Skip to content

Masquerading

Info

ID: AT-DC006
Tactic: Deepening Control
Sub-techniques: Break Process Trees, Match Legitimate Name or Location
Platforms: Linux, macOS, Windows, Container
Defense Bypassed: Static Analysis, Signature-based Detection, Heuristic Detection
Version: 1.0

Masquerading

Adversaries may rename files, services, or processes to resemble legitimate components, tricking defenders or automated detection into ignoring them. This could involve using benign or systemlike names for malicious binaries, or placing executables in commonly used directories with expected permissions. By closely mimicking normal environment details, attackers lower their detection profile.

Masquerading extends to container images or ephemeral app services that adopt naming conventions and metadata consistent with official builds. In environments with frequent updates, subtle differences in image tags or version numbers might go unnoticed. Over time, this technique lets malicious processes blend in, particularly if defenders rely on heuristics that trust known file paths or naming schemes.

Detection

ID Data Source Detection
DS0022 File: File Metadata Identify new executables in trusted directories whose file metadata mismatches expected signatures
DS0009 Process Creation Alert when process name matches whitelisted system binary but is executed from user-writable directory.
DS0029 Network Traffic Flow Detect containers pulling images tagged with official repository names but non-trusted digests.
DS0040 Malware Repository Submit hash of binaries with trusted names for reputation checks, quarantine if low rep.

Mitigations

ID Mitigation Description
M1045 Code Signing Implement code signing verification to identify unsigned masqueraded files
M1040 Behavior Prevention on Endpoint Deploy endpoint detection solutions that analyze behavior beyond naming
M1022 Restrict File and Directory Permissions Implement strict permissions to prevent unauthorized file placement