T1036.003
Rename Legitimate Utilities
Adversaries may rename legitimate system utilities to try to evade security mechanisms concerning the usage of those utilities. Security monitoring and control mechanisms may be in place for system utilities adversaries are capable of abusing, including PSExec, certutil, rundll32, and mshta. It may be possible to bypass those security mechanisms by renaming the utility prior to utilization. An alternative case occurs when a legitimate utility is copied or moved to a different directory and renamed to avoid detections based on these utilities executing from non-standard paths.
Microsoft Sentinel / Defender
kusto
let MonitoredUtilities = dynamic(["cmd.exe", "powershell.exe", "pwsh.exe", "rundll32.exe", "mshta.exe", "certutil.exe", "wscript.exe", "cscript.exe", "regsvr32.exe", "msbuild.exe", "psexec.exe", "psexesvc.exe", "bitsadmin.exe", "wmic.exe"]);
DeviceProcessEvents
| where Timestamp > ago(24h)
| where ProcessVersionInfoOriginalFileName in~ (MonitoredUtilities)
| where FileName !in~ (MonitoredUtilities)
| project Timestamp, DeviceName, AccountName, FileName, FolderPath,
ProcessVersionInfoOriginalFileName, ProcessVersionInfoProductName,
ProcessCommandLine, InitiatingProcessFileName, InitiatingProcessCommandLine,
SHA256
| sort by Timestamp desc high severity
high confidence
Data Sources
Process: Process Creation Process: Process Metadata Microsoft Defender for Endpoint
Required Tables
DeviceProcessEvents
False Positives
- Software compatibility shims or wrappers that copy and rename system utilities as part of their normal operation
- Some application installers that bundle renamed copies of certutil.exe or other utilities for certificate management
- IT automation tools that copy system utilities to temporary directories with different names during deployment
- Windows Feature on Demand installations that may temporarily rename binaries
Last updated: 2026-04-16 Research depth: deep
References (7)
- https://attack.mitre.org/techniques/T1036/003/
- https://www.elastic.co/blog/how-hunt-masquerade-ball
- https://lolbas-project.github.io/
- https://www.f-secure.com/documents/996508/1030745/CozyDuke
- https://research.splunk.com/endpoint/683e6196-b8e8-11eb-9a79-acde48001122/
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1036.003/T1036.003.md
- https://x.com/ItsReallyNick/status/1055321652777619457
Unlock Pro Content
Get the full detection package for T1036.003 including response playbook, investigation guide, and atomic red team tests.
Response PlaybookInvestigation GuideHunting QueriesAtomic Red Team TestsTuning Guidance
Related Detections
Parent Technique
T1036MasqueradingRelated Sub-techniques
T1036.001Invalid Code SignatureT1036.002Right-to-Left OverrideT1036.004Masquerade Task or ServiceT1036.005Match Legitimate Resource Name or LocationT1036.006Space after FilenameT1036.007Double File ExtensionT1036.008Masquerade File TypeT1036.009Break Process TreesT1036.010Masquerade Account NameT1036.011Overwrite Process ArgumentsT1036.012Browser Fingerprint