- malware
- endpoint-compromise
- process-hollowing
- evasion-techniques
windows-11- sentinelone
Windows Endpoint Compromised by Sophisticated Malware Using Advanced Evasion Techniques
A Windows 11 laptop belonging to user_1 was compromised by sophisticated malware employing process hollowing, code injection, and memory manipulation. SentinelOne detected a multi-stage attack chain initiated by a malicious JavaScript file, with the threat marked as not mitigated and the agent pending uninstallation.
Time and cost estimates are based on a Tier-2 SOC analyst model and actual investigation telemetry. Individual results vary by analyst experience, tooling, and environment.
Initial Signal
SentinelOne detected a malicious JavaScript file `[CUSTOM_DIR_2].js` (SHA256: 971d9ee3bee06292fa255e169dfb10b4a4644819cd774562198f7e178eb79ad4) executing on Windows 11 laptop ws-001 belonging to user_1. The detection maps to MITRE technique T1547.001 (Registry Run Keys / Startup Folder), though the actual attack chain demonstrates broader evasion capabilities.
The specific artifact that triggered investigation was a multi-stage execution chain: wscript.exe launched the JavaScript file, which spawned `[CUSTOM_DIR_2].com`, which then created and executed `RegAsm.exe` in non-standard locations within the user's AppData directory. What made this signal significant was not just the presence of these processes, but the behavioral indicators accompanying them—process hollowing, function unhooking, and remote memory allocation—all hallmarks of deliberate adversarial evasion rather than legitimate application behavior.
SentinelOne's behavioral analysis identified 13 related threat events within the execution chain, revealing a coordinated attack designed to bypass endpoint detection. The investigation correlated data from SentinelOne, IPData, VirusTotal, and Microsoft Entra ID across 47 invocations, completing autonomous analysis in 4m 50s and establishing a clear timeline of compromise.
How We Reached the Verdict
The agent considered each plausible alternative verdict and ruled them out one at a time. Each card below lists the hypothesis tested, the evidence weighed, and the dismissal rationale.
Could this be an account compromise?
Ruled out[CUSTOM_DIR_2].jsCould this be a false positive?
Ruled outCould this be an account compromise attempt?
Ruled outCould this be a policy violation?
Ruled outEvidence Gathered
The agent queried these data sources during the investigation. Each entry shows what was checked, what came back, and the methodology behind the query.
[CUSTOM_DIR_2].js' (SHA256: 971d9ee3bee06292fa255e169dfb10b4a4644819cd774562198f7e178eb79ad4) as malicious on laptop ws-001 belonging to user 'user_1'wscript.exe running [CUSTOM_DIR_2].js, which launched [CUSTOM_DIR_2].com, which then created and executed RegAsm.exe in non-standard locationsRegAsm.exe was copied to non-standard locations (C:\Users\user_1\AppData\Local\[CUSTOM_DIR_1]\) and executed, a common technique for living off the land[EXTERNAL_IP_1], which is a residential ISP connection in Montevideo, Uruguayws-001) with SentinelOne agent marked for pending uninstallationFalse Positive Analysis
The agent ran these validation checks to confirm the verdict isn't a false positive.
- fp1Verified the malicious nature of the execution chain fromPass
wscript.exeto[CUSTOM_DIR_2].js to[CUSTOM_DIR_2].com toRegAsm.exein non-standard locations - fp2Analyzed the behavioral indicators for legitimate explanationsPass
- fp3Evaluated whether the activity could be explained by legitimate softwarePass
- fp4Checked for system maintenance or updates that could explain the behaviorPass
Detection Opportunities
The high-fidelity detection signals from this investigation, sanitized for general use. Each MITRE ID links to the official technique reference.
| Technique | Tactic | Context |
|---|---|---|
T1059.007JavaScript Execution | Execution | Flag wscript.exe or cscript.exe executing JavaScript files from user-writable directories, particularly AppData or Temp folders. Alert on JavaScript files smaller than 500 bytes that spawn child processes or perform memory operations. Monitor for .js files with suspicious naming patterns that mimic legitimate applications or system utilities. |
T1055.012Process Hollowing | Defense Evasion | Detect process creation followed immediately by remote memory allocation and memory protect operations targeting the same process. Alert on legitimate system binaries like RegAsm.exe being created in non-standard locations (outside C:\Windows and C:\Program Files) and subsequently executing with memory manipulation indicators. Monitor for sequences of VirtualAllocEx, WriteProcessMemory, and SetThreadContext API calls. |
T1547.001Registry Run Keys / Startup Folder | Persistence | Monitor for regedit.exe or reg.exe importing .reg files from non-standard directories or user-writable paths. Alert on bulk modifications to HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Run or similar persistence locations when initiated by processes running from AppData. Flag attempts to register DLLs as password filters or accessibility hooks through registry operations. |
T1036.003Masquerading: Rename System Utilities | Defense Evasion | Detect copies of legitimate Windows utilities (RegAsm.exe, rundll32.exe, certutil.exe) being created in non-standard locations, especially user AppData directories. Alert on these utilities being executed from paths outside their original Windows System32 location. Monitor for process execution chains where legitimate binaries are spawned by suspicious parent processes or scripts. |
Verdict Reasoning
The verdict of Compromised at high confidence rests on the following mutually corroborating signals:
1. SentinelOne detected a malicious JavaScript file with a specific SHA256 hash (971d9ee3bee06292fa255e169dfb10b4a4644819cd774562198f7e178eb79ad4) executing on the endpoint, confirmed through multiple threat event records showing the file's presence and execution context
2. A complete multi-stage execution chain was reconstructed from wscript.exe → JavaScript file → [CUSTOM_DIR_2].com → RegAsm.exe, with each stage documented in SentinelOne's process telemetry and threat event logs
3. Advanced evasion techniques including process hollowing, function unhooking, and remote memory allocation were detected as behavioral indicators, techniques that are rarely present in legitimate software and are characteristic of sophisticated malware
4. The malware copied legitimate Windows utilities (RegAsm.exe) to non-standard locations (C:\Users\user_1\AppData\Local\[CUSTOM_DIR_1]\), a living-off-the-land technique used to evade file-based detection
5. No contradictory evidence emerged from Microsoft Entra ID sign-in logs, VirusTotal reputation checks, or IPData geolocation analysis that would suggest a false positive or benign explanation. The confidence is High rather than Confirmed because the SentinelOne agent is marked as pending uninstallation, which could affect ongoing monitoring and remediation capabilities if not addressed immediately
Lessons
- 01Pending uninstallation status masks active compromise. In this investigation, the SentinelOne agent was marked for pending uninstallation while actively detecting and reporting malware. The agent remained functional and generated 13 threat events documenting the attack chain. However, if the uninstallation had proceeded before remediation, the endpoint would have lost all endpoint detection and response capabilities mid-incident. Always verify the status and timeline of agent uninstallations against active threat detections. Ensure remediation is complete before removing security tooling.
- 02Small file size does not indicate benign intent. The malicious JavaScript file
[CUSTOM_DIR_2].js was only 180 bytes, yet it successfully initiated a multi-stage attack chain involving process hollowing and memory injection. Attackers often minimize file size to evade file-based detection and reduce storage footprint. Do not dismiss small scripts as harmless; correlate file size with execution context, parent process, and behavioral indicators like memory operations and process creation. - 03Legitimate binary location is the strongest detection signal.
RegAsm.exeexecuting fromC:\Users\user_1\AppData\Local\[CUSTOM_DIR_1]\ was the clearest indicator of compromise in this chain. System utilities copied to user directories almost never occur in legitimate scenarios. Implement detection rules that flag execution of known Windows binaries from paths outside their standard System32 or Program Files locations, regardless of digital signature status. - 04Behavioral indicators matter more than file reputation. The malware's file hash had no VirusTotal detections at the time of analysis, yet SentinelOne's behavioral detection identified process hollowing, function unhooking, and remote memory allocation—all malicious indicators. File reputation systems lag behind sophisticated malware. Prioritize behavioral analysis and process chain reconstruction over hash-based verdicts when investigating suspicious execution.
- 05Absence of cloud sign-in activity does not rule out compromise. Microsoft Entra ID logs showed no suspicious sign-in activity from the malware's originating IP address, which initially appeared to exonerate the endpoint. However, the endpoint itself was clearly compromised. Malware may not immediately attempt cloud credential theft or lateral movement. Investigate endpoint compromise independently of cloud authentication logs; they answer different questions about the scope of an incident.