Skip to content

Latest commit

 

History

History
40 lines (20 loc) · 1.32 KB

T1036.md

File metadata and controls

40 lines (20 loc) · 1.32 KB

T1036 - Masquerading

Adversaries may attempt to manipulate features of their artifacts to make them appear legitimate or benign to users and/or security tools. Masquerading occurs when the name or location of an object, legitimate or malicious, is manipulated or abused for the sake of evading defenses and observation. This may include manipulating file metadata, tricking users into misidentifying the file type, and giving legitimate task or service names.

Renaming abusable system utilities to evade security monitoring is also a form of Masquerading.(Citation: LOLBAS Main Site)

Atomic Tests


Atomic Test #1 - System File Copied to Unusual Location

It may be suspicious seeing a file copy of an EXE in System32 or SysWOW64 to a non-system directory or executing from a non-system directory.

Supported Platforms: Windows

Attack Commands: Run with command_prompt!

copy %WINDIR%\System32\cmd.exe /Y %ALLUSERSPROFILE%\cmd.exe
start %ALLUSERSPROFILE%\cmd.exe

Cleanup Commands:

del %ALLUSERSPROFILE%\cmd.exe >nul 2>&1