TTPwire Vol. 1 · MITRE ATT&CK·Tagged

← All stories

Huntress

Detecting Malicious Security Product Bypass Techniques

2025-05-23 · Read original ↗

ATT&CK techniques detected

8 predictions
T1055.001Dynamic-link Library Injection
99%
“eid 8 ). a couple of things to keep in mind : - the process injection technique can change ( from a classic dll injection to another process injection technique ). - defendnot is using taskmgr as its target process, but there could be a different target process. figure 9 : other …”
T1055.001Dynamic-link Library Injection
99%
“lengths to reverse engineer and replicate these wsc signature checks. this work yielded a list of potential binaries that, if injected into, would pass these stringent validation routines. defendnot, as implemented, hardcodes taskmgr. exe ( windows task manager ) as its designate…”
T1055.001Dynamic-link Library Injection
98%
“standalone process to operating within the context of a legitimate windows system component, providing both privilege elevation and evasion capabilities. sigma rule : taskmgr child process of defendnot figure 8 : sysmon event id 7 - taskmgr load event once successfully injected i…”
T1055.001Dynamic-link Library Injection
94%
“of robustness applied to defendnot now let ’ s look at some of the specific sources that can be used to detect the various characteristics, artifacts left behind, and techniques used by the tool. defendnot detection methods and sources with host - based event robustness levels ap…”
T1055.001Dynamic-link Library Injection
94%
“analyzing command - line parameters to determine its operational configuration. during this phase, defendnot generates a context file ( ctx. bin ) containing configuration data or encrypted payloads necessary for subsequent injection activities. this transition from execution to …”
T1053.005Scheduled Task
85%
“as a legitimate security product. av registration acceptance wsc accepts registration ( fake av registered ) the windows security center processes the fraudulent registration request and accepts it as a legitimate security product ( av ). this acceptance marks a critical transiti…”
T1106Native API
46%
“apis intended for use by legitimate security vendors can be reverse - engineered and exploited. the techniques used by defendnot — particularly the process injection into trusted windows processes and interaction with undocumented apis — highlight the need for defense - in - dept…”
T1055.001Dynamic-link Library Injection
37%
“##a takedown notice. the original iteration reportedly reused code from existing commercial antivirus solutions. in contrast, defendnot was rebuilt from scratch, a testament to direct reverse engineering of windows security center ( wsc ) component object model ( com ) methods. t…”

Summary

"defendnot" bypasses Windows Defender using undocumented APIs. Learn detection strategies and robust defenses against this sophisticated evasion technique.