Common Information
Type Value
Value
Hidden Window - T1564.003
Category Attack-Pattern
Type Mitre-Attack-Pattern
Misp Type Cluster
Description Adversaries may use hidden windows to conceal malicious activity from the plain sight of users. In some cases, windows that would typically be displayed when an application carries out an operation can be hidden. This may be utilized by system administrators to avoid disrupting user work environments when carrying out administrative tasks. Adversaries may abuse these functionalities to hide otherwise visible windows from users so as not to alert the user to adversary activity on the system.(Citation: Antiquated Mac Malware) On macOS, the configurations for how applications run are listed in property list (plist) files. One of the tags in these files can be <code>apple.awt.UIElement</code>, which allows for Java applications to prevent the application's icon from appearing in the Dock. A common use for this is when applications run in the system tray, but don't also want to show up in the Dock. Similarly, on Windows there are a variety of features in scripting languages, such as [PowerShell](https://attack.mitre.org/techniques/T1059/001), Jscript, and [Visual Basic](https://attack.mitre.org/techniques/T1059/005) to make windows hidden. One example of this is <code>powershell.exe -WindowStyle Hidden</code>.(Citation: PowerShell About 2019) In addition, Windows supports the `CreateDesktop()` API that can create a hidden desktop window with its own corresponding <code>explorer.exe</code> process.(Citation: Hidden VNC)(Citation: Anatomy of an hVNC Attack) All applications running on the hidden desktop window, such as a hidden VNC (hVNC) session,(Citation: Hidden VNC) will be invisible to other desktops windows.
Details Published Attributes CTI Title
Details Website 2018-06-13 5 Malicious PowerShell in the Registry: Persistence
Details Website 2018-05-25 5 Malware analysis: decoding Emotet, part 1 | Malwarebytes Labs
Details Website 2017-12-15 15 From Emotet, PSDecode is born!
Details Website 2017-10-12 43 Malspam targets Swiss with Retefe Banking Trojan
Details Website 2017-08-30 31 Introducing WhiteBear
Details Website 2017-07-21 18 Malspam Delivers Cerber Ransomware July-2017
Details Website 2017-04-05 48 In-Depth Look at New Variant of MONSOON APT Backdoor, Part 1
Details Website 2016-09-03 7 Fun with Unattended Workstations
Details Website 2016-03-26 33 Weaponized Container exploiting MS Office Vulnerability CVE 2012-0158 - Communicating to Dridex C2 Infra
Details Website 2016-01-01 96 Virus Bulletin :: VB2014 paper: Notes on click fraud: American story
Details Website 2015-06-12 36 Unusual Exploit Kit Targets Chinese Users (Part 2) | Malwarebytes Labs
Details Website 2012-10-09 6 Windows 8 Security in Action: Part 3
Details Website 2011-09-06 37 Stuxnet Malware Analysis Paper
Details Website 2009-07-24 72 From Russia, With Love . . . new Postcard spam spies on your PC