Skip to content

Latest commit

 

History

History
36 lines (19 loc) · 2.13 KB

README.md

File metadata and controls

36 lines (19 loc) · 2.13 KB

Workshop of An unexpected journey into Microsoft Defender's signature World

Workshop Abstract

Adversary emulation activities are becoming increasingly common, aiming to closely mimic real attacks. However, the levels of similarity vary significantly depending on the tools used and the TTPs implemented by the red team.

In this workshop, we will explore various degrees of similarity, leading up to the so-called false flag. Using Defender as a case study, we will analyze the signature format used by a specific threat actor. Our goal is to create sample parts that match certain signatures, ultimately resulting in fully functioning samples that match groups of signatures.

Defender employs various types of signatures, and in our analysis, approximately a quarter of them, totaling around 294,000 signatures, can trigger specific detections.

Furthermore, we'll demonstrate how to automatically generate fake PE files that mimic real threats, utilizing selected detection rules derived from the original signature bytes and we will end up having a working implant that triggers specific detection. To achieve this, reverse engineering of the original implant is necessary.

Don't miss out on this opportunity to gain valuable insights into Windows Defender's signature detection mechanisms and to increase the world's entropy!

This is the link to the schedule at Recon:

Description of the material

Here is the material for the workshop.

https://www.virustotal.com/gui/file/ffde53857435dbea42dbfb9494518c656ba9da4193b8e3ece47e553535280cf1

  • The test-DarbyA-text.zip contains a file that tringgers the detection on defender but it is not a malware. The password is infected anyway

Conferences