So I started testing the new EDR beta functions on my local machine and have been having the following false positives. It go so bad it even prevented me from starting the Automate Control Center on my machine, and I had to uninstall and roll back to normal.
'DynamicShellcode' exploit prevented in LTClient
'DynamicShellcode' exploit prevented in LTTray
No ammount of exceptions fixes this, as the PID and Detection ID change every time. I've included the raw data for the LT Client issue, but wasn't sure who to give this too.
itigation DynamicShellcode Timestamp 2020-06-03T15:01:10 Platform 10.0.18362/x64 v321 6f_02 PID 34160 Application C:\Program Files (x86)\LabTech Client\LTClient.exe Created 2020-05-13T22:43:46 Modified 2020-05-13T22:43:46 Description LTClient 3.0 Shellcode (HHA) (0x00060000 bytes) Owner of CALLER: (anonymous; clr.dll) OwnerModule Name clr.dll Thumbprint 7a33ad00e22a53d91dd1a6f097fd37d9c8a9cd3bd512070eb7ce988aaf722733 SHA-256 8c9899bf565c54bc2ee2fa11edf9b6840f44de77f1ecb050623f7560c7bfa807 SHA-1 1fb0ebc06f188e57f410cb2961d891ddbb314880 MD5 4853b707346cfb69b2052b9a00ae55b6 09AE44F8 ffd2 CALL EDX 09AE44FA c6460801 MOV BYTE [ESI+0x8], 0x1 09AE44FE 833d4820da7300 CMP DWORD [0x73da2048], 0x0 09AE4505 7407 JZ 0x9ae450e 09AE4507 50 PUSH EAX 09AE4508 e8737dc369 CALL 0x7371c280 09AE450D 58 POP EAX 09AE450E c745e800000000 MOV DWORD [EBP-0x18], 0x0 09AE4515 8bf8 MOV EDI, EAX 09AE4517 e8a49cb969 CALL 0x7367e1c0 09AE451C 8bc7 MOV EAX, EDI 09AE451E 8b7ddc MOV EDI, [EBP-0x24] 09AE4521 897e0c MOV [ESI+0xc], EDI 09AE4524 8d65f4 LEA ESP, [EBP-0xc] 09AE4527 5b POP EBX 09AE4528 5e POP ESI ----- SNIP HERE ----- AAMFAQBArgn4RK4JAACuCQBQAADkBQQAi/DotKG5aYvGi3XYiXcMjWX0W15fXcMFBACQIpoHBQQAiCKaB9CWpwdXVovxuTiWpwfoivB4+I14BIPGGLk4BQMA86VeX8MFAgCoIpoHBQQAoCKaBwCWpweLQTjDBRgAAgUDAOi7sLhpXgUCAAydpwcFBAD0AwUAAAUAAAUAAAX2ALAimgcMnacHVYvsV1ZTg+wgiUXwZIs1KA4FAgDHRdik/WZzx0XUSED3+YtGDIlF3Ilt7MdF6AUEAI1F2IlGDIvZi/qLTfDoLfXEaYtF8ItAFIsQ/3UI/3UMV1PHReAQBQMAiWXkx0Xo+kSuCcZGCAD/0sZGCAGDPUgg2nMAdAdQ6HN9w2lYx0XoBQQAi/jopJy5aYvHi33ciX4MjWX0W15fXcIIBQAABQAABQAABQAABQAABQAABQAABQAABQAABQAABdMA ----- END SNIP ----- Loaded Modules ----------------------------------------------------------------------------- 003F0000-01DDE000 LTClient.exe (), version: 75310000-75410000 hmpalert.dll (SurfRight B.V.), version: 3.7.17.317 75110000-7514E000 SOPHOS~1.DLL (Sophos Limited), version: 10.8.7.1000 6FF60000-709B5000 System.ni.dll (Microsoft Corporation), version: 4.8.4001.0 built by: NET48REL1LAST_C 5D3E0000-5D583000 System.Drawing.ni.dll (Microsoft Corporation), version: 4.8.3752.0 built by: NET48REL1 5A9A0000-5B806000 System.Windows.Forms.ni.dll (Microsoft Corporation), version: 4.8.4150.0 built by: NET48REL1LAST_C 6F1E0000-6F9F8000 System.Core.ni.dll (Microsoft Corporation), version: 4.8.4180.0 built by: NET48REL1LAST_B 5BED0000-5C2EB000 WindowsBase.ni.dll (Microsoft Corporation), version: 4.8.4180.0 built by: NET48REL1LAST_B 60130000-6025F000 CefSharp.Core.dll (), version: 57.0.0 0FC60000-13D73000 libcef.dll (), version: 3.2987.1601.gf035232 76E70000-76E7D000 UMPDC.dll (), version: 600B0000-60124000 chrome_elf.dll (The Chromium Authors), version: 57.0.2987.133 70BF0000-70CF5000 System.Configuration.ni.dll (Microsoft Corporation), version: 4.8.3752.0 built by: NET48REL1 6EA60000-6F1D4000 System.Xml.ni.dll (Microsoft Corporation), version: 4.8.3752.0 built by: NET48REL1 59C10000-5A84C000 PresentationCore.ni.dll (Microsoft Corporation), version: 4.8.4180.0 built by: NET48REL1LAST_B 57940000-58D25000 PresentationFramework.ni.dll (), version: 575F0000-577F3000 System.Xaml.ni.dll (Microsoft Corporation), version: 4.8.4180.0 built by: NET48REL1LAST_B 60060000-600A7000 System.Numerics.ni.dll (Microsoft Corporation), version: 4.8.3752.0 built by: NET48REL1 70DF0000-70F68000 SophosAmsiProvider.dll (Sophos Limited), version: 1.3.237.0 Process Trace 1 C:\Program Files (x86)\LabTech Client\LTClient.exe [34160] 2 C:\Windows\explorer.exe [10504] 3 C:\Windows\System32\userinit.exe [10316] 4 C:\Windows\System32\winlogon.exe [104] winlogon.exe 5 C:\Windows\System32\smss.exe [920] \SystemRoot\System32\smss.exe 000000e8 00000084 6 C:\Windows\System32\smss.exe [608] \SystemRoot\System32\smss.exe Thumbprint 54ce4109bfd09310394331cd311a82ceb4b7b83e540307f4289f3cda924688a1 Module based thumbprint 7a33ad00e22a53d91dd1a6f097fd37d9c8a9cd3bd512070eb7ce988aaf722733