Microsoft Published a List of Legitimate Apps that Hackers Abuse to Bypass Windows Defender

Discussion in 'other security issues & news' started by guest, May 14, 2019.

  1. guest

    guest Guest

    Microsoft Published a List of Legitimate Apps that Hackers Abuse to Bypass Windows Defender
    May 13, 2019
    https://gbhackers.com/microsoft-legitimate-apps/
     
  2. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,883
    Location:
    Slovenia, EU
    Nice list of executables to add to deny execution list :thumb:
     
  3. Rasheed187

    Rasheed187 Registered Member

    Joined:
    Jul 10, 2004
    Posts:
    17,559
    Location:
    The Netherlands
    Cool, will add them to my list. Will block them all with EXE Radar.
     
  4. guest

    guest Guest

    Lol at the list, it is so limited, mine has around 150 entries, all denied via my SRP.
     
  5. Mr.X

    Mr.X Registered Member

    Joined:
    Aug 10, 2013
    Posts:
    4,805
    Location:
    .
    +1 :argh: Soooo limited and ***** list.
     
  6. shmu26

    shmu26 Registered Member

    Joined:
    Jul 9, 2015
    Posts:
    1,550
    On the list is
    system.management.automation.dll
    which is used for tricky powershell attacks.
    Any ideas how to effectively block it? Testers say that it is created on the fly and thus cannot be blocked by typical blacklisting solutions.
     
  7. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,883
    Location:
    Slovenia, EU
    If you block all user writable locations for execution (loading), wouldn't you get at least UAC prompt if it tries to get created in system or program folders?
     
  8. guest

    guest Guest

    AFAIK, UAC doesn't react to dlls, it is just for executables that request admin privileges.

    You want to block dlls, you need Win10 SRP/Applocker or specialized 3rd party softs.
     
  9. shmu26

    shmu26 Registered Member

    Joined:
    Jul 9, 2015
    Posts:
    1,550
    You can do it with Excubits Pumpernickel, if you block read access to system.management.automation.dll. If it can't be read, it can't be created.
    Note that Powershell will always fail, no matter how you launch it, if you block the dll.
    Thanks to @WildByDesign for this discovery.

    The config for this would be pretty simple and short, and works with the demo version. Make sure you add a blank line at the end of the config file.

    [LETHAL]
    [LOGGING]
    [WHITELISTMODIFY]
    *>*
    [BLACKLISTMODIFY]

    [WHITELISTREAD]
    *>*
    [BLACKLISTREAD]
    *>*system.management.automation.dll
    [EOF]
     
    Last edited: May 19, 2019
  10. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,883
    Location:
    Slovenia, EU
    Yes but if you try to create dll in system or program folder that process needs admin privileges.
    Or does "created on the fly" mean something else.
     
  11. shmu26

    shmu26 Registered Member

    Joined:
    Jul 9, 2015
    Posts:
    1,550
    I never saw a UAC prompt for that. AFAIK "on the fly" means that the dll is compiled and loaded straight into memory, it is not written to disk, that's why other security solutions can't stop it. This is the elegant monster that Microsoft unleashed on us.
     
  12. Minimalist

    Minimalist Registered Member

    Joined:
    Jan 6, 2014
    Posts:
    14,883
    Location:
    Slovenia, EU
    OK, that makes sense. Thnx for explanation :thumb:
     
  1. This site uses cookies to help personalise content, tailor your experience and to keep you logged in if you register.
    By continuing to use this site, you are consenting to our use of cookies.