T1036.004

Masquerade Task or Service

Adversaries may attempt to manipulate the name of a task or service to make it appear legitimate or benign. Tasks/services executed by the Task Scheduler or systemd will typically be given a name and/or description. Windows services will have a service name as well as a display name. Adversaries may give tasks or services names that are similar or identical to those of legitimate ones, such as 'Windows Update Security', 'Google Chrome Security Update', or 'Microsoft Network Realtime Inspection Service'.

Microsoft Sentinel / Defender
kusto
let SuspiciousServiceNames = dynamic(["Windows Update Security", "Microsoft Network Realtime", "Windows Advanced Task Manager", "Google Chrome Security Update", "Windows Video Service", "Windows Power Efficiency", "System Authorization Service", "Windows Management Help", "Microsoft Support", "Windows User Service"]);
DeviceEvents
| where Timestamp > ago(24h)
| where ActionType == "ServiceInstalled"
| where AdditionalFields has_any (SuspiciousServiceNames)
   or AdditionalFields matches regex @"(?i)(svchost|update|security|microsoft|google|chrome|adobe|windows).*service"
| project Timestamp, DeviceName, AccountName, ActionType, AdditionalFields
| sort by Timestamp desc
high severity medium confidence

Data Sources

Service: Service Creation Service: Service Metadata Microsoft Defender for Endpoint

Required Tables

DeviceEvents

False Positives

  • Legitimate Windows Update-related services installed during OS or feature updates
  • Third-party security software that creates services with names containing 'Security' or 'Update'
  • Enterprise software deployment tools (SCCM, Intune) creating services during application installation
  • Google Chrome, Adobe, and other software creating legitimate update services

Unlock Pro Content

Get the full detection package for T1036.004 including response playbook, investigation guide, and atomic red team tests.

Response PlaybookInvestigation GuideHunting QueriesAtomic Red Team TestsTuning Guidance

Related Detections