T1564.003

Hidden Window

Adversaries may use hidden windows to conceal malicious activity from users. On Windows, this is achieved through PowerShell's -WindowStyle Hidden flag or by using the ShowWindow API with SW_HIDE. The CreateProcess API's STARTUPINFO structure also allows processes to be created without a visible window. On macOS, the LSUIElement or LSBackgroundOnly Info.plist keys make applications background-only. Malware families using hidden windows include Astaroth, QuietSieve, StrongPity, and LockBit 2.0.

Microsoft Sentinel / Defender
kusto
DeviceProcessEvents
| where Timestamp > ago(24h)
| where FileName in~ ("powershell.exe", "pwsh.exe", "cmd.exe", "wscript.exe", "cscript.exe")
| where ProcessCommandLine has_any ("-WindowStyle Hidden", "-w hidden", "-windowstyle h", "/hh")
   or (ProcessCommandLine has_any ("-NonInteractive", "-noni", "-NonI") and ProcessCommandLine has_any ("-WindowStyle", "-w "))
| extend PSHidden = ProcessCommandLine has_any ("-WindowStyle Hidden", "-w hidden", "-windowstyle h")
| extend EncodedCmd = ProcessCommandLine has_any ("-EncodedCommand", "-enc ", "-e ")
| extend DownloadCradle = ProcessCommandLine has_any ("Net.WebClient", "Invoke-WebRequest", "IEX", "DownloadString")
| extend PolicyBypass = ProcessCommandLine has_any ("-ExecutionPolicy Bypass", "-ep bypass")
| project Timestamp, DeviceName, AccountName, FileName, ProcessCommandLine, InitiatingProcessFileName,
         InitiatingProcessCommandLine, PSHidden, EncodedCmd, DownloadCradle, PolicyBypass
| sort by Timestamp desc
medium severity medium confidence

Data Sources

Process: Process Creation Command: Command Execution Microsoft Defender for Endpoint

Required Tables

DeviceProcessEvents

False Positives

  • IT automation scripts and scheduled tasks that use -WindowStyle Hidden to run without disrupting the user desktop
  • Software update mechanisms that run silent background updates using hidden PowerShell windows
  • System monitoring agents that execute PowerShell checks in hidden windows to avoid user interruption
  • Remote management tools (PSExec, Ansible WinRM) that execute PowerShell commands in non-interactive hidden sessions

Unlock Pro Content

Get the full detection package for T1564.003 including response playbook, investigation guide, and atomic red team tests.

Response PlaybookInvestigation GuideHunting QueriesAtomic Red Team TestsTuning Guidance

Related Detections