Evasion Techniques
Evasion Techniques
Alternate Data Streams - used by malware to hide it files from normal inspection by saving the file in a different stream apart from $DATA
Injections
Thread Hijacking
PE Injection
DLL Injection - uses an already DLL that is already used by an application and overwriting or including malicious code within the DLL
Masquerading
Packing/Compression
Recompiling
Obfuscation
Anti-Reversing techniques
Sysmon has an event ID to detect newly created and accessed streams allowing to quickly detect and hunt malware that uses ADS
Hunting Alternate Data Streams
First technique is hiding files using alternate data streams using Event ID 15
Event ID 15 will hash and log any NTFS Streams that are included within the Sysmon configuration file
This let's us hunt for malware that evades detections using ADS
Detecting Remote Threads
Adversaries use remote threads to evade detections in combination with other techniques
Remote threads are created using the Windows API
CreateRemoteThread
and can be accessed usingOpenThread
andResumeThread
Used in multiple evasion techniques: DLL Injection, Thread Hijacking, and Process Hollowing
Detecting Evasion Techniques with PowerShell
Last updated