Bypassing Antivirus
With Understanding Comes Ease
Jeff McJunkin, Founder
Rogue Valley Information Security
Introduction and Agenda
Antivirus / Antimalware / EDR’s tools
All of the techniques result in a yes/no decision using “badness” scores
Some strings (such as “Copyright Benjamin Delpy” or “Invoke-Mimikatz”) are suspicious, whereas others (such as “Copyright Microsoft 2020”) are not.
“Next-Gen” Antivirus
But what about machine learning? What about artificial intelligence?
AI is only as smart as it needs to be (finding bad strings)
AMSI
Which Vendors Support
AMSI?
https://github.com/subat0mik/whoamsi
My hot take: if your AV/EDR vendor doesn’t support AMSI, they have no business in this industry, and don’t deserve your money.
Fundamental Limitations of AV
With AV, bots are fighting bots. Unfortunately, attackers can study AV’s behavior, and they take the last move.
Rock ‘Em, Sock ‘Em
Relationship Between False Positives and False Negatives
Commonly discussed in testing theory, but terminology is often used elsewhere (categorization theory, AV/EDR, etc)
Relationship Between False Positives and False Negatives
False Positive: Marking a benign binary (such as Notepad.exe) as malicious
False Negative: Marking a malicious binary (such as Mimikatz.exe) as safe
False Positives cost more than False Negatives, in PR and market share
Brittle Signatures, Demonstrated
“Copyright Benjamin Delpy”: unlikely to have false positives, but all sorts of legitimate software accesses LSASS as well.
DEMO:
Bypassing Static Signatures To Use “Malicious” Binaries
Disadvantages for Security Professionals
Before Tweet After Tweet
Disadvantages for Security Professionals
Security professionals tend to…
Methods of Bypassing Antivirus
In general, avoid fair fights (both against AV and in life)
Example of #1 Approach
Methods of Bypassing Antivirus
Methods of Bypassing Antivirus, Cont.
3. If necessary: Stack the odds in your favor before a fair fight through the following methodology:
Application Control
Application Control: Bypasses
A Better Approach with AV
AV’s own attack surface
Some attributes of AV:
Closing Statement
To prevent successful breaches, defenders need to detect and respond to attackers before they accomplish their goal. Therefore, defenders have two goals:
Prevention is ideal, but it’s impossible to prevent 100% of incidents. Therefore, focus on minimizing, detecting, and accelerating response to incidents.
Questions?
Slides are online at https://bit.ly/bypassingav
Recorded video from WWHF 2020 is here: https://www.youtube.com/watch?v=UO3PjJIiBIE
Follow up questions? jeff@roguevalleyinfosec.com