T1027.005

Indicator Removal from Tools

Adversaries may remove indicators from tools if they believe their malicious tool was detected, quarantined, or otherwise curtailed. They can modify the tool by removing the indicator and using the updated version that is no longer detected by the target's defensive systems. This includes changing file hashes, removing strings identified by AV signatures, obfuscating known-malicious function names, or repacking detected malware. Cobalt Strike includes a built-in capability to modify Beacon payloads to eliminate known signatures. PowerSploit's Find-AVSignature module helps locate detectable byte sequences. Threat actors including UNC3886, OilRig, Turla, APT3, and Deep Panda have iteratively modified their tools in response to public detections.

Microsoft Sentinel / Defender
kusto
let SigBypassTools = dynamic([
  "Find-AVSignature", "AVBypass", "DefeatDefender", "Invoke-AVBypass",
  "Confuser", "ConfuserEx", "de4dot", "dnspy", "ILSpy",
  "pe-bear", "CFF Explorer", "PE Studio", "pestudio",
  "hyperion", "Veil-Evasion", "Shellter"
]);
DeviceProcessEvents
| where Timestamp > ago(24h)
| where ProcessCommandLine has_any (SigBypassTools)
    or FileName has_any (SigBypassTools)
| project Timestamp, DeviceName, AccountName, FileName, ProcessCommandLine,
         InitiatingProcessFileName, InitiatingProcessCommandLine
| sort by Timestamp desc
| union (
    DeviceFileEvents
    | where Timestamp > ago(24h)
    | where ActionType == "FileModified"
    | where FileName endswith ".exe" or FileName endswith ".dll"
    | where FolderPath !startswith "C:\\Windows\\"
        and FolderPath !startswith "C:\\Program Files\\"
    | where InitiatingProcessFileName !in~ ("MpCmdRun.exe", "MsMpEng.exe", "svchost.exe", "TrustedInstaller.exe")
    | extend SuspiciousModification = true
    | project Timestamp, DeviceName, FolderPath, FileName,
             InitiatingProcessFileName, InitiatingProcessCommandLine, SuspiciousModification
)
high severity medium confidence

Data Sources

Process: Process Creation File: File Modification Microsoft Defender for Endpoint

Required Tables

DeviceProcessEvents DeviceFileEvents

False Positives

  • Security researchers and red team members using PE analysis tools (PE Studio, CFF Explorer, dnSpy) for legitimate analysis
  • Malware analysts using de4dot or ILSpy for deobfuscation of samples in a lab environment
  • Software developers modifying their own compiled executables for debugging or patching
  • AV software itself modifying quarantined PE files (should be excluded by InitiatingProcessFileName)

Unlock Pro Content

Get the full detection package for T1027.005 including response playbook, investigation guide, and atomic red team tests.

Response PlaybookInvestigation GuideHunting QueriesAtomic Red Team TestsTuning Guidance

Related Detections