LBRY Block Explorer

LBRY Claims • black-hat-usa-2018-windows-offender

544404994910510acbb5b5e7dd6a5dff6ba18862

Published By
Created On
2 Sep 2020 12:00:05 UTC
Transaction ID
Cost
Safe for Work
Free
Yes
Black Hat USA 2018 - Windows Offender Reverse Engineering Windows Defender's Antivirus Emulator
Windows Defender's mpengine.dll implements the core of Defender antivirus' functionality in an enormous ~11 MB, 45,000+ function DLL.

In this presentation, we'll look at Defender's emulator for analysis of potentially malicious Windows PE binaries on the endpoint. To the best of my knowledge, there has never been a conference talk or publication on reverse engineering the internals of any antivirus binary emulator before.

I'll cover a range of topics including emulator internals (bytecode to intermediate language lifting and execution; memory management; Windows API emulation; NT kernel emulation; file system and registry emulation; integration with Defender's antivirus features; the virtual environment; etc.), how I built custom tooling to assist in reverse engineering and attacking the emulator; tricks that malicious binaries can use to evade or subvert analysis; and attack surface within the emulator. I'll share code that I used to instrument Defender and IDA scripts that can be helpful in reverse engineering it.
...
https://www.youtube.com/watch?v=LvW68czaEGs
Author
Content Type
Unspecified
video/mp4
Language
Unspecified
Open in LBRY

More from the publisher

Controlling
VIDEO
CONSO
Controlling
VIDEO
32C3
Controlling
VIDEO
DEF C
Controlling
VIDEO
31C3
Controlling
VIDEO
BLACK
Controlling
VIDEO
BLACK
Controlling
VIDEO
DEFCO
Controlling
VIDEO
DEF C
Controlling
VIDEO
31C3