Created the Friday 08 May 2020. Updated 2 years, 4 months ago.
The Windows Operating System has inconsistencies in how it determines process image
FILE_OBJECT locations, which impacts non-EDR (Endpoint Detection and Response) Endpoint Security Solution’s (such as Microsoft Defender Realtime Protection), ability to detect the correct binaries loaded in malicious processes.
This inconsistency has led to develop a new post-exploitation evasion technique called “Process Reimaging”. This technique is equivalent in impact to Process Hollowing or Process Doppelganging within the Mitre Attack Defense Evasion Category; however, it is much easier to execute as it requires no code injection.
While this bypass has been successfully tested against current versions of Microsoft Windows and Defender, it is highly likely that the bypass will work on any endpoint security vendor or product implementing the APIs discussed below.