Currently viewing ATT&CK v7.2 which was live between July 8, 2020 and October 26, 2020. Learn more about the versioning system or see the live site.
Register to stream the next session of ATT&CKcon Power Hour November 12

Masquerading: Invalid Code Signature

Adversaries may attempt to mimic features of valid code signatures to increase the chance of deceiving a user, analyst, or tool. Code signing provides a level of authenticity on a binary from the developer and a guarantee that the binary has not been tampered with. Adversaries can copy the metadata and signature information from a signed program, then use it as a template for an unsigned program. Files with invalid code signatures will fail digital signature validation checks, but they may appear more legitimate to users and security tools may improperly handle these files.[1]

Unlike Code Signing, this activity will not result in a valid signature.

ID: T1036.001
Sub-technique of:  T1036
Tactic: Defense Evasion
Platforms: Windows, macOS
Data Sources: Binary file metadata, File monitoring, Process monitoring
Version: 1.0
Created: 10 February 2020
Last Modified: 10 February 2020

Procedure Examples

Name Description
Regin

Regin stage 1 modules for 64-bit systems have been found to be signed with fake certificates masquerading as originating from Microsoft Corporation and Broadcom Corporation.[2]

Windshift

Windshift has used revoked certificates to sign malware.[3][4]

WindTail

WindTail has been incompletely signed with revoked certificates.[3]

Mitigations

Mitigation Description
Code Signing

Require signed binaries.

Detection

Collect and analyze signing certificate metadata and check signature validity on software that executes within the environment, look for invalid signatures as well as unusual certificate characteristics and outliers.

References