<?xml version="1.0" encoding="utf-8" standalone="yes"?><rss version="2.0" xmlns:atom="http://www.w3.org/2005/Atom" xmlns:content="http://purl.org/rss/1.0/modules/content/"><channel><title>SentinelOne — CraftedSignal Threat Feed</title><link>https://feed.craftedsignal.io/products/sentinelone/</link><description>Trending threats, MITRE ATT&amp;CK coverage, and detection metadata — refreshed continuously.</description><generator>Hugo</generator><language>en</language><managingEditor>hello@craftedsignal.io</managingEditor><webMaster>hello@craftedsignal.io</webMaster><lastBuildDate>Wed, 03 Jan 2024 12:00:00 +0000</lastBuildDate><atom:link href="https://feed.craftedsignal.io/products/sentinelone/feed.xml" rel="self" type="application/rss+xml"/><item><title>EDRSilencer Execution Detected</title><link>https://feed.craftedsignal.io/briefs/2024-01-edrsilencer/</link><pubDate>Wed, 03 Jan 2024 12:00:00 +0000</pubDate><author>hello@craftedsignal.io</author><guid isPermaLink="true">https://feed.craftedsignal.io/briefs/2024-01-edrsilencer/</guid><description>The EDRSilencer tool is designed to block outbound traffic of EDR processes by leveraging Windows Filtering Platform (WFP) APIs to evade endpoint defenses.</description><content:encoded><![CDATA[<p>EDRSilencer is a custom, publicly available tool inspired by the FireBlock tool from MdSec NightHawk. It blocks outbound traffic of running Endpoint Detection and Response (EDR) processes using Windows Filtering Platform (WFP) APIs. This allows attackers to potentially disable or degrade EDR functionality, hindering detection and response capabilities. The tool searches for running EDR processes and applies WFP filters to block outbound traffic, adding filters for specific processes, and removing filters either individually or globally. A custom implementation avoids file handle access issues with EDR processes by bypassing the CreateFileW API. While the tool supports a wide range of EDRs like Microsoft Defender, Carbon Black, and SentinelOne, defenders should test this detection against the EDR solutions in their environment. EDRSilencer has been tested on Windows 10 and Windows Server 2016.</p>
<h2 id="attack-chain">Attack Chain</h2>
<ol>
<li>An attacker gains initial access to a system, potentially through phishing or exploiting a vulnerability.</li>
<li>The attacker uploads or transfers the EDRSilencer tool (EDRSilencer.exe) to the compromised system.</li>
<li>The attacker executes EDRSilencer.exe with administrative privileges.</li>
<li>EDRSilencer enumerates running processes to identify target EDR solutions (e.g., Microsoft Defender, Carbon Black, SentinelOne).</li>
<li>The tool utilizes WFP APIs to create filters that block outbound network traffic for the identified EDR processes.</li>
<li>These filters prevent the EDR from communicating with its command-and-control infrastructure, hindering its ability to send alerts or receive updates.</li>
<li>The attacker performs malicious activities without EDR interference, such as lateral movement or data exfiltration.</li>
<li>The attacker may remove the filters or the tool to avoid detection after completing their objectives.</li>
</ol>
<h2 id="impact">Impact</h2>
<p>A successful EDRSilencer attack can significantly impair an organization&rsquo;s security posture. By blocking the outbound traffic of EDR solutions, attackers can operate with reduced visibility and detection. This can lead to delayed incident response, increased dwell time, and greater potential for data breaches, ransomware deployment, and other malicious activities. The tool has the potential to impact a wide range of organizations using affected EDR products on Windows endpoints.</p>
<h2 id="recommendation">Recommendation</h2>
<ul>
<li>Deploy the Sigma rules provided in this brief to your SIEM to detect EDRSilencer execution and tune them for your environment.</li>
<li>Monitor process execution logs (Sysmon Event ID 1 or Windows Event Log Security 4688) for the execution of <code>EDRSilencer.exe</code> or processes containing &ldquo;*blockedr *&rdquo; in their command line (as defined in the Sigma rules).</li>
<li>Implement network segmentation to limit the impact of a compromised endpoint.</li>
<li>Regularly review and update EDR configurations to ensure they are resilient against tampering.</li>
<li>Investigate any alerts related to unexpected modifications to Windows Filtering Platform (WFP) rules.</li>
<li>Enable Sysmon process creation logging to activate the rules above.</li>
</ul>
]]></content:encoded><category domain="severity">high</category><category domain="type">advisory</category><category>edr</category><category>defense-evasion</category><category>windows</category></item></channel></rss>