T1036.004
Masquerade Task or Service
Adversaries may attempt to manipulate the name of a task or service to make it appear legitimate or benign. Tasks/services executed by the Task Scheduler or systemd will typically be given a name and/or description. Windows services will have a service name as well as a display name. Adversaries may give tasks or services names that are similar or identical to those of legitimate ones, such as 'Windows Update Security', 'Google Chrome Security Update', or 'Microsoft Network Realtime Inspection Service'.
Microsoft Sentinel / Defender
kusto
let SuspiciousServiceNames = dynamic(["Windows Update Security", "Microsoft Network Realtime", "Windows Advanced Task Manager", "Google Chrome Security Update", "Windows Video Service", "Windows Power Efficiency", "System Authorization Service", "Windows Management Help", "Microsoft Support", "Windows User Service"]);
DeviceEvents
| where Timestamp > ago(24h)
| where ActionType == "ServiceInstalled"
| where AdditionalFields has_any (SuspiciousServiceNames)
or AdditionalFields matches regex @"(?i)(svchost|update|security|microsoft|google|chrome|adobe|windows).*service"
| project Timestamp, DeviceName, AccountName, ActionType, AdditionalFields
| sort by Timestamp desc high severity
medium confidence
Data Sources
Service: Service Creation Service: Service Metadata Microsoft Defender for Endpoint
Required Tables
DeviceEvents
False Positives
- Legitimate Windows Update-related services installed during OS or feature updates
- Third-party security software that creates services with names containing 'Security' or 'Update'
- Enterprise software deployment tools (SCCM, Intune) creating services during application installation
- Google Chrome, Adobe, and other software creating legitimate update services
Last updated: 2026-04-17 Research depth: deep
References (6)
- https://attack.mitre.org/techniques/T1036/004/
- http://researchcenter.paloaltonetworks.com/2016/11/unit42-shamoon-2-return-disttrack-wiper/
- https://vms.drweb.com/virus/?i=4276269
- https://technet.microsoft.com/en-us/library/bb490996.aspx
- https://www.freedesktop.org/software/systemd/man/systemd.service.html
- https://github.com/redcanaryco/atomic-red-team/blob/master/atomics/T1036.004/T1036.004.md
Unlock Pro Content
Get the full detection package for T1036.004 including response playbook, investigation guide, and atomic red team tests.
Response PlaybookInvestigation GuideHunting QueriesAtomic Red Team TestsTuning Guidance
Related Detections
Parent Technique
T1036MasqueradingRelated Sub-techniques
T1036.001Invalid Code SignatureT1036.002Right-to-Left OverrideT1036.003Rename Legitimate UtilitiesT1036.005Match Legitimate Resource Name or LocationT1036.006Space after FilenameT1036.007Double File ExtensionT1036.008Masquerade File TypeT1036.009Break Process TreesT1036.010Masquerade Account NameT1036.011Overwrite Process ArgumentsT1036.012Browser Fingerprint