Imagine antivirus software suddenly stops running. That would be frightening, right? This is precisely what a new tool called EDR Freeze can do. It performs some unexpected actions by using a component of Windows Error Reporting (WER). When I read about it, I thought, "Wow, you'll be able to do some horrible things with this tool, especially if you are a hacker!"
Here is the key idea:
This is one of those "wow, that's possible?" moments. If you have an antivirus package or EDR, this provides just another way we need to stay updated and monitor unusual Windows activity.
What the heck is EDR Freeze?
EDR Freeze serves as a proof-of-concept tool. This signifies that it demonstrates a technique to obtain anything that you desire but is not something that attackers are currently using in a direct or public manner.Here is the key idea:
- It has the ability to suspend antivirus or security products without the need for special system-level access.
- It takes advantage of a Windows component called "WerFaultSecure," which is typically used for error reporting.
- It also uses a function called MiniDumpWriteDump, which creates snapshots of programs for debugging. This momentarily suspends all threads in the target program.
How EDR Freeze Functions (Simplified Version)
- Initiate WerFaultSecure, which runs with elevated system privileges.
- Direct it to invoke MiniDumpWriteDump against the target security program.
- The security program will be frozen while the dump is written to disk.
- Freeze WerFaultSecure, so that the original program never resumes.
- Therefore, the security program remains frozen.
Why This Is A Concern
Here’s what that means:- The attack is conducted entirely in user mode which means no complex kernel hacks needed.
- It utilizes built-in Windows functionality, so it is less likely that the antivirus will detect it.
- Most traditional attacks rely on the use of risky types of exploitation through drivers with vulnerabilities. Therefore, it's an easier method to perform.
What Can Be Done
Here are some suggestions for prevention:- Be aware of call-outs to WER targeting any antivirus.
- Restrict MiniDumpWriteDump to security personnel only.
- Microsoft may need to update Windows so these utility tools can't be misused or abused.
My Thoughts
I think it's neat, but dangerous. Researchers are demonstrating this to better prepare security teams before attackers use it for real on targets.This is one of those "wow, that's possible?" moments. If you have an antivirus package or EDR, this provides just another way we need to stay updated and monitor unusual Windows activity.