With the constant evolution of cybersecurity threats, organizations rely heavily on Endpoint Detection and Response (EDR) systems as a defense layer against malware and cyberattacks. However, an emerging tool, EDRSilencer, is specifically designed to bypass EDR systems, allowing malicious actors to evade detection and persist within networks. Originally intended for red team operations, EDRSilencer has now been appropriated by threat actors, posing a significant challenge to endpoint security.
What is EDRSilencer?
EDRSilencer is a sophisticated tool developed to disable or block EDR systems from reporting alerts back to their management servers. It operates by leveraging the Windows Filtering Platform (WFP), a set of network traffic control mechanisms used by Windows to manage inbound and outbound traffic at various levels. By blocking EDR traffic, EDRSilencer effectively stops EDR tools from relaying telemetry data, which is crucial for threat detection and response.

Key Features of EDRSilencer
Dynamic EDR Detection: EDRSilencer can detect multiple EDR solutions and block specific traffic to prevent detection.
Network Traffic Interference: Using WFP, it obstructs communication from specific processes associated with EDR software.
Scalability: Its latest version can silence up to 16 major EDR solutions, including Microsoft Defender, SentinelOne, FortiEDR, and Palo Alto Networks Cortex XDR.
With these capabilities, EDRSilencer enables attackers to hide malware, effectively silencing alarms that would typically trigger incident response actions.
How EDRSilencer Evades Detection
At its core, EDRSilencer uses the Windows Filtering Platform (WFP), a feature of the Windows operating system that provides API support for developers to create advanced network filtering tools. WFP allows EDRSilencer to interact with system traffic at various layers, effectively intercepting and filtering communications related to specific EDR processes.
EDRSilencer begins by identifying active EDR processes. This is achieved by scanning system memory for specific executables known to belong to major EDR solutions. It leverages a preconfigured list of target EDR process names and executable paths. This list includes, but isn’t limited to:
MsMpEng.exe for Microsoft Defender
SentinelAgent.exe for SentinelOne
cb.exe for Carbon Black EDR
Once these processes are identified, EDRSilencer attaches to them using Windows API calls to monitor their activity and identify critical network connections that should be intercepted.
WFP’s flexibility allows EDRSilencer to establish rules at various layers, such as IP filtering. The tool creates rules that:
Block outbound communications: Specifically targeting telemetry data and alert packets.
By intercepting and blocking traffic here, EDRSilencer prevents alerts from reaching the EDR console, rendering the endpoint’s defenses largely ineffective.
To ensure long-term evasion, EDRSilencer employs persistence tactics, often involving modifications to registry keys associated with network and process configurations. It may also set custom firewall rules that persist across reboots, ensuring that even if the system is restarted, telemetry from EDR systems remains blocked.
Specific Implementation Steps
Use of WFP API for Filtering: WFP provides a set of APIs that enable EDRSilencer to dynamically adjust filters for different types of network traffic. Here’s a breakdown of how it’s implemented:
The tool makes calls to the FWPM_FILTER API to create filters on identified EDR-related processes.
It then leverages FWPM_SUBLAYER to define specific protocol levels, such as HTTP or TCP/UDP packets, ensuring all relevant traffic is filtered. These API calls are wrapped in functions within EDRSilencer that dynamically create, delete, or modify filter rules, making it adaptive to different network environments.
Injection into EDR Processes: EDRSilencer sometimes injects its payload into existing EDR processes, enabling it to intercept network communications directly at the source. By injecting code, it can directly monitor network I/O, adjusting filtering rules in real-time based on detected communications patterns.
Example: Blocking Microsoft Defender
To block telemetry from Microsoft Defender, EDRSilencer might set up filters targeting MsMpEng.exe specifically. Here’s a step-by-step look at how this is implemented:
Identify Process by Name: EDRSilencer searches system memory for processes with the executable name MsMpEng.exe.
Set Up WFP Filter:
Using the WFP API, it creates a custom FWPM_FILTER rule that intercepts all outbound packets from MsMpEng.exe with destination IP addresses associated with Microsoft’s Defender servers. This effectively silences any alerts Defender would send to its console.
Create a Persistent Rule:
To ensure persistence, EDRSilencer saves the filtering rule within the FWPM_LAYER_STREAM_V4 and FWPM_LAYER_STREAM_V6 layers. These filters block all IPv4 and IPv6 packets from the Defender process, ensuring all telemetry channels are covered.
Challenges Posed by EDRSilencer to EDR Vendors
EDRSilencer has prompted EDR vendors to revisit the robustness of their solutions. Traditional EDR systems may need to adopt multi-channel alerting capabilities, ensuring that even if network communications are blocked, alerts can still be transmitted through alternative pathways. Additionally, security providers are encouraged to integrate out-of-band monitoring features that continuously assess system integrity even when mainline telemetry is disrupted.
As EDRSilencer highlights the evolving sophistication of tools that aim to bypass endpoint security, it’s clear that reliance on EDR alone is insufficient. Organizations need to adopt multi-layered security architectures that include behavioral analysis, regular threat hunting, and network segmentation to stay resilient against advanced evasion tools.
As the cybersecurity landscape continues to evolve, staying informed on tools like EDRSilencer is essential. Through continuous monitoring and adapting to new threats, organizations can bolster their defenses against even the most stealthy adversaries.
Happy cyber-exploration! 🚀🔒
Note: Feel free to drop your thoughts in the comments below - whether it's feedback, a topic you'd love to see covered, or just to say hi! Don’t forget to join the forum for more engaging discussions and stay updated with the latest blog posts. Let’s keep the conversation going and make cybersecurity a community effort!
-AJ
Comentarios