095. Inside Play Ransomware Toolkit: WKTools

Hello everyone! I hope you are still not bored digging into ransomware gang's toolkit. This time we'll look at another defense evasion tool - WKTools

Yes, this is another tool abused by adeversaries to terminate AV/EDR related processes. For example, it's used by Play ransomware gang ITW.

Let's start from detecting the tool execution:

event_type: "processcreatewin"

AND

(proc_file_originalfilename: "WKTools.exe"

OR

proc_file_description: "Windows Kernel Tools"

OR

proc_file_productname: "WKTools")

As you may have guessed, the tool creates a driver:

event_type: "filecreatewin"

AND

file_name: "wktools.sys"

And also it deletes the driver:

event_type: "filedeletewin"

AND

file_name: "wktools.sys"

As you can see, most of the tools are really noisy, so all you need is to know where to look!

See you tomorrow!

Comments

Popular posts from this blog

033. Free Google Threat Intelligence Course

082. Huniting for Malicious Browser Extensions

001. The Zeltser Challenge