T1036.003

Rename Legitimate Utilities

Adversaries may rename legitimate system utilities to try to evade security mechanisms concerning the usage of those utilities. Security monitoring and control mechanisms may be in place for system utilities adversaries are capable of abusing, including PSExec, certutil, rundll32, and mshta. It may be possible to bypass those security mechanisms by renaming the utility prior to utilization. An alternative case occurs when a legitimate utility is copied or moved to a different directory and renamed to avoid detections based on these utilities executing from non-standard paths.

Microsoft Sentinel / Defender
kusto
let MonitoredUtilities = dynamic(["cmd.exe", "powershell.exe", "pwsh.exe", "rundll32.exe", "mshta.exe", "certutil.exe", "wscript.exe", "cscript.exe", "regsvr32.exe", "msbuild.exe", "psexec.exe", "psexesvc.exe", "bitsadmin.exe", "wmic.exe"]);
DeviceProcessEvents
| where Timestamp > ago(24h)
| where ProcessVersionInfoOriginalFileName in~ (MonitoredUtilities)
| where FileName !in~ (MonitoredUtilities)
| project Timestamp, DeviceName, AccountName, FileName, FolderPath,
         ProcessVersionInfoOriginalFileName, ProcessVersionInfoProductName,
         ProcessCommandLine, InitiatingProcessFileName, InitiatingProcessCommandLine,
         SHA256
| sort by Timestamp desc
high severity high confidence

Data Sources

Process: Process Creation Process: Process Metadata Microsoft Defender for Endpoint

Required Tables

DeviceProcessEvents

False Positives

  • Software compatibility shims or wrappers that copy and rename system utilities as part of their normal operation
  • Some application installers that bundle renamed copies of certutil.exe or other utilities for certificate management
  • IT automation tools that copy system utilities to temporary directories with different names during deployment
  • Windows Feature on Demand installations that may temporarily rename binaries

Unlock Pro Content

Get the full detection package for T1036.003 including response playbook, investigation guide, and atomic red team tests.

Response PlaybookInvestigation GuideHunting QueriesAtomic Red Team TestsTuning Guidance

Related Detections