

Kimsuky Hackers Leveraging RDP and Microsoft Office Flaws in Precision Cyber Attacks – Active IOCs
April 21, 2025
Gafgyt aka Bashlite Malware – Active IOCs
April 22, 2025
Kimsuky Hackers Leveraging RDP and Microsoft Office Flaws in Precision Cyber Attacks – Active IOCs
April 21, 2025
Gafgyt aka Bashlite Malware – Active IOCs
April 22, 2025Severity
High
Analysis Summary
A critical vulnerability in Windows Defender Application Control (WDAC) has emerged, revealing how attackers can exploit Microsoft’s own WinDbg Preview tool to bypass strict security controls. Despite robust WDAC policies that block unsigned executables, DLLs, and common living-off-the-land binaries (LOLBins).
Researchers discovered that access to the Microsoft Store allows installation of trusted but powerful tools like WinDbg Preview (WinDbgX.exe), which Microsoft’s default WDAC blocklist fails to include. This oversight creates a significant attack vector even in tightly controlled environments.
The attack technique involves converting malicious shellcode into a format executable by WinDbg using a custom Python script. The attacker leverages the .foreach and eb commands in WinDbg to load shellcode byte-by-byte into memory. Subsequently, WinDbg’s scripting capabilities are used to manipulate CPU register states and set up API calls required for classic remote process injection. These include OpenProcess, VirtualAllocEx, WriteProcessMemory, and CreateRemoteThread, all orchestrated using legitimate commands like r and eq to emulate a full 64-bit calling convention.
What makes this bypass particularly alarming is the abuse of a signed Microsoft tool—WinDbg Preview—to perform malicious activity without triggering security alerts. The underlying use of SetThreadContext() by WinDbg Preview, a function often flagged when used by unknown software, goes unnoticed here due to the tool’s trusted status. This technique illustrates how attackers can repurpose legitimate applications in ways security products may not anticipate.
To mitigate this threat, experts strongly recommend disabling the Microsoft Store in secured environments, explicitly adding WinDbgX.exe to WDAC blocklists, and closely monitoring for suspicious uses of SetThreadContext()—especially when invoked by debugging tools. This case highlights the evolving nature of application control evasion and the necessity of continuously reviewing and updating security baselines, especially as threat actors increasingly weaponize legitimate software.
Impact
- Security Bypass
- Gain Access
Remediation
- Disable the Microsoft Store in all hardened or sensitive environments to prevent installation of potentially exploitable signed tools like WinDbg Preview.
- Explicitly block WinDbgX.exe (WinDbg Preview) in your WDAC policy to close the gap left by Microsoft’s default blocklist.
- Monitor for suspicious usage of SetThreadContext(), particularly when invoked by trusted applications such as debuggers or Microsoft-signed tools.
- Regularly audit and update WDAC policies to ensure newly released tools or applications from trusted sources are evaluated for potential misuse.
- Implement application allowlisting that includes not just executables but also specific capabilities of debugging tools, to reduce the risk of abuse.