Skip to content
  • Blog Home
  • Cyber Map
  • About Us – Contact
  • Disclaimer
  • Terms and Rules
  • Privacy Policy
Cyber Web Spider Blog – News

Cyber Web Spider Blog – News

Globe Threat Map provides a real-time, interactive 3D visualization of global cyber threats. Monitor DDoS attacks, malware, and hacking attempts with geo-located arcs on a rotating globe. Stay informed with live logs and archive stats.

  • Home
  • Cyber Map
  • Cyber Security News
  • Security Week News
  • The Hacker News
  • How To?
  • Toggle search form

EDR-Freeze Tool Technical Workings Along With Forensic Artifacts Revealed

Posted on October 13, 2025October 13, 2025 By CWS

A current evaluation from researcher Itamar Hällström has revealed the technical workings and forensic path of “EDR-Freeze,” a proof-of-concept method that briefly disables safety software program.

By abusing reputable Home windows parts, this methodology can place Endpoint Detection and Response (EDR) and antivirus (AV) processes into a short lived, reversible coma, permitting attackers to function undetected.

The EDR-Freeze method cleverly misuses the Home windows Error Reporting (WER) system to attain its aim.

Not like many evasion instruments that depend on bringing a susceptible driver (BYOVD) to realize kernel-level privileges, this methodology operates fully from person mode.

The assault is initiated by the EDR-Freeze device, which launches a reputable, signed Microsoft executable, WerFaultSecure.exe. This helper course of is instructed to generate a minidump of a goal safety course of, similar to Home windows Defender’s MsMpEng.exe.

EDR Freeze Device Targets Safety Course of

A key aspect impact of the minidump creation course of, which leverages DbgHelp’s MiniDumpWriteDump operate, is that it suspends all threads within the goal course of.

The EDR-Freeze device exploits this habits, initiating the dump however holding it in a suspended state for a configurable interval, successfully pausing the EDR with out crashing it.

As soon as the required time elapses, the operation is cleanly aborted, and the safety course of resumes regular operate, leaving minimal traces in customary logs.

Uncovering The Forensic Artifacts

Regardless of its stealthy nature, the EDR-Freeze method leaves behind distinct artifacts in a system’s reminiscence. A forensic investigation of a reminiscence picture can uncover all the chain of occasions.

Evaluation instruments can determine the suspended threads inside the goal EDR course of and correlate their creation occasions with the exercise of the WerFaultSecure.exe helper course of. Investigators may study course of handles, which act as permissions.

Forensic Artifacts

The WerFaultSecure.exe course of will maintain a deal with to the EDR course of with particular entry rights, together with PROCESS_SUSPEND_RESUME, which is a powerful indicator of its objective.

Command-line arguments additionally present essential proof, exhibiting the EDR-Freeze device passing the goal course of ID (PID) to WerFaultSecure.exe.

Moreover, the method creates transient recordsdata, similar to t.txt, throughout its operation. Though these recordsdata are deleted upon completion, their presence in a reminiscence dump serves as a precious forensic lead, Itamar Hällström mentioned.

Detection Methods

Defenders can proactively hunt for this exercise utilizing customized detection guidelines. YARA guidelines have been developed to determine each the EDR-Freeze binary itself and its behavioral patterns in reminiscence.

A binary-focused rule can search for a mix of strings associated to the WerFaultSecure.exe command-line flags and API imports for course of manipulation, similar to CreateFileW and CreateEventW.

A second, behavior-focused rule can scan system reminiscence for a cluster of suspicious indicators, similar to privilege escalation APIs and course of suspension capabilities getting used collectively.

This investigation highlights a vital evolution in attacker tradecraft: as an alternative of killing safety instruments, they’ll merely pause them. This demonstrates that even Protected Course of Gentle (PPL) processes will be manipulated, turning trusted system parts into weapons.

Detecting these assaults requires defenders to maneuver past endpoint alerts and incorporate reminiscence forensics into their incident response workflows.

Observe us on Google Information, LinkedIn, and X for day by day cybersecurity updates. Contact us to characteristic your tales.

Cyber Security News Tags:Artifacts, EDRFreeze, Forensic, Revealed, Technical, Tool, Workings

Post navigation

Previous Post: Happy DOM Vulnerability Exposes 2.7 Million Users To Remote Code Execution Attacks
Next Post: NPM Infrastructure Abused in Phishing Campaign Aimed at Industrial and Electronics Firms

Related Posts

New Wave of Crypto-Hijacking Infects 3,500+ Websites Cyber Security News
Windows Authentication Coercion Attacks Pose Significant Threats to Enterprise Networks Cyber Security News
Russian Vodka Producer Beluga Hit by Ransomware Attack Cyber Security News
COLDRIVER APT Group Uses ClickFix To Deliver a New PowerShell-Based Backdoor BAITSWITCH Cyber Security News
Gunra Ransomware New Linux Variant Runs Up To 100 Encryption Threads With New Partial Encryption Feature Cyber Security News
Ukrainian Networks Launch Massive Brute-Force and Password-Spraying Campaigns Targeting SSL VPN and RDP Systems Cyber Security News

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News

Recent Posts

  • Malicious Code on Unity Website Skims Information From Hundreds of Customers
  • Microsoft Intune MDM and Entra ID Leveraged to Elevate your Trust in Device Identity
  • WhatsApp Worm, Critical CVEs, Oracle 0-Day, Ransomware Cartel & More
  • SonicWall SSL VPN Accounts in Attacker Crosshairs
  • Astaroth Banking Malware Leveraging GitHub to Host Malware Configurations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Archives

  • October 2025
  • September 2025
  • August 2025
  • July 2025
  • June 2025
  • May 2025

Recent Posts

  • Malicious Code on Unity Website Skims Information From Hundreds of Customers
  • Microsoft Intune MDM and Entra ID Leveraged to Elevate your Trust in Device Identity
  • WhatsApp Worm, Critical CVEs, Oracle 0-Day, Ransomware Cartel & More
  • SonicWall SSL VPN Accounts in Attacker Crosshairs
  • Astaroth Banking Malware Leveraging GitHub to Host Malware Configurations

Pages

  • About Us – Contact
  • Disclaimer
  • Privacy Policy
  • Terms and Rules

Categories

  • Cyber Security News
  • How To?
  • Security Week News
  • The Hacker News