T1027.003

Steganography

Adversaries may use steganography techniques in order to prevent the detection of hidden information. Steganographic techniques can be used to hide data in digital media such as images, audio tracks, video clips, or text files. Adversaries commonly hide malicious payloads within PNG, BMP, JPG, and GIF files, often extracting PE executables or shellcode at runtime using LSB (Least Significant Bit) manipulation or custom XOR-based extraction. Threat actors including APT37, APT29, Andariel, Tropic Trooper, BRONZE BUTLER, and MuddyWater have used steganography to hide C2 configurations, shellcode, and full malware payloads within seemingly benign images.

Microsoft Sentinel / Defender
kusto
let SteganographyTools = dynamic(["invoke-psimage", "steghide", "openstego", "outguess", "stegdetect"]);
let ImageExtensions = dynamic([".png", ".jpg", ".jpeg", ".bmp", ".gif", ".tiff"]);
DeviceProcessEvents
| where Timestamp > ago(24h)
| where ProcessCommandLine has_any (SteganographyTools)
    or (ProcessCommandLine has_any (ImageExtensions)
        and ProcessCommandLine has_any ("extract", "decode", "lsb", "steg", "hidden", "payload"))
| project Timestamp, DeviceName, AccountName, FileName, ProcessCommandLine,
         InitiatingProcessFileName, InitiatingProcessCommandLine
| sort by Timestamp desc
| union (
    DeviceFileEvents
    | where Timestamp > ago(24h)
    | where ActionType == "FileCreated"
    | where FileName endswith ".exe" or FileName endswith ".dll"
    | where InitiatingProcessFileName in~ ("explorer.exe", "iexplore.exe", "chrome.exe", "msedge.exe", "firefox.exe")
    | where FolderPath has_any ("\\Temp\\", "\\Downloads\\", "\\Pictures\\")
    | extend SuspiciousExeDrop = true
    | project Timestamp, DeviceName, AccountName=InitiatingProcessAccountName, FileName, FolderPath, SuspiciousExeDrop
)
high severity medium confidence

Data Sources

Process: Process Creation File: File Creation Microsoft Defender for Endpoint

Required Tables

DeviceProcessEvents DeviceFileEvents

False Positives

  • Legitimate digital forensics and watermarking tools that use steganography for authorized use cases
  • Security researchers running steganography analysis tools on their workstations
  • Browsers dropping legitimate executable installers to Downloads or Pictures folders
  • Digital rights management (DRM) tools that use watermarking techniques similar to steganography

Unlock Pro Content

Get the full detection package for T1027.003 including response playbook, investigation guide, and atomic red team tests.

Response PlaybookInvestigation GuideHunting QueriesAtomic Red Team TestsTuning Guidance

Related Detections