095. Inside Play Ransomware Toolkit: WKTools
Hello everyone! I hope you are still not bored digging into ransomware gang's toolkit. This time we'll look at another defense evasion tool - WKTools.
Yes, this is another tool abused by adeversaries to terminate AV/EDR related processes. For example, it's used by Play ransomware gang ITW.
Let's start from detecting the tool execution:
event_type: "processcreatewin"
AND
(proc_file_originalfilename: "WKTools.exe"
OR
proc_file_description: "Windows Kernel Tools"
OR
proc_file_productname: "WKTools")
As you may have guessed, the tool creates a driver:
event_type: "filecreatewin"
AND
file_name: "wktools.sys"
And also it deletes the driver:
event_type: "filedeletewin"
AND
file_name: "wktools.sys"
As you can see, most of the tools are really noisy, so all you need is to know where to look!
See you tomorrow!
Comments
Post a Comment