Static Analysis
Defender detection
PS C:\Tools\ExpandDefenderSig> Import-Module C:\Tools\ExpandDefenderSig\ExpandDefenderSig.ps1
PS C:\Tools\ExpandDefenderSig> ls "C:\ProgramData\Microsoft\Windows Defender\Definition Updates\{50326593-AC5A-4EB5-A3F0-047A75D1470C}\mpavbase.vdm" | Expand-DefenderAVSignatureDB -OutputFileName mpavbase.raw
Directory: C:\Tools\ExpandDefenderSig
Mode LastWriteTime Length Name
---- ------------- ------ ----
-a---- 4/9/2024 12:50 PM 79092299 mpavbase.raw
PS C:\Tools\ExpandDefenderSig> C:\Tools\Strings\strings64.exe .\mpavbase.raw | Select-String -Pattern "WNcry@2ol7"
WNcry@2ol7d
WNcry@2ol7DefenderCheck
AmsiScanner
Powershell scripts - AMSITrigger
Bypass
Approches for EvasionXOR Encryption



AES Encryption




Basic Bypass

Reverse the string
Other methods:
Simple obfuscation:
String manipulation
Obfuscation
C# Obfuscation
Command Line Obfuscation
Powershell Obfuscation
x64 binaries
Packers
Sandbox check
Payload Delivery
Change Signature
Metasploit Payload
IEX Blocked

Other Tools
ToolsPayload CreationInteresting Books
Interesting BooksResources
Last updated
