One possible way to do this would be to include the decryption key at the beginning of the file, and the key has been reprocessed in some fashion that you can determine from the key. One possibility would be to pick, like, say sixteen different things, 0 being, say, rotate the first two bytes to the end; 1 being rotate the last two bytes to the front; 2 being add 1 to every byte; and so on for 14 additional functions. Now add this value in front of the key as the "reprocess flag".
The first byte of the key would then be a branch table to one of 16 different routines to say what to do with the key. Note that the reprocess flag doesn't have to be the first byte, it can be any byte in the key as long as you remember to throw that byte away when handling the key.
Then you process the key according to whatever decryption algorithm you would use.
Now, given this reprocess flag - especially if the entire key was in hexadecimal - would require someone follow the logic to determine which of the 16 different functions your code executed, then figure out the decryption method. It's not going to stop everyone but it will probably do a fairly good job driving away all but the most determined.