www.itfunk.orgwww.itfunk.orgwww.itfunk.org
  • Home
  • Tech News
    Tech NewsShow More
    Under the Hood of Microsoft’s May 2025 Patch Tuesday: The CLFS and WinSock Problem Microsoft Can’t Seem to Fix
    7 Min Read
    The Hidden Sabotage: How Malicious Go Modules Quietly Crashed Linux Systems
    6 Min Read
    Agentic AI: The Next Frontier in Cybersecurity Defense and Risk​
    5 Min Read
    Cybersecurity CEO Arrested for Allegedly Installing Malware on Hospital Computers: A Stark Reminder of Insider Threats
    8 Min Read
    Cybercriminals Hijack Google’s Reputation
    7 Min Read
  • Cyber Threats
    • Malware
    • Ransomware
    • Trojans
    • Adware
    • Browser Hijackers
    • Mac Malware
    • Android Threats
    • iPhone Threats
    • Potentially Unwanted Programs (PUPs)
    • Online Scams
    • Microsoft CVE Vulnerabilities
  • How To Guides
    How To GuidesShow More
    Tasksche.exe Malware
    Nviqri Someq Utils Unwanted Application
    4 Min Read
    How to Deal With Rbx.fund Scam
    4 Min Read
    How to Jailbreak DeepSeek: Unlocking AI Without Restrictions
    4 Min Read
    Why Streaming Services Geo-Restrict Content?
    10 Min Read
  • Product Reviews
    • Hardware
    • Software
  • IT/Cybersecurity Best Practices
    IT/Cybersecurity Best PracticesShow More
    Under the Hood of Microsoft’s May 2025 Patch Tuesday: The CLFS and WinSock Problem Microsoft Can’t Seem to Fix
    7 Min Read
    Affordable Endpoint Protection Platforms (EPP) for Small Businesses
    5 Min Read
    Outlaw Malware: A Persistent Threat Exploiting Linux Servers
    4 Min Read
    CVE-2024-48248: Critical NAKIVO Backup & Replication Flaw Actively Exploited—Patch Immediately
    6 Min Read
    How to Jailbreak DeepSeek: Unlocking AI Without Restrictions
    4 Min Read
  • FREE SCAN
  • Cybersecurity for Business
Search
  • ABOUT US
  • TERMS AND SERVICES
  • SITEMAP
  • CONTACT US
© 2023 ITFunk.org. All Rights Reserved.
Reading: A Deep Dive Into Malicious Direct Syscall Detection
Share
Notification Show More
Font ResizerAa
www.itfunk.orgwww.itfunk.org
Font ResizerAa
  • Tech News
  • How To Guides
  • Cyber Threats
  • Product Reviews
  • Cybersecurity for Business
  • Free Scan
Search
  • Home
  • Tech News
  • Cyber Threats
    • Malware
    • Ransomware
    • Trojans
    • Adware
    • Browser Hijackers
    • Mac Malware
    • Android Threats
    • iPhone Threats
    • Potentially Unwanted Programs (PUPs)
    • Online Scams
  • How To Guides
  • Product Reviews
    • Hardware
    • Software
  • IT/Cybersecurity Best Practices
  • Cybersecurity for Business
  • FREE SCAN
Follow US
  • ABOUT US
  • TERMS AND SERVICES
  • SITEMAP
  • CONTACT US
© 2023 ITFunk.org All Rights Reserved.
www.itfunk.org > Blog > Cybersecurity for Business > A Deep Dive Into Malicious Direct Syscall Detection
Cybersecurity for Business

A Deep Dive Into Malicious Direct Syscall Detection

How Cortex XDR’s Analytics Engine Detects Malicious Direct Syscalls

ITFunk Research
Last updated: March 4, 2025 6:29 pm
ITFunk Research
Share
A Deep Dive Into Malicious Direct Syscall Detection
SHARE

Background

Endpoint Detection and Response (EDR) solutions have become essential in modern cybersecurity, providing constant monitoring of an organization’s endpoints—computers and servers. These tools track and analyze endpoint data, helping identify and mitigate threats in real-time. However, as cyberattacks grow more sophisticated, attackers are constantly finding ways to bypass or evade EDR monitoring.

Contents
BackgroundWindows System Call FlowHow Most EDRs Monitor API CallsHow Attackers Bypass Most EDRsCortex XDR and Direct Syscall DetectionAre Direct Syscalls Malicious?How Cortex XDR’s Analytics Engine Detects Malicious Direct SyscallsReal-Life Example – Lumma StealerConclusionCybersecurity for Business

A major vulnerability for many EDR solutions is their reliance on monitoring API calls, which track process actions on endpoints. To avoid detection, attackers often turn to one of the most effective evasion techniques: direct syscalls.

This post will explain the mechanism behind direct syscalls, how attackers use them to bypass EDRs, and how Cortex XDR’s kernel-mode monitoring is able to detect these stealthy attacks.

Windows System Call Flow

Before discussing direct syscalls, it’s important to understand how a typical system call (syscall) works in Windows.

A system call is an instruction that allows a user-mode application to request a service from the kernel, such as interacting with hardware, reading a file, or sending data over a network. Syscalls are initiated by invoking functions found in system libraries, such as ntdll.dll or win32u.dll.

In a conventional Windows syscall flow:

  1. A user-mode application makes a call to a high-level API like CreateFileW in kernel32.dll.
  2. This API function calls a lower-level function in kernelbase.dll.
  3. Eventually, the syscall reaches the Native API NtCreateFile in ntdll.dll, where the actual syscall takes place.

This process involves a system call stub that executes the syscall instruction, which then communicates with the kernel to perform the requested task.

How Most EDRs Monitor API Calls

Most EDR solutions monitor system calls and API calls by hooking into the Windows DLLs. One common technique is inline hooking, which intercepts calls to certain functions. Inline hooking modifies the prologue of functions like CreateFileW to redirect execution to an EDR proxy function. This proxy can then analyze or block the operation.

For example, the inline hook might redirect the execution flow from CreateFileW to an EDR function, which in turn calls the original function and allows the EDR to monitor the action.

How Attackers Bypass Most EDRs

Although EDR solutions effectively use inline hooking to monitor API calls, attackers have found ways to bypass these hooks. Many EDR bypass techniques involve manipulating the user-mode hooks that EDRs rely on, such as:

  1. Manual DLL Loading: Attackers can load a clean, unhooked DLL by using Reflective DLL Loading. This bypasses the EDR hooks by loading the DLL directly into memory, avoiding the hooks installed by EDRs.
  2. Cloning DLLs: By copying a hooked DLL to a new location and loading it under a different name, attackers can avoid detection since the EDR does not hook the new DLL.
  3. Direct Syscall: The most effective and stealthy technique is the direct syscall. By bypassing the user-mode hooks entirely, attackers can invoke syscalls directly from their own code, preventing the EDR from monitoring these actions. Instead of going through the Windows API and ntdll.dll, attackers implement the syscall directly in their application using the appropriate syscall index. In this case, attackers call the syscall instruction with the correct index and parameters, transferring control directly to the kernel for execution. This makes it much harder for EDRs to detect malicious behavior.

Cortex XDR and Direct Syscall Detection

Unlike most EDR solutions, Cortex XDR employs kernel-mode syscall interception, which provides deeper visibility and greater resistance to user-mode hook bypass techniques. Cortex XDR uses the KTRAP_FRAME structure, which saves the state of the system during a syscall, including user-mode context and registers. This allows Cortex XDR to track syscalls directly from the kernel, even when the user-mode hooks are bypassed.

For each intercepted syscall, Cortex XDR extracts the RIP (return instruction pointer) from the KTRAP_FRAME and resolves it to the corresponding user-mode module using a component called ImageTracker. If the return address is not associated with ntdll.dll or win32u.dll (as is the case with direct syscalls), Cortex XDR flags the event and investigates further.

Are Direct Syscalls Malicious?

While direct syscalls can indeed be a sign of malicious activity, they are not inherently malicious. Legitimate software, including security products, gaming anti-cheat software, and Chromium-based applications, also use direct syscalls for legitimate purposes. This makes it difficult to differentiate between benign and malicious uses of direct syscalls based on individual events.

How Cortex XDR’s Analytics Engine Detects Malicious Direct Syscalls

To address the challenge of distinguishing legitimate from malicious direct syscalls, Cortex XDR employs its Analytics Engine. This learning mechanism aggregates real-time data from Cortex XDR agents to establish baselines for “normal” behavior. The engine uses these baselines to detect anomalous activity that deviates from established patterns.

The Analytics Engine answers key questions such as:

  • How common is this direct syscall for the current environment?
  • Is this process known to execute direct syscalls regularly?
  • How often does a specific memory location trigger a direct syscall?

By analyzing these behaviors and aggregating local and global data, the Analytics Engine can detect unusual or malicious behavior with high confidence.

Real-Life Example – Lumma Stealer

A great example of how Cortex XDR detects direct syscalls in action is the Lumma Stealer malware. Lumma Stealer, an info-stealing tool, targets cryptocurrency wallets and 2FA browser extensions. Once executed, it loads shellcode into the mshtml.dll library and directly invokes system calls by exploiting direct syscall techniques. The malware uses the ntdll.dll library to extract the correct syscall index and then performs its attack by bypassing EDR monitoring.

Cortex XDR, using its advanced syscall detection and Analytics Engine, was able to flag the unusual behavior triggered by Lumma Stealer’s direct syscalls, enabling swift detection and response.

Conclusion

Direct syscalls represent a potent technique for attackers aiming to bypass traditional EDR solutions. By operating at the kernel level and avoiding user-mode hooks, they remain hidden from many monitoring tools. However, with Cortex XDR’s kernel-mode syscall detection and the power of the Analytics Engine, malicious direct syscalls can be detected even when conventional EDR methods fail. By leveraging advanced techniques such as KTRAP_FRAME analysis and real-time behavior profiling, Cortex XDR ensures that threats like Lumma Stealer are swiftly identified and neutralized.

For organizations looking to bolster their defenses against increasingly sophisticated attacks, embracing solutions that provide visibility at the kernel level, like Cortex XDR, is a critical step.


Cybersecurity for Business

Your business faces constantly evolving cyber threats that can jeopardize sensitive data, disrupt operations, and damage your reputation. Our cybersecurity for business solutions are tailored to meet the unique challenges of companies of all sizes, providing robust protection against malware, phishing, ransomware, and more.

Whether you’re a small startup or a large enterprise, we offer multi-license cybersecurity packages that ensure seamless protection for your entire team, across all devices. With advanced features like real-time threat monitoring, endpoint security, and secure data encryption, you can focus on growing your business while we handle your digital security needs.

Get a Free Quote Today! Safeguard your business with affordable and scalable solutions. Contact us now to request a free quote for multi-license cybersecurity packages designed to keep your company safe and compliant. Don’t wait—protect your business before threats strike!

Get Your Quote Here

You Might Also Like

PKI Management Systems: A Business Guide to Secure Digital Identities
DevSecOps Integration: Embedding Security into Your Development Pipeline
Endpoint Threat Detection: Safeguarding Business Devices from Cyber Threats
How a Log Correlation Engine Enhances Business Cybersecurity
DNS Filtering Solutions: A Critical Layer of Business Cybersecurity
TAGGED:advanced persistent threatsAPI call interceptionattack detectionbehavioral threat protectionCortex XDRcybersecurity evasion methodscybersecurity threat detectiondirect syscall analyticsdirect syscall detectiondirect syscallsEDR bypass techniquesEDR solutionsendpoint monitoringendpoint securityinline hookingkernel mode detectionLumma Stealermalicious behavior analyticsmalicious syscall detectionmalware analysisMalware Detectionsecurity analyticssecurity best practicesshellcode detectionsyscall bypasssyscall indexsyscall monitoringsystem call monitoringthreat actor evasionthreat intelligencethreat mitigationWindows securityWindows syscall flow

Sign Up For Daily Newsletter

Be keep up! Get the latest breaking news delivered straight to your inbox.
By signing up, you agree to our Terms of Use and acknowledge the data practices in our Privacy Policy. You may unsubscribe at any time.
Share This Article
Facebook Copy Link Print
Share
Previous Article How to Jailbreak DeepSeek: Unlocking AI Without Restrictions
Next Article Remove Caveqn App
Leave a Comment

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Scan Your System for Malware

Don’t leave your system unprotected. Download SpyHunter today for free, and scan your device for malware, scams, or any other potential threats. Stay Protected!

Download SpyHunter 5
Download SpyHunter for Mac
✅ Free Scan Available • ⭐ Catches malware instantly
//

Check in Daily for the best technology and Cybersecurity based content on the internet.

Quick Link

  • ABOUT US
  • TERMS AND SERVICES
  • SITEMAP
  • CONTACT US

Support

Sign Up for Our Newesletter

Subscribe to our newsletter to get our newest articles instantly!

 

www.itfunk.orgwww.itfunk.org
© 2023 www.itfunk.org. All Rights Reserved.
  • ABOUT US
  • TERMS AND SERVICES
  • SITEMAP
  • CONTACT US
Welcome Back!

Sign in to your account

Username or Email Address
Password

Lost your password?