[plugin] Add dirty state IoC detection to malfind#1300
Conversation
|
Do you have some Windows 10 samples with the default Defender enabled state to test this? If not, we can run it over some of them soon. |
|
I don't possess any sample infected by this technique, or by malware performing an RWX allocation, shellcode injection and then changing protection back to RX. Sure, it'd be great to have this feature ran over many samples ! |
|
Ok we will run it across our sample set (a couple hundred Windows samples) and report back before/after this patch. |
|
Hi @atcuno, any news on the testing of this feature ? |
|
I'm not sure why this is still failing on the black test. Could you try pushing a trivial commit to it please? I thought they'd resolved the black issues, but this one still seems to be failing the tests... |
|
Awesome, thanks! 5:) |
Hi,
The current
windows.malfindimplementation does not leverage the dirty state indicator to identify potential threats, and filters out non writable VADs. However, some evasion techniques use an elevatedWriteProcessMemorycall to inject data inside remote processesPAGE_EXECUTE_READregions :To identify this behaviour, I edited the malfind code to scan each VAD page with
(R)-Xprotection for any dirty state marker.If necessary, I can develop a PoC + sample (which might come handy for unit tests).
Inspired from Linux #995.