MITRE ATT&CK Technique
Defense Evasion T1036.001
Description

Adversaries may attempt to mimic features of valid code signatures to increase the chance of deceiving a user, analyst, or tool. Code signing provides a level of authenticity on a binary from the developer and a guarantee that the binary has not been tampered with. Adversaries can copy the metadata and signature information from a signed program, then use it as a template for an unsigned program. Files with invalid code signatures will fail digital signature validation checks, but they may appear more legitimate to users and security tools may improperly handle these files.(Citation: Threatexpress MetaTwin 2017) Unlike [Code Signing](https://attack.mitre.org/techniques/T1553/002), this activity will not result in a valid signature.

Supported Platforms
Windows macOS
Created

April 29, 2026

Last Updated

April 29, 2026

STIX Data
{'created': '2020-02-10T19:49:46.752Z',
 'created_by_ref': 'identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5',
 'description': 'Adversaries may attempt to mimic features of valid code '
                'signatures to increase the chance of deceiving a user, '
                'analyst, or tool. Code signing provides a level of '
                'authenticity on a binary from the developer and a guarantee '
                'that the binary has not been tampered with. Adversaries can '
                'copy the metadata and signature information from a signed '
                'program, then use it as a template for an unsigned program. '
                'Files with invalid code signatures will fail digital '
                'signature validation checks, but they may appear more '
                'legitimate to users and security tools may improperly handle '
                'these files.(Citation: Threatexpress MetaTwin 2017)\n'
                '\n'
                'Unlike [Code '
                'Signing](https://attack.mitre.org/techniques/T1553/002), this '
                'activity will not result in a valid signature.',
 'external_references': [{'external_id': 'T1036.001',
                          'source_name': 'mitre-attack',
                          'url': 'https://attack.mitre.org/techniques/T1036/001'},
                         {'description': 'Vest, J. (2017, October 9). '
                                         'Borrowing Microsoft MetaData and '
                                         'Signatures to Hide Binary Payloads. '
                                         'Retrieved September 10, 2019.',
                          'source_name': 'Threatexpress MetaTwin 2017',
                          'url': 'https://threatexpress.com/blogs/2017/metatwin-borrowing-microsoft-metadata-and-digital-signatures-to-hide-binaries/'}],
 'id': 'attack-pattern--b4b7458f-81f2-4d38-84be-1c5ba0167a52',
 'kill_chain_phases': [{'kill_chain_name': 'mitre-attack',
                        'phase_name': 'defense-evasion'}],
 'modified': '2025-10-24T17:49:15.520Z',
 'name': 'Invalid Code Signature',
 'object_marking_refs': ['marking-definition--fa42a846-8d90-4e51-bc29-71d5b4802168'],
 'revoked': False,
 'spec_version': '2.1',
 'type': 'attack-pattern',
 'x_mitre_attack_spec_version': '3.2.0',
 'x_mitre_deprecated': False,
 'x_mitre_detection': '',
 'x_mitre_domains': ['enterprise-attack'],
 'x_mitre_is_subtechnique': True,
 'x_mitre_modified_by_ref': 'identity--c78cb6e5-0c4b-4611-8297-d1b8b55e40b5',
 'x_mitre_platforms': ['Windows', 'macOS'],
 'x_mitre_version': '1.0'}
Quick Actions
Related Threat Actors (2)
Windshift
High

clop
Critical