Skip to content

Latest commit

 

History

History
67 lines (52 loc) · 4.04 KB

disable-or-evade-security-tools.md

File metadata and controls

67 lines (52 loc) · 4.04 KB
ID F0004
Objective(s) Defense Evasion
Related ATT&CK Techniques Impair Defenses: Disable or Modify Tools (T1562.001, T1629.003)
Version 2.0
Created 1 August 2019
Last Modified 21 November 2022

Disable or Evade Security Tools

Malware may disable or evade security tools to avoid detection. Security tools include OS security features and updating tools, anti-virus (AV) tools, firewalls, tool components providing security related logging and/or reporting, and Antimalware Scan Interface (AMSI) related capabilities.

Malware-related methods extending ATT&CK's definition are below.

See ATT&CK: Impair Defenses: Disable or Modify Tools (T1562.001, T1629.003).

Methods

Name ID Description
AMSI Bypass F0004.004 Malware bypasses AMSI (Anti-malware Scan Interface).
Disable Kernel Patch Protection F0004.001 Bypasses or disables kernel patch protection mechanisms such as Windows' PatchGuard, enabling the malware instance to operate at the same level as the operating system kernel and kernel mode drivers (KMD).
Disable System File Overwrite Protection F0004.002 Disables system file overwrite protection mechanisms such as Windows file protection, thereby enabling system files to be modified or replaced.
Force Lazy Writing F0004.006 Some operating systems will sometimes use a form of "lazy writing" for disk I/O, which may obscure the true provenance of the write operation. This method occurs when code intentionally forces the operating system to perform a lazy writing operation. For example, in Windows, a file may be opened, memory mapped, and closed, but the memory map will still exist and can be written to, which will cause a lazy write that looks like it is coming from the System process. [3]
Heavens Gate F0004.008 Malware evades endpoint security products by invoking 64-bit code in 32-bit processes, effectively bypassing user-mode hooks. [4]
Modify Policy F0004.005 Malware may modify policies to make software less effective. This is similar to ATT&CK's Subvert Trust Controls: Code Signing Policy Modification (T1553.006, T1632.001)
Unhook APIs F0004.003 Security products may hook APIs to monitor the behavior of malware. To avoid being found, malware may load DLLs in memory and overwrite their bytes.
Bypass Windows File Protection F0004.007 Malware bypasses Windows file protection.
Disable Code Integrity F0004.009 Malware disables Code Integrity driver.

Use in Malware

Name Date Method Description
WebCobra 2018 -- Loads ntdll.dll and user32.dll as data files in memory and overwrites the first 8 bytes of those functions, which unhooks the APIs. [1]
DNSChanger 2011 -- Prevents the infected system from installing anti-virus software updates. [2]

References

[1] https://securingtomorrow.mcafee.com/other-blogs/mcafee-labs/webcobra-malware-uses-victims-computers-to-mine-cryptocurrency/

[2] https://www.huffingtonpost.com/2011/11/09/click-hijack-hackers-online-ad-scam_n_1084497.html

[3] Alexander Adamov, Stealthy WastedLocker: eluding behavior blockers, but not only. Online: https://vblocalhost.com/conference/presentations/stealthy-wastedlocker-eluding-behaviour-blockers-but-not-only/

[4] Carl Petty, Red Canary, 3/3/2020. Online: https://redcanary.com/blog/heavens-gate-technique-on-linux/