Bypassing Endpoint Detection and Response: The EDR-Freeze Technique
In the realm of cybersecurity, the cat-and-mouse game between threat actors and security professionals is ever-evolving. One alarming trend is the emergence of sophisticated bypass techniques for Endpoint Detection and Response (EDR) systems. Recently, a new exploit known as EDR-Freeze has been unveiled, showcasing a novel approach that could give threat actors an edge in evading security measures.
Understanding EDR and Its Vulnerabilities
EDR technologies are designed to monitor, detect, and respond to threats on endpoints. However, they face constant challenges from malicious groups seeking ways to evade detection. Traditional methods often involve Bring Your Own Vulnerable Driver (BYOVD) techniques where attackers must install specific vulnerable drivers to disable security features. This approach poses risks and can create instability on monitored machines.
Introducing EDR-Freeze
The EDR-Freeze exploit represents a significant shift. It operates using native Windows functionalities rather than relying on external drivers. Specifically, the method leverages Windows Error Reporting and the MiniDumpWriteDump function to effectively put antivirus processes to sleep. What sets EDR-Freeze apart is that it can all be accomplished in user mode without the need for any third-party tools, making it more accessible for cybercriminals.
Technical Breakdown of the EDR-Freeze Method
The foundation of the EDR-Freeze technique lies in the MiniDumpWriteDump function, part of the Windows DbgHelp library. This function is typically used for troubleshooting by creating a minidump of a process, which suspends all active threads in the target process. The rationale behind this suspension is to maintain data integrity—if threads were allowed to modify memory during the dump, it could lead to inconsistencies or corruption.
The Challenges Encountered
Implementing this technique was not without hurdles. The primary challenges included the rapid execution speed of MiniDumpWriteDump, which complicated the timing of the suspension, and the fact that many EDR and antivirus processes are safeguarded using Protected Process Light (PPL). To overcome these obstacles, the researcher behind EDR-Freeze reverse-engineered the WerFaultSecure program, enabling the use of MiniDumpWriteDump on any destination process required.
Coordinating Processes for Success
The combination of tools and strategies was essential. By utilizing CreateProcessAsPPL, the researcher could start WerFaultSecure with the necessary protection. This setup allowed for flexibility when filling in parameters to perform the dump on antivirus processes. Once the target process was suspended, a key privilege, PROCESS_SUSPEND_RESUME, could be employed to indefinitely suspend WerFaultSecure itself.
A Race Condition Attack Strategy
EDR-Freeze exploits a race condition attack, which consists of four sequential steps:
- Initialization: Run WerFaultSecure with PPL protection.
- Parameter Configuration: Set up the parameters to initiate the dump of the target process.
- Suspension Check: Monitor the target process until it achieves a suspended state.
- Final Suspension: Utilize OpenProcess and NtSuspendProcess to suspend WerFaultSecure.
The researcher has even shared a tool on GitHub to facilitate this exploit, showcasing the alarming accessibility of such techniques.
The Implications of EDR-Freeze
The significance of EDR-Freeze extends beyond just another bypass method. It addresses the inherent weakness found in the BYOVD technique, which necessitates the use of drivers with known vulnerabilities. This new exploit demonstrates how attackers can manipulate existing Windows functionalities to control EDR and antimalware processes—determining when they function and when they are temporarily incapacitated.
Conclusion
As cybersecurity measures continue to grow in sophistication, so too do the tactics employed by those seeking to undermine them. EDR-Freeze serves as a stark reminder that even widely trusted operating system functions can be weaponized. The cybersecurity community must remain vigilant, adapting continually to these emerging threats while reinforcing defenses against evolving techniques.


