Quantcast
Channel: Anti-* – Hexacorn
Browsing all 88 articles
Browse latest View live

Using LastSystemRITEventTickCount as a (lame) antisandbox trick

LastSystemRITEventTickCount is a member of a _KUSER_SHARED_DATA structure. If you google for this particular field’s description you will eventually find sth along these lines: Time in tick count for...

View Article



Using race conditions as an antisandbox trick

I have had this idea for a while and today I finally implemented it. My implementation is pretty lame and only affects those monitoring solutions that rely on hooking or […]

View Article

Enter Sandbox – part 10: Removable devices & clickbait file names

Infection of removable drives is an old trick and no point explaining what it is. What is interesting though is looking at creativity of guys who leverage this infection vector and not […]

View Article

Beyond good ol’ Run key, Part 33

There is a secret place in almost every organization utilizing Microsoft Outlook where malware can hide. Persistently. The pros: no one checks it. The cons: there is no API to […]

View Article

Heaven’s gate and a chameleon code (x86/64)

A so-called heaven’s gate is not only a built-in feature of a 64-bit Windows, but also a neat reversing trick. It can be used (and is) by malware authors to […]

View Article


AutoIt3 nested dolls

I recently came across a post on Twitter referring to an AutoIt3 sample that apparently could not be decompiled using Exe2Aut and myAuToExe. It triggered my interest. It turns out […]

View Article

AntiEDR – Samples targeting EDR (Endpoint Detection and Response) solutions

I have recently came across an non-intriguing intriguing sample belonging to a family of applications commonly known as a PUA/PUP (Potentially Unwanted Application/Program). The ‘intriguing’ part is...

View Article

IME code injection (old)

I like clever and unusual tricks that are meant to fool sandboxes or evade malware analysis (and fool researchers). One of the very first one I came across many years […]

View Article


Detecting Wine via internal and legacy APIs

Many malicious samples try to detect sandbox environment and to do so they use an avalanche of tricks that are either generic (f.ex. checking a number of processors) or very […]

View Article


Returning the call –‘moshi moshi’, the API way (a.k.a. API cold calling)

Software development is quite easy today. There is no longer a need to write your own libraries for everything (a mouse handler, a proprietary database, a graphics library, or your […]

View Article

rEDRoviruses – Whether you’re a AV or whether you’re a EDR, You’re stayin’...

EDR software is so hot right now. While AV is mainly focused on badness and silent detections/reputation analysis, the EDR solutions log everything. Sooner or later this ‘everything’ will cause […]

View Article

A few ideas to mess around with threat hunting, and EDR software (anti-threat...

I just came back from holidays and since time off it’s usually a great time to make your brain run idle, it often turns it into a bit more creative […]

View Article

Shellcode. I’ll Call you back.

Many malicious wrappers and position-independent payloads (especially based on AutoIT, and VB) attempt to use various techniques to execute the main payload evading the curious eyes of security...

View Article


Running programs via Proxy & jumping on a EDR-bypass trampoline

The parent-child process relationship is very helpful when it comes to defining detection rules and watchlists. For instance, anytime a winword.exe spawns a cmd.exe, powershell.exe, cscript.exe,...

View Article

If memory doesn’t serve me right…

Update One more item from @JamesHabben: One situation I frequently face is determining IIV for malware from months to years before. Memory analysis is useless for that. Old post I […]

View Article


Beyond good ol’ Run key, Part 64

I recently updated my ‘collect all cool persistence mechanism described elsewhere’ post. After I announced it on Twitter, 3gstudent replied with one more link – one that led to his […]

View Article

The Wizard of X – Oppa PlugX style

Xwizard is an ‘Extensible wizard host process’. While I am not 100% sure what it is doing I know for certain that – whatever it is – PlugX guys would […]

View Article


Beyond good ol’ Run key, Part 65

Looking for new ways to load code persistently I had a quick glance at Java. While it may not be present on all systems, it’s out there on at least […]

View Article

Running programs via Proxy & jumping on a EDR-bypass trampoline, Part 2

Update After my post Zod contacted me with this mike-dropping link: Ultimate AppLocker ByPass List. Really lots of good stuff there! Thx Zod! Old Post In the first part I […]

View Article

Beyond good ol’ Run key, Part 66

I discussed Winsock-based persistence in the past. There is one more. It is a bit unusual, as it has to do with automatic proxy configuration, so it’s a bit tricky […]

View Article
Browsing all 88 articles
Browse latest View live




Latest Images