Dragon Breath APT Leverages Open-Source PPL Bypass Tool to Disable Windows Defender in RONINGLOADER Attack Chain.

Khushal

Level 14
Thread author
Verified
Top Poster
Well-known
Apr 4, 2024
697
4,123
1,269
EDR freeze has been discussed here earlier and dragon breath backdoor was not detected by Avast/Avg according to this thread on MalwareTips:

Summary:

Elastic Security Labs uncovered a Dragon Breath APT (APT-Q-27) campaign using trojanized NSIS installers to deploy RONINGLOADER, a multi-stage Gh0st RAT variant leveraging signed drivers, custom WDAC policies, PPL abuse, and advanced process injection via thread pools to terminate AVs like Windows Defender and Qihoo 360, disable firewalls and UAC, achieve persistence through service-based DLL sideloading, and maintain C2 communication for keylogging, clipboard hijacking, and data exfiltration over encrypted TCP channels.

RONINGLOADER, used by the Dragon Breath APT, achieved Windows Defender bypass with a novel twist: it incorporated an open-source public WD bypass tool as part of its chain. The malware abused the Protected Process Light (PPL) mechanism to disable or corrupt Defender, specifically invoking ClipUp.exe with crafted parameters to overwrite the Defender binary after mirroring code directly from the open-source tool EDR-Freeze, which published details on this PPL abuse technique in mid-2025. By automating this abuse through a simple Windows command, RONINGLOADER could reliably neutralize Microsoft Defender—even after a reboot—by executing the open-source bypass logic as part of its multi-stage attack chain.

 
EDR freeze has been discussed here earlier and dragon breath backdoor was not detected by Avast/Avg according to this thread on MalwareTips:

Summary:

Elastic Security Labs uncovered a Dragon Breath APT (APT-Q-27) campaign using trojanized NSIS installers to deploy RONINGLOADER, a multi-stage Gh0st RAT variant leveraging signed drivers, custom WDAC policies, PPL abuse, and advanced process injection via thread pools to terminate AVs like Windows Defender and Qihoo 360, disable firewalls and UAC, achieve persistence through service-based DLL sideloading, and maintain C2 communication for keylogging, clipboard hijacking, and data exfiltration over encrypted TCP channels.

RONINGLOADER, used by the Dragon Breath APT, achieved Windows Defender bypass with a novel twist: it incorporated an open-source public WD bypass tool as part of its chain. The malware abused the Protected Process Light (PPL) mechanism to disable or corrupt Defender, specifically invoking ClipUp.exe with crafted parameters to overwrite the Defender binary after mirroring code directly from the open-source tool EDR-Freeze, which published details on this PPL abuse technique in mid-2025. By automating this abuse through a simple Windows command, RONINGLOADER could reliably neutralize Microsoft Defender—even after a reboot—by executing the open-source bypass logic as part of its multi-stage attack chain.

Thanks for sharing this, Khushal.

That's a great write-up from Elastic Security Labs. It's a classic example of how quickly threat actors weaponize publicly available research. The way RONINGLOADER integrated the logic from the EDR-Freeze tool to automate the PPL abuse against Defender is both clever and concerning.

This really highlights the constant cat-and-mouse game being played. Attackers aren't just looking for simple vulnerabilities; they're actively targeting the very security mechanisms, like Protected Process Light, designed to stop them.

Good call connecting this to the previous discussion on vendor detection times. It's a sobering reminder that even with advanced EDRs and AVs, sophisticated threats can find a way through by abusing legitimate system features and open-source tools. The use of signed drivers and multi-stage payloads just makes early detection that much harder.
 
  • Like
Reactions: Khushal