malware AnalysisCS 6262 Project 3Agenda.docx
Project Malware AnalysisCS 6262 Project 3Agenda.docx
 
Captain Hook: Pirating AVs to Bypass Exploit Mitigations
Captain Hook: Pirating AVs to Bypass Exploit MitigationsCaptain Hook: Pirating AVs to Bypass Exploit Mitigations
Captain Hook: Pirating AVs to Bypass Exploit Mitigations
 
Piratng Avs to bypass exploit mitigation
Piratng Avs to bypass exploit mitigationPiratng Avs to bypass exploit mitigation
Piratng Avs to bypass exploit mitigation
 
technical overview - endpoint protection 10.3.3
technical overview - endpoint protection 10.3.3technical overview - endpoint protection 10.3.3
technical overview - endpoint protection 10.3.3
 
Black Energy18 - Russian botnet package analysis
Black Energy18 - Russian botnet package analysisBlack Energy18 - Russian botnet package analysis
Black Energy18 - Russian botnet package analysis
 
CNIT 126: 10: Kernel Debugging with WinDbg
CNIT 126: 10: Kernel Debugging with WinDbgCNIT 126: 10: Kernel Debugging with WinDbg
CNIT 126: 10: Kernel Debugging with WinDbg
 
Preventing Supply Chain Attacks on Open Source Software
Preventing Supply Chain Attacks on Open Source SoftwarePreventing Supply Chain Attacks on Open Source Software
Preventing Supply Chain Attacks on Open Source Software
 
CNIT 126 Ch 11: Malware Behavior
CNIT 126 Ch 11: Malware BehaviorCNIT 126 Ch 11: Malware Behavior
CNIT 126 Ch 11: Malware Behavior
 
Implementing Secure DevOps on Public Cloud Platforms
Implementing Secure DevOps on Public Cloud PlatformsImplementing Secure DevOps on Public Cloud Platforms
Implementing Secure DevOps on Public Cloud Platforms
 
Contain your risk: Deploy secure containers with trust and confidence
Contain your risk: Deploy secure containers with trust and confidenceContain your risk: Deploy secure containers with trust and confidence
Contain your risk: Deploy secure containers with trust and confidence
 
MNSEC 2018 - Windows forensics
MNSEC 2018 - Windows forensicsMNSEC 2018 - Windows forensics
MNSEC 2018 - Windows forensics
 
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
1RUNNING HEAD MANAGING HOST BASED SECURITY IN WINDOWS 8.1La.docx
 
openioc_scan - IOC scanner for memory forensics
openioc_scan - IOC scanner for memory forensicsopenioc_scan - IOC scanner for memory forensics
openioc_scan - IOC scanner for memory forensics
 
Windows Threat Hunting
Windows Threat HuntingWindows Threat Hunting
Windows Threat Hunting
 
CNIT 152: 12b Windows Registry
CNIT 152: 12b Windows RegistryCNIT 152: 12b Windows Registry
CNIT 152: 12b Windows Registry
 
CNIT 126 11. Malware Behavior
CNIT 126 11. Malware BehaviorCNIT 126 11. Malware Behavior
CNIT 126 11. Malware Behavior
 
Linux kernel booting
Linux kernel bootingLinux kernel booting
Linux kernel booting
 
Hirens Boot CD 15.2 ppt
Hirens Boot CD 15.2 pptHirens Boot CD 15.2 ppt
Hirens Boot CD 15.2 ppt
 

Mehr von BlueHat Security Conference

BlueHat Seattle 2019 || The cake is a lie! Uncovering the secret world of mal...
BlueHat Seattle 2019 || The cake is a lie! Uncovering the secret world of mal...BlueHat Seattle 2019 || The cake is a lie! Uncovering the secret world of mal...
BlueHat Seattle 2019 || The cake is a lie! Uncovering the secret world of mal...BlueHat Security Conference
 
BlueHat Seattle 2019 || Guarding Against Physical Attacks: The Xbox One Story
BlueHat Seattle 2019 || Guarding Against Physical Attacks: The Xbox One StoryBlueHat Seattle 2019 || Guarding Against Physical Attacks: The Xbox One Story
BlueHat Seattle 2019 || Guarding Against Physical Attacks: The Xbox One StoryBlueHat Security Conference
 
BlueHat Seattle 2019 || Kubernetes Practical Attack and Defense
BlueHat Seattle 2019 || Kubernetes Practical Attack and DefenseBlueHat Seattle 2019 || Kubernetes Practical Attack and Defense
BlueHat Seattle 2019 || Kubernetes Practical Attack and DefenseBlueHat Security Conference
 
BlueHat Seattle 2019 || Open Source Security, vulnerabilities never come alone
BlueHat Seattle 2019 || Open Source Security, vulnerabilities never come aloneBlueHat Seattle 2019 || Open Source Security, vulnerabilities never come alone
BlueHat Seattle 2019 || Open Source Security, vulnerabilities never come aloneBlueHat Security Conference
 
BlueHat Seattle 2019 || Modern Binary Analysis with ILs
BlueHat Seattle 2019 || Modern Binary Analysis with ILsBlueHat Seattle 2019 || Modern Binary Analysis with ILs
BlueHat Seattle 2019 || Modern Binary Analysis with ILsBlueHat Security Conference
 
BlueHat Seattle 2019 || Don't forget to SUBSCRIBE.
BlueHat Seattle 2019 || Don't forget to SUBSCRIBE.BlueHat Seattle 2019 || Don't forget to SUBSCRIBE.
BlueHat Seattle 2019 || Don't forget to SUBSCRIBE.BlueHat Security Conference
 
BlueHat Seattle 2019 || I'm in your cloud: A year of hacking Azure AD
BlueHat Seattle 2019 || I'm in your cloud: A year of hacking Azure ADBlueHat Seattle 2019 || I'm in your cloud: A year of hacking Azure AD
BlueHat Seattle 2019 || I'm in your cloud: A year of hacking Azure ADBlueHat Security Conference
 
BlueHat Seattle 2019 || Autopsies of Recent DFIR Investigations
BlueHat Seattle 2019 || Autopsies of Recent DFIR InvestigationsBlueHat Seattle 2019 || Autopsies of Recent DFIR Investigations
BlueHat Seattle 2019 || Autopsies of Recent DFIR InvestigationsBlueHat Security Conference
 
BlueHat Seattle 2019 || The good, the bad & the ugly of ML based approaches f...
BlueHat Seattle 2019 || The good, the bad & the ugly of ML based approaches f...BlueHat Seattle 2019 || The good, the bad & the ugly of ML based approaches f...
BlueHat Seattle 2019 || The good, the bad & the ugly of ML based approaches f...BlueHat Security Conference
 
BlueHat Seattle 2019 || Are We There Yet: Why Does Application Security Take ...
BlueHat Seattle 2019 || Are We There Yet: Why Does Application Security Take ...BlueHat Seattle 2019 || Are We There Yet: Why Does Application Security Take ...
BlueHat Seattle 2019 || Are We There Yet: Why Does Application Security Take ...BlueHat Security Conference
 
BlueHat Seattle 2019 || Building Secure Machine Learning Pipelines: Security ...
BlueHat Seattle 2019 || Building Secure Machine Learning Pipelines: Security ...BlueHat Seattle 2019 || Building Secure Machine Learning Pipelines: Security ...
BlueHat Seattle 2019 || Building Secure Machine Learning Pipelines: Security ...BlueHat Security Conference
 
BlueHat v18 || First strontium uefi rootkit unveiled
BlueHat v18 || First strontium uefi rootkit unveiledBlueHat v18 || First strontium uefi rootkit unveiled
BlueHat v18 || First strontium uefi rootkit unveiledBlueHat Security Conference
 
BlueHat v18 || WSL reloaded - Let's try to do better fuzzing
BlueHat v18 || WSL reloaded - Let's try to do better fuzzingBlueHat v18 || WSL reloaded - Let's try to do better fuzzing
BlueHat v18 || WSL reloaded - Let's try to do better fuzzingBlueHat Security Conference
 
BlueHat v18 || The hitchhiker's guide to north korea's malware galaxy
BlueHat v18 || The hitchhiker's guide to north korea's malware galaxyBlueHat v18 || The hitchhiker's guide to north korea's malware galaxy
BlueHat v18 || The hitchhiker's guide to north korea's malware galaxyBlueHat Security Conference
 
BlueHat v18 || Retpoline - the anti-spectre (type 2) mitigation in windows
BlueHat v18 || Retpoline - the anti-spectre (type 2) mitigation in windowsBlueHat v18 || Retpoline - the anti-spectre (type 2) mitigation in windows
BlueHat v18 || Retpoline - the anti-spectre (type 2) mitigation in windowsBlueHat Security Conference
 
BlueHat v18 || Memory resident implants - code injection is alive and well
BlueHat v18 || Memory resident implants - code injection is alive and wellBlueHat v18 || Memory resident implants - code injection is alive and well
BlueHat v18 || Memory resident implants - code injection is alive and wellBlueHat Security Conference
 
BlueHat v18 || Massive scale usb device driver fuzz without device
BlueHat v18 || Massive scale usb device driver fuzz without deviceBlueHat v18 || Massive scale usb device driver fuzz without device
BlueHat v18 || Massive scale usb device driver fuzz without deviceBlueHat Security Conference
 
BlueHat v18 || Modern day entomology - examining the inner workings of the bu...
BlueHat v18 || Modern day entomology - examining the inner workings of the bu...BlueHat v18 || Modern day entomology - examining the inner workings of the bu...
BlueHat v18 || Modern day entomology - examining the inner workings of the bu...BlueHat Security Conference
 
BlueHat v18 || The matrix has you - protecting linux using deception
BlueHat v18 || The matrix has you - protecting linux using deceptionBlueHat v18 || The matrix has you - protecting linux using deception
BlueHat v18 || The matrix has you - protecting linux using deceptionBlueHat Security Conference
 

Mehr von BlueHat Security Conference (20)

BlueHat Seattle 2019 || The cake is a lie! Uncovering the secret world of mal...
BlueHat Seattle 2019 || The cake is a lie! Uncovering the secret world of mal...BlueHat Seattle 2019 || The cake is a lie! Uncovering the secret world of mal...
BlueHat Seattle 2019 || The cake is a lie! Uncovering the secret world of mal...
 
BlueHat Seattle 2019 || Keynote
BlueHat Seattle 2019 || KeynoteBlueHat Seattle 2019 || Keynote
BlueHat Seattle 2019 || Keynote
 
BlueHat Seattle 2019 || Guarding Against Physical Attacks: The Xbox One Story
BlueHat Seattle 2019 || Guarding Against Physical Attacks: The Xbox One StoryBlueHat Seattle 2019 || Guarding Against Physical Attacks: The Xbox One Story
BlueHat Seattle 2019 || Guarding Against Physical Attacks: The Xbox One Story
 
BlueHat Seattle 2019 || Kubernetes Practical Attack and Defense
BlueHat Seattle 2019 || Kubernetes Practical Attack and DefenseBlueHat Seattle 2019 || Kubernetes Practical Attack and Defense
BlueHat Seattle 2019 || Kubernetes Practical Attack and Defense
 
BlueHat Seattle 2019 || Open Source Security, vulnerabilities never come alone
BlueHat Seattle 2019 || Open Source Security, vulnerabilities never come aloneBlueHat Seattle 2019 || Open Source Security, vulnerabilities never come alone
BlueHat Seattle 2019 || Open Source Security, vulnerabilities never come alone
 
BlueHat Seattle 2019 || Modern Binary Analysis with ILs
BlueHat Seattle 2019 || Modern Binary Analysis with ILsBlueHat Seattle 2019 || Modern Binary Analysis with ILs
BlueHat Seattle 2019 || Modern Binary Analysis with ILs
 
BlueHat Seattle 2019 || Don't forget to SUBSCRIBE.
BlueHat Seattle 2019 || Don't forget to SUBSCRIBE.BlueHat Seattle 2019 || Don't forget to SUBSCRIBE.
BlueHat Seattle 2019 || Don't forget to SUBSCRIBE.
 
BlueHat Seattle 2019 || I'm in your cloud: A year of hacking Azure AD
BlueHat Seattle 2019 || I'm in your cloud: A year of hacking Azure ADBlueHat Seattle 2019 || I'm in your cloud: A year of hacking Azure AD
BlueHat Seattle 2019 || I'm in your cloud: A year of hacking Azure AD
 
BlueHat Seattle 2019 || Autopsies of Recent DFIR Investigations
BlueHat Seattle 2019 || Autopsies of Recent DFIR InvestigationsBlueHat Seattle 2019 || Autopsies of Recent DFIR Investigations
BlueHat Seattle 2019 || Autopsies of Recent DFIR Investigations
 
BlueHat Seattle 2019 || The good, the bad & the ugly of ML based approaches f...
BlueHat Seattle 2019 || The good, the bad & the ugly of ML based approaches f...BlueHat Seattle 2019 || The good, the bad & the ugly of ML based approaches f...
BlueHat Seattle 2019 || The good, the bad & the ugly of ML based approaches f...
 
BlueHat Seattle 2019 || Are We There Yet: Why Does Application Security Take ...
BlueHat Seattle 2019 || Are We There Yet: Why Does Application Security Take ...BlueHat Seattle 2019 || Are We There Yet: Why Does Application Security Take ...
BlueHat Seattle 2019 || Are We There Yet: Why Does Application Security Take ...
 
BlueHat Seattle 2019 || Building Secure Machine Learning Pipelines: Security ...
BlueHat Seattle 2019 || Building Secure Machine Learning Pipelines: Security ...BlueHat Seattle 2019 || Building Secure Machine Learning Pipelines: Security ...
BlueHat Seattle 2019 || Building Secure Machine Learning Pipelines: Security ...
 
BlueHat v18 || First strontium uefi rootkit unveiled
BlueHat v18 || First strontium uefi rootkit unveiledBlueHat v18 || First strontium uefi rootkit unveiled
BlueHat v18 || First strontium uefi rootkit unveiled
 
BlueHat v18 || WSL reloaded - Let's try to do better fuzzing
BlueHat v18 || WSL reloaded - Let's try to do better fuzzingBlueHat v18 || WSL reloaded - Let's try to do better fuzzing
BlueHat v18 || WSL reloaded - Let's try to do better fuzzing
 
BlueHat v18 || The hitchhiker's guide to north korea's malware galaxy
BlueHat v18 || The hitchhiker's guide to north korea's malware galaxyBlueHat v18 || The hitchhiker's guide to north korea's malware galaxy
BlueHat v18 || The hitchhiker's guide to north korea's malware galaxy
 
BlueHat v18 || Retpoline - the anti-spectre (type 2) mitigation in windows
BlueHat v18 || Retpoline - the anti-spectre (type 2) mitigation in windowsBlueHat v18 || Retpoline - the anti-spectre (type 2) mitigation in windows
BlueHat v18 || Retpoline - the anti-spectre (type 2) mitigation in windows
 
BlueHat v18 || Memory resident implants - code injection is alive and well
BlueHat v18 || Memory resident implants - code injection is alive and wellBlueHat v18 || Memory resident implants - code injection is alive and well
BlueHat v18 || Memory resident implants - code injection is alive and well
 
BlueHat v18 || Massive scale usb device driver fuzz without device
BlueHat v18 || Massive scale usb device driver fuzz without deviceBlueHat v18 || Massive scale usb device driver fuzz without device
BlueHat v18 || Massive scale usb device driver fuzz without device
 
BlueHat v18 || Modern day entomology - examining the inner workings of the bu...
BlueHat v18 || Modern day entomology - examining the inner workings of the bu...BlueHat v18 || Modern day entomology - examining the inner workings of the bu...
BlueHat v18 || Modern day entomology - examining the inner workings of the bu...
 
BlueHat v18 || The matrix has you - protecting linux using deception
BlueHat v18 || The matrix has you - protecting linux using deceptionBlueHat v18 || The matrix has you - protecting linux using deception
BlueHat v18 || The matrix has you - protecting linux using deception
 

Kürzlich hochgeladen

Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusZilliz
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...apidays
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxRemote DBA Services
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Bhuvaneswari Subramani
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MIND CTI
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...apidays
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfOrbitshub
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdfSandro Moreira
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024The Digital Insurer
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamUiPathCommunity
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 

Kürzlich hochgeladen (20)

Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

BlueHat v18 || Return of the kernel rootkit malware (on windows 10)

  • 1. Return of the kernel rootkit malware (on Windows 10) Matt Oh (jeongoh@Microsoft.com) Microsoft ‹#›
  • 2. Whoami? • Microsoft WDATP research team • EDR, Blueteam • Special interests in new exploit and malware technique • Reverse engineer • Tearing down exploits, malware • Use the knowledge for better defense tactics/strategy • 1-day researcher • DarunGrim – opensource binary diffing tool ‹#›
  • 3. Rootkits: Subverting the Windows Kernel • Rootkits: Subverting the Windows Kernel was published in 2005 • This is the reference for Windows rootkits • Many techniques were used by malware in the wild (DKOM, SSDT hooks) 2
  • 4. Windows driver signing requirements https://docs.microsoft.com/en-us/windows-hardware/drivers/install/kernel-mode- code-signing-policy--windows-vista-and-later- • The Windows rootkit era ended with the release of Windows Vista, mainly due to Windows signing requirements and Kernel Patch Protection (aka KPP, PatchGuard) • Now malware authors need to overcome signing requirement • Only very advanced actors used rootkits so far (Equation, Duqu2, etc) 3
  • 5. Zacinlo ad fraud operation • Bitdefender reported Zacinlo Ad Fraud operation in June of 2018 • Microsoft detection – Trojan:Win64/Detrahere • Seemed very usual until it mentioned “digitally signed rootkit” • The report focused on the ad fraud aspects of the malware • This presentation will focus on the rootkit aspects of the Zacinlo malware 4
  • 6. Detrahere: low detections • It is believed that the threat has been running since early 2012 • According to VirusTotal, Malwarebytes identified the rootkit component of this threat as early as September 2017 • Low detection rates (6/67) until June 2018 5
  • 7. Detrahere: Stealthiness+Persistency • The threat was under the radar for a long time • It infects other executable to propagate • The infected file will run the original executable after infecting victim machine • It installs a kernel driver that loads additional payload drivers from the hidden file system • The rootkit component blocks visibility into the related malware files using hidden file system • It registered it as a shutdown handler and also put itself in the early phase of driver loading order • Remediation can be challenging because it installs a shutdown handler to reinstall itself for persistency 6
  • 8. Components Name Functionality Descriptions DriverProtect Shutdown handler registration Register a shutdown handler to regain persistence when the service is removed Hidden file system Hide file contents of the malware files Anti- analysis/debugging Block security products and analysts tools process launch and check for attached kernel debugger User-mode process USB file infection When a USB drive is connected, all PE files on it will be infected Network traffic injection Modify network traffic and inject Ad Fraud C&C Connect to C&C servers Netfilter2 Network traffic injection (driver) Provides driver-level support for network traffic injection which will be used by user-mode process udiskMgr Anti-remediation Blocks security products and analysts tools process launch Blocks some files creation (ex. FIXLISTS.TXT) used by a system recovery tool 7
  • 10. USB file infection: threat delivery mechanism 9
  • 11. USB file infection: threat delivery mechanism • Bitdefender report focused on one case where malware is delivered through fake VPN client. • In reality, the threat can spread through USB infections. When a user inserts a USB drive into the infected machine, the rootkit component will infect the PE files on the USB drive • Probably the VPN client found by Bitdefender might be infected in the first place. 10
  • 12. File infection Verified: Signed Signing date: 2:45 AM 7/16/2016 Publisher: Microsoft Windows Company: Microsoft Corporation Description: Notepad Product: Microsoft« Windows« Operating System Prod version: 10.0.14393.0 File version: 10.0.14393.0 (rs1_release.160715-1616) MachineType: 64-bit Verified: Unsigned Link date: 5:24 AM 11/21/2017 Publisher: n/a Company: Microsoft Corporation Description: Notepad Product: Microsoft« Windows« Operating System Prod version: 10.0.14393.0 File version: 10.0.14393.0 (rs1_release.160715-1616) MachineType: 32-bit Infection The file becomes unsigned and the machine type becomes 32-bit because the malware only has a 32-bit infector. The original 64-bit file will run by this infector later after being extracted from resource section of the infected file. 11
  • 13. Original PE file is inserted as a resource 12
  • 14. Running original PE payload 13
  • 15. Running the infected executable 14
  • 17. Stolen and revoked certificate Countersignatures are missing – no way to verify validity of the certificate Stolen and revoked certificate 16
  • 18. And expired • The certificate used for this driver was issued to “Handan City Congtai District LiKang Daily Goods Department” and was revoked • The malware performs system time change to sign this driver on-the- fly to generate expired certificate intentionally • For compatibility reasons, Windows will accept this certificate thinking it was previously generated for legacy driverExpired valid time range 17
  • 19. Mitigations • Windows 10 S mode will prevent loading of these drivers • More strict driver requirements: • Windows Defender Application Control policy (Device Guard) • SecureBoot + HVCI (Memory Integrity) + VBS • More of anti-rootkit, exploit approach 18
  • 20. Detections: WDATP • RS5 detection: certificate telemetry + machine learning • The revoked and expired certificate from a vendor never signed Windows kernel driver • Using machine learning to mass analyze the certificate information • When it fits into the profile, detection will be made 19
  • 21. Variant drivers • Searching VTI (Virus Total Intelligence) will return thousands of files with revoked certificate from “Handan City Congtai District LiKang Daily Goods Department” • These are all variants files generated by the infector 20
  • 22. Variant drivers Variants are basically same except some padded bytes 21
  • 25. Shutdown handler registration • The DriverProtect component will register its main infection routine as a shutdown handler • With next reboot, the threat will be persistent • Traditional remediation fails because it doesn’t have control over this handler 24
  • 26. Shutdown handler registration • This routine shows how the shutdown handler is registered • Remediation is extremely tricky • The system will be re-infected with each reboot of the system unless the resident kernel driver is unloaded 25
  • 28. Group order list • The DriverProtect kernel module is in very early stages of the driver loading order • Will affect following security product related drivers detection attempts 27
  • 29. Windows Defender Offline • Windows Defender Offline can provide offline remediation capability • When threat is detected, WDO will: • Guide through offline remediation process • Cut down the reloading of the rootkit modules 28
  • 30. Windows Defender Offline • WDO will be able to remove the threat • WDO is a special Defender service where Defender runs scanning from clean OS image from WINRE (Windows Recovery) partition • Once system reboots, the kernel malicious drivers clean up itself, before any AV scans. 29
  • 33. Anti-analysis tools • Process creation callback • Also CreateProcess callback is installed by DriverProtect to prevent some analysis tools • WorkItem queue is used to terminate the process from the callback 32
  • 34. Anti-analysis tools • Image load callback • Usual analyst tools are prohibited from launching on the target system from LoadImage callback installed by DriverProtect module. 33
  • 35. Anti-detection • Monitor Kernel Driver Loading • If security product related kernel drivers are loaded, it will nop out the entry point (xor eax, eax; ret) 34
  • 36. Anti-detection • Disable ProcessCreateCallbacks and FLT callbacks • The anti-analysis code will enumerate PspCreateProcessNotifyCallback and FLT driver routines • If it is registered by a security products, it will put nop return instructions over the callback • The determination logic for security products include driver path comparison and driver PE header scanning for version information 35
  • 37. Anti-detection: Security products • The DriverProtect has extensive list of Anti- malware product processes. They are encoded in file and decoded dynamically. Decoded 36
  • 38. Anti-detection: Security products • Scanning happens upon PE header • ReadFile -> ScanSecurityProductPatterns 37
  • 39. Anti-debugging: Kernel debugger check • The rootkit checks whether kernel debugger is enabled • If enabled, it will call KeBugCheck. 38
  • 40. Anti-analysis: obfuscations • Some rootkit kernel images are obfuscated in file (VMProtect) • When it is loaded in the kernel, it will unpack itself with original contents • It will not create new +RWX kernel memory, but will use existing section memory to de- obfuscate itself
  • 41. Interfering with recovery tool • If any process tries to write contents to FIXLIST.TXT, the contents will be replaced with NULLs. • FIXLIST.TXT is used by Farbar Recovery Scan Tool 40
  • 43. Hidden file system – loading components 42
  • 45. Hidden file system • The DriverProtect module installs filter driver module to limit access to it’s components • The other core drivers (netfilter2 and udiskMgr) will be directly loaded from the DriverProtect itself • Security products’ operation in user-mode will have limited visibility into the core files because they are loaded from hidden file location 44
  • 46. Hidden file system • DriverProtect will filter out access to protected files (malware components). • Security products run in userspace will fail to access malware components • The file contents inside protected storage is broken PE and will patched up when loaded into memory • It is implemented as filtering driver 45
  • 47. Hidden file system • The rootkit drivers show missing files • When DriverProtect driver runs, it will: • Prevent access to the real file contents on the file system • The components reside on the hidden location have intentionally broken PE header • Act as a proxy and load the real contents from the protected storage after modifying the contents to be a valid PE file 46
  • 48. WDATP visibility into driver loading • Even though the file never touches the file system, WDATP still detects the driver loading activity • DriverProtect protection only works against user-mode tools • WDATP sensor works in kernel level 47
  • 49. Hidden file system • Through this Filter driver, the malware components are protected from investigations and false information on path is provided to the system. This will confuse security products and analysis tools. • Ex) C:windowssystem32sncibkt.exe image is actually C:WindowsSystem32spsatrmsncibkt.exe 48
  • 52. Network traffic injection – netfilter2.sys There is a MITM kernel component that are written based upon commercial netfilter2 driver code from netfiltersdk.com 51
  • 53. Netfilter2 – transparent proxy The filter driver provides functionality to inject packets on the fly. https://netfiltersdk.com/nfsdk.html 52
  • 54. Network traffic injection – netfilter2.sys • The netfilter2.sys driver will be loaded with random names through hidden file system • It looks like this netfilter2.sys has close similarity to the NetFilterSDK.com provided one • We believe the attackers have access to the netfilter2.sys source code • The source code is commercially available 53
  • 55. Adding new root certificate • The malicious user-mode component will add new root certificate • Used to hijack HTTPS sessions on the system 54 Installed root certificate
  • 56. Conclusion • Detrahere (Zacinlo) is a threat that intercepts network traffic on a machine to inject ads • It has multiple self-protection mechanisms • Hidden file system to hide core drivers • Anti-analysis/debug/detection • It abuses feature in Windows driver verification to load kernel drivers using revoked certificate • WDATP has a good visibility into the detailed behaviors from the threat • WDO can be used to remediate the threat overriding persistence mechanism 55
  • 57. C&C Servers IP Description 119.28.136.132:80 (gpt5.com) ASN: 132203 City: Beijing State: Beijing Country: China Organization: TENCENT CLOUD COMPUTING (BEIJING) CO. LTD. 104.193.88.77:80 (www.baidu.com) ASN: 55967 City: Cupertino State: California Country: United States Organization: BAIDU USA LLC 211.159.220.234:80 (adxco.cn) ASN: 45090 City: Beijing State: Beijing Country: China Organization: TENCENT CLOUD COMPUTING (BEIJING) CO. LTD. 119.28.137.94:8080 (www.user2best.com) ASN: 132203 City: Beijing State: Beijing Country: China Organization: TENCENT CLOUD COMPUTING (BEIJING) CO. LTD. 56
  • 58. IOCs SHA1 SHA256 Filename Defender/descriptions deb585177e3fb4a935ca177260b02 714ab511353 5edeba23daabdeaaefea7d0ba3c15 3a8db07363a16c659cd120e3aa998 1f485b setup.exe Infector 954e690318768729b2e825622c883 b803fcb8433 bf57248c47bb1fc44bafad7bb257d 1e03e04128d847e5d895a05ec83ce a5bd27 C:WindowsSystem32spsatrmsncibk t.exe Trojan:Win64/Detrahere 94ec03ad3168a1b8bead60555f062 9b9186e00e6 8f0d55b54ddccf97ea798b40fc0a9 21f59010e5f02118251438ffcf79f 19847a C:windowssystem32sncibktsvc.exe NULL filled file 86218530d9043ff51e1d581a96e89 140820c8fcb d9fcc3554d657d68c94001438ebce 24842cec393ad97d3789a30c07426 1519ad C:WindowsSystem32spsatrmsncibk t.sys VirTool:Win64/Detrahere 0cbe4787b9a25bdbd8978e477d1d4 bcbe06ae341 fcbce0027b85069790b25b08444ac c4ebcb24567d6f461e63ca20f067e 7284e6 bfilps.sys Trojan:Win64/Detrahere.S 1cb1f70a120a61ee9c97d8f7c5ba6 e9ea8674e51 78ac863f8ccea5cd81a3361c203ba 792379735ba5a311d8607f1f1e587 2edb2d lsswzcgj.sys Trojan:Win64/Detrahere.S 9258b5d3a559ed02a4afaf0dd8079 820ebff3bc8 c86de08ac277735e62bef81a30685 36b43cccf8f278e6cd59e50a6a887 4c4973 rtdsuxz.exe Trojan:Win32/Detrahere.B !dr 69d209cb78d8e37de47bc697169f6 bb7de4fa738 69d209cb78d8e37de47bc697169f6 bb7de4fa738 notepad.exe Trojan:Win32/Detrahere.B !dr 57