T1027.002

Software Packing

Adversaries may perform software packing or virtual machine software protection to conceal their code. Software packing is a method of compressing or encrypting an executable. Packing an executable changes the file signature in an attempt to avoid signature-based detection. Most decompression techniques decompress the executable code in memory. Virtual machine software protection translates an executable's original code into a special format that only a special virtual machine can run. Common packers include UPX, MPRESS, Themida, VMProtect, and custom packers. APT41, APT39, Lazarus Group, Aoqin Dragon, and many commodity malware families including LockBit, QakBot, and Cobalt Strike use software packing.

Microsoft Sentinel / Defender
kusto
let PackerIndicators = dynamic([
  "UPX", "upx", "MPRESS", "Themida", "VMProtect", "Enigma", "Obsidium",
  "PEID", "ExeCryptor", "ASProtect", "PECompact", "WinRAR SFX", "7-Zip SFX"
]);
DeviceFileEvents
| where Timestamp > ago(24h)
| where ActionType == "FileCreated"
| where FileName endswith ".exe" or FileName endswith ".dll"
| where FolderPath has_any ("\\Temp\\", "\\Downloads\\", "\\AppData\\Roaming\\", "\\AppData\\Local\\Temp\\")
| join kind=leftouter (
    DeviceProcessEvents
    | where Timestamp > ago(24h)
    | where FileName in~ ("upx.exe", "themida.exe", "vmprotect.exe", "mpress.exe", "enigma.exe")
    | project DeviceName, PackerTool=FileName, PackerCmdLine=ProcessCommandLine, PackerTime=Timestamp
) on DeviceName
| project Timestamp, DeviceName, FolderPath, FileName, FileSize,
         InitiatingProcessFileName, InitiatingProcessCommandLine,
         PackerTool, PackerCmdLine, PackerTime
| sort by Timestamp desc
medium severity medium confidence

Data Sources

File: File Creation Process: Process Creation Microsoft Defender for Endpoint

Required Tables

DeviceFileEvents DeviceProcessEvents

False Positives

  • Legitimate UPX-packed open source tools (many Linux ports to Windows use UPX for size reduction)
  • Game distribution platforms (Steam, Epic) that use custom packers or SFX archives for game installers
  • Self-extracting archives used by IT teams for software deployment that use WinRAR or 7-Zip SFX format
  • Security research environments where packer tools are deliberately run for analysis purposes

Unlock Pro Content

Get the full detection package for T1027.002 including response playbook, investigation guide, and atomic red team tests.

Response PlaybookInvestigation GuideHunting QueriesAtomic Red Team TestsTuning Guidance

Related Detections