Indicator Removal from Tools
Adversaries may remove indicators from tools if they believe their malicious tool was detected, quarantined, or otherwise curtailed. They can modify the tool by removing the indicator and using the updated version that is no longer detected by the target's defensive systems. This includes changing file hashes, removing strings identified by AV signatures, obfuscating known-malicious function names, or repacking detected malware. Cobalt Strike includes a built-in capability to modify Beacon payloads to eliminate known signatures. PowerSploit's Find-AVSignature module helps locate detectable byte sequences. Threat actors including UNC3886, OilRig, Turla, APT3, and Deep Panda have iteratively modified their tools in response to public detections.
let SigBypassTools = dynamic([
"Find-AVSignature", "AVBypass", "DefeatDefender", "Invoke-AVBypass",
"Confuser", "ConfuserEx", "de4dot", "dnspy", "ILSpy",
"pe-bear", "CFF Explorer", "PE Studio", "pestudio",
"hyperion", "Veil-Evasion", "Shellter"
]);
DeviceProcessEvents
| where Timestamp > ago(24h)
| where ProcessCommandLine has_any (SigBypassTools)
or FileName has_any (SigBypassTools)
| project Timestamp, DeviceName, AccountName, FileName, ProcessCommandLine,
InitiatingProcessFileName, InitiatingProcessCommandLine
| sort by Timestamp desc
| union (
DeviceFileEvents
| where Timestamp > ago(24h)
| where ActionType == "FileModified"
| where FileName endswith ".exe" or FileName endswith ".dll"
| where FolderPath !startswith "C:\\Windows\\"
and FolderPath !startswith "C:\\Program Files\\"
| where InitiatingProcessFileName !in~ ("MpCmdRun.exe", "MsMpEng.exe", "svchost.exe", "TrustedInstaller.exe")
| extend SuspiciousModification = true
| project Timestamp, DeviceName, FolderPath, FileName,
InitiatingProcessFileName, InitiatingProcessCommandLine, SuspiciousModification
) Data Sources
Required Tables
False Positives
- Security researchers and red team members using PE analysis tools (PE Studio, CFF Explorer, dnSpy) for legitimate analysis
- Malware analysts using de4dot or ILSpy for deobfuscation of samples in a lab environment
- Software developers modifying their own compiled executables for debugging or patching
- AV software itself modifying quarantined PE files (should be excluded by InitiatingProcessFileName)
References (4)
Unlock Pro Content
Get the full detection package for T1027.005 including response playbook, investigation guide, and atomic red team tests.