September 21, 2025 at 07:33PM

■■■■□ The EDR-Freeze tool is a proof-of-concept exploit that leverages Windows’ built-in components to suspend EDR and antivirus processes into a “coma” state, effectively rendering them inactive without installing any third-party drivers.

Mechanism:

1. MiniDumpWriteDump API: This function, part of the Windows DbgHelp library, is designed to create memory dumps by suspending all threads of a target process.

2. Bypassing PPL Protection: EDR and antivirus processes are typically protected by Protected Process Light (PPL). The tool utilizes WerFaultSecure.exe, a component of the Windows Error Reporting service, which can run with WinTCB level protection, allowing it to interact with these protected processes.

3. Race Condition Attack: After initiating WerFaultSecure.exe to create a memory dump, the tool monitors the target process. Upon detecting that the target process has entered a suspended state, the tool immediately suspends WerFaultSecure.exe. This prevents the completion of the memory dump, leaving the target process in a suspended state indefinitely.

Usage:

Parameters: The tool requires two parameters: the Process ID (PID) of the target process and the duration of the suspension in milliseconds.

Example: On Windows 11 24H2, the tool successfully suspended the MsMpEng.exe process of Windows Defender.

Detection and Mitigation:

Monitoring: Defenders should monitor for unusual executions of WerFaultSecure.exe, especially when targeting sensitive processes like lsass.exe or EDR agents.

Preventive Measures: Implementing tamper protection, maintaining stringent role hygiene in Windows security settings, and ensuring systems are up to date can help mitigate the risk of such attacks.

This technique offers a stealthier alternative to traditional methods like Bring Your Own Vulnerable Driver (BYOVD) attacks, as it does not require introducing vulnerable drivers onto a target system.