Adversaries may attempt to manipulate features of their artifacts to make them appear legitimate or benign to users and/or security tools. Masquerading occurs when the name or location of an object, legitimate or malicious, is manipulated or abused for the sake of evading defenses and observation. This may include manipulating file metadata, tricking users into misidentifying the file type, and giving legitimate task or service names.

Procedure Examples

Masquerading Technique T1036

Hunting Critical Process Masquerade Using SureLog SIEM

SureLog Process Masquerade Detection Rule Config
SureLog Process Masquerade Detection Reports
SureLog Process Masquerade Detection Alert Config

Published On: April 4th, 2026 / Categories: News /

Subscribe To Receive The Latest News

Add notice about your Privacy Policy here.