New Update Defender Hardening Console Executable

An unsigned binary containing the string "Defender" in its name is a textbook heuristic trigger. It falls under "Social Engineering" or "Impersonation" rules. Most EDRs (Endpoint Detection and Response) would typically block this execution immediately simply because it attempts to occupy a trusted namespace without a certificate. The reason "only a few AVs blocked it" is likely because it falls into the "Greyware" or "Potentially Unwanted Program" (PUP) category. It is not self-replicating malware (a virus), it is a tool that requires a user to click buttons to do damage. Many AV engines hesitate to block "Administrative Tools" unless they are widely abused.
 
Detection by Microsoft has been cleared.

IMG_3367.jpeg
 
New version has been pushed and it has been uploaded to MS proactively.

In this new version there are minimal changes to the application, the changes are mainly to the cloud backend.

Reputation-based detections have now been integrated.
Example: Helios:Malware!Rep1, Rep2 and Rep3.

These deterministic detections have been implemented to reduce false positives and allow certain heuristics to be less aggressive.

Due to the updated cloud backend, older versions of the application will fall back to local heuristics but won't be able to use the AI or reputation lookup.

 
Planned for the next update:

Exclusions analysis will go local. My tests show that currently the exclusions analysis is quite straightforward. To make the application more private (even though data is not stored), this analysis will be handled by heuristics and not AI. This will also reduce the processing time.

EULA addition: this will be necessary to improve the application legitimacy. It will only have to be accepted once and never again.

Cleanup script/tool: although I’ve went quite gentle on storage and there are no writes to registry whatsoever, there are some files and folders created. Fortunately, that’s quite straightforward too and easy to cleanup. I can do an executable as well, your feedback here would be appreciated.

Botnet IoC: currently the application uses heuristics to detect botnet activity (which is actually better to spot 0 days).
The next version will enable cloud botnet lookup.

Scan profile: now that reputation analysis has been integrated, 2 profiles will appear under scan.
One will detect only known malicious connections and files (suitable as second-opinion scanner), whilst the other one will enable the aggressive heuristics (suitable to be ran on heavily infected systems or when there are clear signs of infection).
The scan profile explanations will be added to the UI.
 
New version has been pushed and it has been uploaded to MS proactively.

In this new version there are minimal changes to the application, the changes are mainly to the cloud backend.

Reputation-based detections have now been integrated.
Example: Helios:Malware!Rep1, Rep2 and Rep3.

These deterministic detections have been implemented to reduce false positives and allow certain heuristics to be less aggressive.

Due to the updated cloud backend, older versions of the application will fall back to local heuristics but won't be able to use the AI or reputation lookup.

Uploading to MS proactively was a great thing to do, no warning when downloading through Edge and no detection by MS Defender anymore (y)

The Helios Quick Scan has a false positive, msdtc.exe:
1768157355994.png
 
Uploading to MS proactively was a great thing to do, no warning when downloading through Edge and no detection by MS Defender anymore (y)

The Helios Quick Scan has a false positive, msdtc.exe:
View attachment 294599
This is probably a detection of the malicious LOLBin control feature.

Just so you know, Helios does not delete critical system files as part of remediation.

These processes have been deemed suspicious based on command line analysis, so remediation merely terminates them.

Anyway, I will review whether it is worth including MSDTC service at all in the protected LOLBin space.
 
New version has been pushed and it has been uploaded to Microsoft. It may take a bit of time for them to process.

Huorong and Rising promised to clear the detection and it looks like they have created a stable exclusion.

McAfee responded that they will clear the detection and it's been done. Microsoft exclusion is unstable and linked to the version info. When I change the version info strings, the detection reappears. I've not yet received response from ClamAV/Cisco.

-Refined user interface, fixed an issue where it appeared cropped on lower resolution screens
-Added EULA
-Added scan profiles
-Removed the initial loading state. Now even on machines where the Defender State can't be pulled, the application loads and allows scan to be ran.
-Exclusion analysis now local

 
New version has been pushed and it has been uploaded to Microsoft. It may take a bit of time for them to process.

Huorong and Rising promised to clear the detection and it looks like they have created a stable exclusion.

McAfee responded that they will clear the detection and it's been done. Microsoft exclusion is unstable and linked to the version info. When I change the version info strings, the detection reappears. I've not yet received response from ClamAV/Cisco.

-Refined user interface, fixed an issue where it appeared cropped on lower resolution screens
-Added EULA
-Added scan profiles
-Removed the initial loading state. Now even on machines where the Defender State can't be pulled, the application loads and allows scan to be ran.
-Exclusion analysis now local

New executable is now blocked by Smart App Control 😅
 
New executable is now blocked by Smart App Control 😅
No idea, on the submission portal, the progress of the detection moved like this:

First, it detected Program:Acapew.A!ml
The executable was dissected with the entire composition (.text, _rdata, pdata and so on scanned individually).

Right now, the detection changed from Acapew to Wacatac.h however on every section, it displays “an analyst has determined that this file is normal. It does not exhibit malicious or unwanted behaviour”. Soon, the detection will disappear completely till I change the about info again…

This is the exhausting path of all devs with security software 😆
 
This is one of the cases where Helios will help.

Example: malicious HTA file is not detected by Defender.
Hash: 24ef77b150ff7ebc30d8cb7234fd2cec8a15a58128e8e2441e259b7d3de1e66c

Defender alone would not handle this malware.

Protections: MSHTA is blocked from accessing the web anyway, through Deep Firewall Control.

The script sets persistence.

Response:
1768242502852.png



Remediation terminates the process, deletes the persistence and the initial script (I will update the UI so it doesn't display "Quarantine" but "Process" and displays information what will happen on remediation.

Helios combines expertise in fileless and evasive malware detection with reputation from different providers on executables.
 
This is one of the cases where Helios will help.

Example: malicious HTA file is not detected by Defender.
Hash: 24ef77b150ff7ebc30d8cb7234fd2cec8a15a58128e8e2441e259b7d3de1e66c

Defender alone would not handle this malware.

Protections: MSHTA is blocked from accessing the web anyway, through Deep Firewall Control.

The script sets persistence.

Response:
View attachment 294617


Remediation terminates the process, deletes the persistence and the initial script (I will update the UI so it doesn't display "Quarantine" but "Process" and displays information what will happen on remediation.

Helios combines expertise in fileless and evasive malware detection with reputation from different providers on executables.
MSHTA appears as an infected file not a victim
 
  • Like
Reactions: Trident