SnitchSlayer is a windows kernel mode rootkit with many functionalities.
Its main objective is making the snitches (Antiviruses/EDRs) shut up or kill them.
- Process (and Protected Process) killing by:
- Terminating with
ZwTerminateProcess. - Crashing them by compromising the PEB.
- Unmapping them from memory
- Terminating with
- Kernel Callbacks removal.
- Removal of process creation kernel callbacks.
- Removal of Thread creation kernel callbacks.
- Removal of image Loading kernel callbacks.
- Removal of Registry operation kernel callbacks.
- Removal of Object operations kernel callbacks.
- Removal of MiniFilter kernel callbacks.
- Elevate a User Mode process via Token stealing.
- Downgrading a process token.
- PPL bypass via chaning its eprocess structure.
- Hiding a UserMode process from processes linked list.
- Hiding kernel driver from drivers linked list.
- Disabling Windows Threat Intelligence kernel mode ETW provider
Right now it is not implements as a single executable so the driver needs to be loaded manually.
sc create sh type=Kernel binPath=<path_to_KerSnitch.sys>sc start sh
.\SnitchHater.exehelpto display all functionalities and commands
Improving Object/Registry kernel callbacks removal.Implementing MiniFilter kernel callbacks removal.Switching to offset finding through PDB files downloaded at runtime.- Implementing more Function resolving at Runtime (Like ZwTerminateProcess).
- Implementing Credential Guard bypass for LSASS dump.
Disabling kernel Mode ETW providers (Done, but only Windows Thread Intelligence).- Implementing driver loading at runtime from resources instead of manually loading with sc.exe.
- disabling user mode ETW providers for a process (idk inject a dll on that process or create a remote thread idk).
I do not condone abusing this. This is just for research purpose only.
Also is the first time i write windows kernel driver so it may(and for sure has) have many instabilities leading to BSOD so don't use it in ur malware campaign, its useless.
I will not explain how to load an unsigned kernel driver.
thanks to https://github.com/gmh5225/PDB-EasyPdb/ for the offset resolving with pdb
