Teoderick C.’s Post

I ended up in a persistent research to evade Sysmon's registry monitoring. Through manipulation of targeted RegRun keys—saving, altering, and then restoring them—a cunning tactic emerges. Why? Sysmon leverages registry callback within its driver component for overseeing registry events (EventCode 12, 13, 14). However, a drawback emerges: the REG_NOTIFY_CLASS for RegRestoreKey and RegSaveKey is not being monitored that cause a blindsides. below is the POC tool github repo I developed to assist the community in testing their EDR and XDR solutions against this possible evasion technique to develop counter measure or detections. https://lnkd.in/e8CC8en5 blog is coming soon.. 😉 #reverseengineering #blueteam #redteam #detectionengineering

Harlan Carvey

Staff Threat Intel Analyst, Adversary Tactics

1y

One thing is clear from the video...while the changes themselves may not be detected using this technique, _getting to_ the changes will appear in EDR telemetry. Let's say you change "regreeper.exe" to something else, something perhaps a bit more innocuous. The creation of the process will be recorded by EDR, and the writing of the file to disk may also be recorded (depending upon your EDR platform). Regardless of what you name the file, the hash will be different, so least frequency of occurrence analysis will tell you, "hey, here's an EXE we haven't seen in the environment before...". So, yeah...the technique itself may allow you to bypass EDR tools, but getting to the point to where the technique can be used leaves a LOT of footprints, and LOT of opportunities for detections.

To view or add a comment, sign in

Explore topics