MITRE ATT&CK T1036 Masquerading

The Red Report 2024

The Top 10 MITRE ATT&CK Techniques Used by Adversaries


In 2019, Picus Labs analyzed 48813 malware to determine tactics, techniques, and procedures (TTPs) used by adversaries in these malicious files. Picus Labs categorized each observed TTP by utilizing the MITRE ATT&CK® framework. As a result of the present research, 445018 TTPs observed in the last year were mapped to ATT&CK to identify the top 10 most common techniques used by attackers. Our research has found that Masquerading was the fourth most prevalent ATT&CK technique used by adversaries in their malware. 

As a defense evasion technique, adversaries change features of their malicious artifacts with legitimate and trusted ones. Code signatures, names and location of malware files, names of tasks and services are some examples of these features. After masquerading, malicious artifacts of adversaries such as malware files appear legitimate to users and security controls.

In this article, we review:

  • the fundamentals of the Masquerading technique
  • features manipulated by adversaries for Masquerading
  • its use cases by threat actors and malware
  • Red team exercises for this technique


Adversaries masquerade their malicious artifacts, such as malware files and processes, as legitimate software and processes to evade detection by users and security controls.

Masquerading Sub-techniques

1.T1036.001 Invalid Code Signature

Code signing is the process of digitally signing executables to verify the author of the program and guarantee that the code has not been tampered with. In the invalid code signature sub-technique, adversaries copy metadata and code signature information of valid and signed programs and use this information in their malware.

Since a code signature is valid for a specific program, it is not valid for any other programs. Therefore, unlike the Code Signing sub-technique of the T1553 Subvert Trust Controls ATT&CK technique [1], this code signature cloning activity for masquerading will not result in a valid signature. So, although these malware files appear more legitimate to users, security analysts and security controls, they cannot pass digital signature validation.

MetaTwin is an open-source tool that copies metadata and AuthentiCode signature from one file and injects it into another [2]. MetaTwin extracts the resources of a legitimate binary using the Resource Hacker tool [3]. It also extracts the digital signature information of the legitimate binary with the SigThief tool [4]. Then, MetaTwin writes the extracted metadata and digital signature information to a target binary

2. T1036.002 Right-to-Left Override

Right-to-left override (RTLO or RLO) character is a non-printing Unicode character (U+202E) that is used to display the text that follows it in right-to-left order. This special character is used to deal with languages that are written from right-to-left and causes the text that follows it to be displayed in reverse. For example, the file name receiptU+202Etxt.exe will appear on the screen as receiptexe.txt. Users may think that the file is a text file, but it is actually an executable file. As another example, the filename with receiptmcod.txt may be actually receipt\u202Etxt.docm, which is a macro-enabled document file with a U+202e placed just before mcod.txt. Note that this operation only changes the visual appearance of the file name, does not change the actual file name – it still has the extension docm.

This feature (!) is used by adversaries to trick users into opening malware files by showing the file extension as a benign extension instead of executable. This Masquerading sub-technique is commonly used with the Malicious File sub-technique of the T1204 User Execution ATT&CK technique [5] and Spearphishing Attachment sub-technique of the T1566 Phishing ATT&CK technique [6].

Etumbot backdoor malware leverages the Unicode Right-to-Left Override (RLO) technique combined with convincing icons for various types of PDFs or Microsoft Office documents to trick the user into clicking and executing the malware file delivered via spearphishing [7].

As a recent example, an APT group used the RLO technique to disguise an SCR (Windows screensaver) malware as a document file [8]. Adversaries also used a classic Right-to-Left Override attack to trick Telegram users by changing displayed file extension [9]. For example, a JS malware file is renamed as follows: my_photo_U+202Egnp.js Where U+202E is the RLO character to make Telegram display the remaining string gnp.js in reverse, sj.png. Then, the adversary sends the message, and the recipient sees an incoming PNG image file instead of a JS JavaScript file.

RLO/RTLO can be used in the Windows Registry as well. For example, Sirefef malware uses the RLO technique to trick users into believing that the entries  it creates in the registry of the infected machine are legitimate Google update entries [10].

3. T1036.003 Rename System Utilities

Adversaries frequently utilize Windows system utilities in their operations to bypass defensive security controls. Rundll32.exe, cmd.exe, andcertutil.exe are some of these utilities. Because of the increased use of legitimate system utilities by adversaries, security tools may monitor them to detect their suspicious use. To avoid name-based detection, adversaries may rename system utilities. For example, threat actors of Operation Soft Cell changed the name of the cmd.exe as cdm.exe [11]. Korplug malware, which is leveraging the COVID-19 pandemic to spread, is using a renamed certutil.exe - msoia.exe to decode the CAB file [12].

4.T1036.004 Masquerade Task or Service

Adversaries use task and service functionalities of operating systems to facilitate initial or recurring execution of their malicious code [13] [14]. As a part of execution and persistence, malware may create tasks and services to be executed at system startup or repeatedly.

Security controls may quickly detect custom-named tasks and services. Therefore, threat actors masquerade the name of a task/service with the name of a legitimate task/service to make it appear benign and evade detection. Adversaries commonly use identical or similar names of legitimate tasks/services executed by the Windows Task Scheduler, at (Linux and Windows), Windows services, and Linux systemd services.

They may use the name of a Windows service or a legitimate third-party service. For example, ComRAT has used WSqmCons, a name associated with Windows SQM Consolidator [15]. Fin7 has disguised its scheduled tasks as AdobeFlashSync for persistence [16]. In addition to names, adversaries may masquerade descriptions of their tasks/services. For example, Disttrack wiper malware has created a service named ntssrv, with a display name of “Microsoft Network Realtime Inspection Service” and a description of “Helps guard against time change attempts targeting known and newly discovered vulnerabilities in network time protocols” [17].

5. T1036.005 Match Legitimate Name or Location

Adversaries may masquerade names/locations of their artifacts as identical or similar names/locations of legitimate files to evade monitoring and detection. As a recent example, the Tropic Trooper cyberespionage group has used %USERPROFILE%\Documents\Flash\ folder to place its USBferry malware and masquerade its name as flash_en.exe [18]. Threat actors of the Operation In(ter)ception cyberespionage campaign disguised their files and folders by giving them similar names of known software and companies, such as C:\Intel\IntelV.cgi, C:\NVIDIA\NvDaemon.exe, C:\ProgramData\DellTPad\DellTPadRepairexe [19].

Moreover, adversaries change icons of their malware with icons of benign files. As an example, Pony Trojan used a well-known Adobe Reader icon and the filename security or infos to look trustworthy [20].

6. T1036.006 Space after Filename

In macOS, adding a space to the end of a filename will modify how the operating system handles the file with other kinds of files. If an executable Mach-O file is called malware.txt, it will open with the text editing program when double-clicked by a user. So, the executable will not run properly. On the other hand, if the file is renamed as “malware.txt “ (a space added at the end). macOS detects the executable file type and executes the binary when a user double-clicks it.

As an example, OSX / Keydnap backdoor malware was distributed in a zip archive, which contained a binary named “screenshot.jpg“ [21]. Note that the filename contained a space character at its end. Therefore, it would be executed by, and the Keydnap backdoor malware would be run when a user double-clicked it.

Use Cases by Malware and Threat Actors


Threat Actor

Target Industries

Target Geographies

Masquerading Method

Masquerading Subtechnique

OSX.WindTail  [22]


Government, Critical Infrastructure

Middle East

Code-signing with revoked certificates

T1036.001 Invalid Code Signature

Regin [23]


Telecommunication, Government, Finance


Using two fake certificates supposed to belong to Broadcom and Microsoft

T1036.001 Invalid Code Signature


Ke3chang [24]

Aerospace, Defense, High-Tech, Oil, Energy, Government


Using RTLO to cloak .scr and .exe extensions

T1036.002 Right-to-Left Override

Sireref [10]


Using RLO in registry keys to masquerade as Google update entries.

T1036.002 Right-to-Left Override

Korplug [12]


Changing the name of the certutil.exe as msoia.exe

T1036.003 Rename System Utilities


Operation Soft Cell [11]



Changing the name of the cmd.exe as cdm

T1036.003 Rename System Utilities

ComRAT [15]


Government, Military, Defense

US, Europe, Middle East

Using the name of a Windows service

T1036.004 Masquerade Task or Service

Disttrack [17]



Middle East

Using the name and description of a Windows service

T1036.004 Masquerade Task or Service

Pony [20]


Using the Adobe Reader icon

T1036.005 Match Legitimate Name or Location

USBferry [18]

Tropic Trooper

Military, Government, Healthcare, Transportation, High-tech


Using Flash as location and filename

T1036.005 Match Legitimate Name or Location


Operation In(ter)ception [19]

Military, Aerospace

Middle East, Europe

Abusing names of known software and companies

T1036.005 Match Legitimate Name or Location

Keydnap [21]


Masquerading Mach-O executable as a .jpg file

T1036.006 Space after Filename

Red and Blue Team Exercises

1. Rename cmd.exe ( T1036.003 Rename System Utilities)

Red Teaming - How to simulate?

In this test, we will copy cmd.exe as cdm.exe like threat actors of Operation Soft Cell [11]:

C:\WINDOWS\system32>copy C:\WINDOWS\System32\cmd.exe C:\WINDOWS\System32\cdm.exe
       1 file(s) copied

Now, we can use cdm or cdm.exe instead of cmd or cmd.exe.


Blue Teaming - How to detect?

Following Sigma rule can be used to detect the execution of a renamed binary leveraging new Sysmon OriginalFileName datapoint [25].

title: Renamed Binary
id: 36480ae1-a1cb-4eaa-a0d6-29801d7e9142
status: experimental
description: Detects the execution of a renamed binary often used by attackers or malware leveraging new Sysmon OriginalFileName datapoint.
author: Matthew Green - @mgreen27, Ecco, James Pemberton / @4A616D6573, (improvements), Andreas Hunkeler (@Karneades)
date: 2019/06/15
modified: 2019/11/11
    - attack.t1036

    - attack.defense_evasion
   category: process_creation
   product: windows
            - 'cmd.exe'

            - 'powershell.exe'
            - 'powershell_ise.exe'
            - 'psexec.exe'
            'psexec.c'  # old versions of psexec (2016 seen)
            - 'cscript.exe'
            - 'wscript.exe'
            - 'mshta.exe'
            - 'regsvr32.exe'
            - 'wmic.exe'
            - 'certutil.exe'
            - 'rundll32.exe'
            - 'cmstp.exe'
            - 'msiexec.exe'
            - '7z.exe'
            - 'winrar.exe'
            - 'wevtutil.exe'
            - 'net.exe'
            - 'net1.exe'
            - 'netsh.exe'

            - '\cmd.exe'
            - '\powershell.exe'
            - '\powershell_ise.exe'
            - '\psexec.exe'
            - '\psexec64.exe'
            - '\cscript.exe'
            - '\wscript.exe'
            - '\mshta.exe'
            - '\regsvr32.exe'
            - '\wmic.exe'
            - '\certutil.exe'
            - '\rundll32.exe'
            - '\cmstp.exe'
            - '\msiexec.exe'
            - '\7z.exe'
            - '\winrar.exe'
            - '\wevtutil.exe'
            - '\net.exe'
            - '\net1.exe'
            - '\netsh.exe'
   condition: selection and not filter
    - Custom applications use renamed binaries adding slight change to binary name. Typically this is easy to spot and add to whitelist
level: medium

2. Use a task name similar to a Windows service (T1036.004 Masquerade Task or Service)

Red Teaming - How to simulate?

We will test the masquerading method used by the Rancor threat group’s Plaintee Trojan (Picus Threat ID: 206343).

C:\WINDOWS\system32>cmd.exe /c schtasks /create /sc MINUTE /mo 5 /tn "Windows Updata Services" /tr "\"%APPDATA%\Local Service.exe\" \"C:\PICUS_863a9199decf36895d5d7d148ce9fd622e825f393d7ebe7591b4d37ef3f5f677.dll\",OpenURLB" /F
SUCCESS: The scheduled task "Windows Updata Services" has successfully been created.

As shown in the above figure, the Rancor group used Windows Updata Services as the name of the scheduled task. Note that they wrote updata instead of update.

Blue Teaming - How to detect?

Following Sigma rule can be used to detect scheduled task creation pointing to the %APPDATA% directory.

title: Suspicious Scheduled Task Creation Pointing to AppData
status: experimental
description: Detects the attempt to create a scheduled task pointing the %APPDATA% directory.
author: Picus Security




    category: process_creation
    product: windows
        Image: '*\schtasks.exe'
        CommandLine: '* /create *AppData*'
    condition: selection and not filter
    - CommandLine
    - ParentCommandLine

    - attack.persistence

    - attack.privilege_escalation

    - attack.execution

    - attack.ta0002

    - attack.ta0003

    - attack.ta0004

    - attack.t1053
    - Legitimate administrative activities
    - Software installation
level: low

3. Use a task name similar to a common software service (T1036.004 Masquerade Task or Service)

Red Teaming - How to simulate?

In this test, we will use Adobe Acrobat Reader Updater as the task name like the Turla threat group  (Picus Threat ID: 141210).

C:\WINDOWS\system32>schtasks /Create /TR "%APPDATA%\Adobe\adobeup.exe" /SC WEEKLY /TN "Adobe Acrobat Reader Updater"
SUCCESS: The scheduled task "Adobe Acrobat Reader Updater" has successfully been created.

Blue Teaming - How to detect?

Following Sigma rule is specific to the above masquerading method used by the Turla group. Moreover, you can use the Sigma rule given in the second exercise to detect this attack.

title: Suspicious Adobe Acrobat Reader Updater Scheduled Task Creation
status: stable
description: Detects the attempt to create a scheduled task called "Adobe Acrobat Reader Updater" which runs malicious backdoor (adobeup.exe). This technique is commonly utilized for persistence as Turla APT Group's usage in its threat campaigns.
author: Picus Security
    product: windows
    service: security
    definition1: 'Requirements: Group Policy : Computer Configuration\Windows Settings\Security Settings\Advanced Audit Policy Configuration\Audit Policies\Detailed Tracking\Audit Process Creation'
    definition2: 'Requirements: Group Policy : Computer Configuration\ Administrative Templates\ System\ Audit Process Creation\ Include Command Line'
        EventID: 4688
        NewProcessName: '*\schtasks.exe'
        ProcessCommandLine: 'schtasks  /Create *Adobe\\adobeup.exe\"* \"Adobe Acrobat Reader Updater\'
    condition: selection
    - None
level: high
    - attack.persistence
    - attack.privilege_escalation
    - attack.execution
    - attack.ta0002
    - attack.ta0003
    - attack.ta0004
    - attack.t1053
    - attack.g0010


Appendix A - Aliases of Threat Groups

Threat Group



APT15, Mirage, Vixen Panda, GREF, Playful Dragon, RoyalAPT

Tropic Trooper 

KeyBoy, Pirate Panda


Waterbug, WhiteBear, VENOMOUS BEAR, Snake, Krypton

Appendix B - Aliases of Malware Families






DestroyRAT, Sogu, Kaba, PlugX


[1]        “Subvert Trust Controls: Code Signing, Sub-technique T1553.002 - Enterprise | MITRE ATT&CK®.” [Online]. Available: [Accessed: 08-Jul-2020]

[2]        threatexpress, “threatexpress/metatwin,” GitHub. [Online]. Available: [Accessed: 08-Jul-2020]

[3]        “Resource Hacker.” [Online]. Available: [Accessed: 08-Jul-2020]

[4]        secretsquirrel, “secretsquirrel/SigThief,” GitHub. [Online]. Available: [Accessed: 08-Jul-2020]

[5]        “User Execution: Malicious File, Sub-technique T1204.002 - Enterprise | MITRE ATT&CK®.” [Online]. Available: [Accessed: 08-Jul-2020]

[6]        “Phishing: Spearphishing Attachment, Sub-technique T1566.001 - Enterprise | MITRE ATT&CK®.” [Online]. Available: [Accessed: 08-Jul-2020]

[7]        ASERT, “Illuminating the Etumbot APT Backdoor,” Jun-2014. [Online]. Available: [Accessed: 08-Jul-2020]

[8]        “Threat Actor Groups use COVID-19 pandemic theme – Red Alert.” [Online]. Available: [Accessed: 08-Jul-2020]

[9]        A. Firsh, “Zero-day vulnerability in Telegram.” [Online]. Available: [Accessed: 09-Jul-2020]

[10]        “Sirefef Malware Found Using Unicode Right-to-Left Override Technique.” [Online]. Available: [Accessed: 08-Jul-2020]

[11]        “Virus Bulletin :: VB2019 paper: Operation Soft Cell – a worldwide campaign against telecommunication providers.” [Online]. Available: [Accessed: 09-Jul-2020]

[12]        “COVID-19 Ongoing Cyber Updates.” [Online]. Available: [Accessed: 12-Jul-2020]

[13]        “Scheduled Task/Job: Scheduled Task, Sub-technique T1053.005 - Enterprise | MITRE ATT&CK®.” [Online]. Available: [Accessed: 10-Jul-2020]

[14]        “Create or Modify System Process: Windows Service, Sub-technique T1543.003 - Enterprise | MITRE ATT&CK®.” [Online]. Available: [Accessed: 10-Jul-2020]

[15]        M. Faou, “From Agent.BTZ to ComRAT v4.” [Online]. Available: [Accessed: 10-Jul-2020]

[16]        M. Gorelik, “FIN7 Takes Another Bite at the Restaurant Industry.” [Online]. Available: [Accessed: 10-Jul-2020]

[17]        R. Falcone, “Shamoon 2: Return of the Disttrack Wiper,” Unit42, 30-Nov-2016. [Online]. Available: [Accessed: 10-Jul-2020]

[18]        J. Chen, “Tropic Trooper’s Back: USBferry Attack Targets Air-gapped Environments.” [Online]. Available: [Accessed: 10-Jul-2020]

[19]        D. Breitenbacher and K. Osis, “Operation In(ter)ception: Aerospace and military companies in the crosshairs of cyberspies | WeLiveSecurity,” WeLiveSecurity, 17-Jun-2020. [Online]. Available: [Accessed: 11-Jul-2020]

[20]        hasherezade, “No money, but Pony! From a mail to a trojan horse - Malwarebytes Labs,” Malwarebytes Labs, 19-Nov-2015. [Online]. Available: [Accessed: 10-Jul-2020]

[21]        “Mac Malware of 2016 | Synack Blog,” Synack. [Online]. Available: [Accessed: 11-Jul-2020]

[22]        “Middle East Cyber-Espionage.” [Online]. Available: [Accessed: 11-Jul-2020]

[23]        Kaspersky Lab, “THE REGIN PLATFORM NATION-STATE OWNAGE OF GSM NETWORKS,” 24-Nov-2014. [Online]. Available: [Accessed: 11-Jul-2020]

[24]        Nart Villeneuve, James T. Bennett, Ned Moran, Thoufique Haq, Mike Scott, and Kenneth Geers, “OPERATION ‘KE3CHANG’: Targeted Attacks Against Ministries of Foreign Affairs.” [Online]. Available: [Accessed: 11-Jul-2020]

[25]        Neo23x, “Neo23x0/sigma,” GitHub. [Online]. Available: [Accessed: 12-Jul-2020]

10 Critical MITRE ATT&CK Techniques