heroui logo

Potential Defense Evasion Activity Via Emoji Usage In CommandLine - 1

Sigma Rules

View Source
Summary
This rule is designed to detect the use of emojis in command line executions within Windows operating systems, which could be indicative of attempts at defense evasion by threat actors. The presence of emojis in command line inputs is unusual and can be a technique utilized by attackers to obfuscate malicious commands or make them appear benign, thereby evading detection mechanisms. The rule analyzes command line arguments for a predefined list of emoji characters, which can cover a wide range of potential input methods used by threat actors. If any of these characters are found within the command line parameters of a process creation event, it is flagged for further investigation. The rule is marked as high severity due to the association with possible defense evasion tactics that can be employed by adversaries to conduct malicious activities without raising alarms typically triggered by standard command line inputs.
Categories
  • Windows
Data Sources
  • Process
Created: 2022-12-05