Speakers
Synopsis
Typically, we trust what is written to the security logs on Windows servers and workstations to be accurate, even just viewing these logs requires local administrator rights.
More importantly log based detections as well as some Endpoint Detection & Response products will utilize process creation events written to Windows Security to either enrich detections and show an analyst exactly what was run, or they will be part of the detection itself.
Unfortunately, there has existed a technique for some time now which allows an attacker to stop what is really being run on the command line from being logged. This works for process creation logs generated by Windows itself, Sysmon and even Defender XDR Device logs.
This presents attackers with an opportunity to evade some types of detection and if they pair EDR/logging bypass techniques with this technique it makes the job of an analyst trying to deconstruct what has actually occurred.
In certain circumstances an attacker could even change the command to something which occurs often within an environment get basically trick an analyst into thinking certain detections are likely false positives.
In this presentation we will go through the following;
- Understanding how a process log is created under normal circumstances.
- How useful process creation logs can be to analysts and security teams
- Showing how an attacker can use a previously discovered technique to mask the true command which is run.
- A breakdown of the code used to produce the incorrect logs and why this cannot currently be fixed.
- A number of scenarios demonstrating how both logging detections and EDR detections can be impacted by this technique.
Included in this session will be either live demonstration or pre-recorded attack where we can clearly see the malicious commands run and the resultant logs within the Windows system.