T1564.003
Hidden Window
Adversaries may use hidden windows to conceal malicious activity from users. On Windows, this is achieved through PowerShell's -WindowStyle Hidden flag or by using the ShowWindow API with SW_HIDE. The CreateProcess API's STARTUPINFO structure also allows processes to be created without a visible window. On macOS, the LSUIElement or LSBackgroundOnly Info.plist keys make applications background-only. Malware families using hidden windows include Astaroth, QuietSieve, StrongPity, and LockBit 2.0.
Microsoft Sentinel / Defender
kusto
DeviceProcessEvents
| where Timestamp > ago(24h)
| where FileName in~ ("powershell.exe", "pwsh.exe", "cmd.exe", "wscript.exe", "cscript.exe")
| where ProcessCommandLine has_any ("-WindowStyle Hidden", "-w hidden", "-windowstyle h", "/hh")
or (ProcessCommandLine has_any ("-NonInteractive", "-noni", "-NonI") and ProcessCommandLine has_any ("-WindowStyle", "-w "))
| extend PSHidden = ProcessCommandLine has_any ("-WindowStyle Hidden", "-w hidden", "-windowstyle h")
| extend EncodedCmd = ProcessCommandLine has_any ("-EncodedCommand", "-enc ", "-e ")
| extend DownloadCradle = ProcessCommandLine has_any ("Net.WebClient", "Invoke-WebRequest", "IEX", "DownloadString")
| extend PolicyBypass = ProcessCommandLine has_any ("-ExecutionPolicy Bypass", "-ep bypass")
| project Timestamp, DeviceName, AccountName, FileName, ProcessCommandLine, InitiatingProcessFileName,
InitiatingProcessCommandLine, PSHidden, EncodedCmd, DownloadCradle, PolicyBypass
| sort by Timestamp desc medium severity
medium confidence
Data Sources
Process: Process Creation Command: Command Execution Microsoft Defender for Endpoint
Required Tables
DeviceProcessEvents
False Positives
- IT automation scripts and scheduled tasks that use -WindowStyle Hidden to run without disrupting the user desktop
- Software update mechanisms that run silent background updates using hidden PowerShell windows
- System monitoring agents that execute PowerShell checks in hidden windows to avoid user interruption
- Remote management tools (PSExec, Ansible WinRM) that execute PowerShell commands in non-interactive hidden sessions
Last updated: 2026-04-21 Research depth: deep
References (4)
Unlock Pro Content
Get the full detection package for T1564.003 including response playbook, investigation guide, and atomic red team tests.
Response PlaybookInvestigation GuideHunting QueriesAtomic Red Team TestsTuning Guidance
Related Detections
Parent Technique
T1564Hide ArtifactsRelated Sub-techniques
T1564.001Hidden Files and DirectoriesT1564.002Hidden UsersT1564.004NTFS File AttributesT1564.005Hidden File SystemT1564.006Run Virtual InstanceT1564.007VBA StompingT1564.008Email Hiding RulesT1564.009Resource ForkingT1564.010Process Argument SpoofingT1564.011Ignore Process InterruptsT1564.012File/Path ExclusionsT1564.013Bind MountsT1564.014Extended Attributes