
Potential PowerShell Obfuscation via High Numeric Character Proportion
Elastic Detection Rules
View SourceSummary
The rule "Potential PowerShell Obfuscation via High Numeric Character Proportion" is designed to identify instances of potentially malicious PowerShell scripts that exhibit a disproportionately high number of numeric characters. This pattern often suggests obfuscation techniques typical of attackers attempting to conceal payloads within scripts by encoding essential commands or embedding malicious content. The rule operates on logs from PowerShell Script Block Logging, specifically targeting scripts longer than 1000 characters where the proportion of numeric characters exceeds 25%. This behavior aligns with various tactics in the MITRE ATT&CK framework, particularly under Defense Evasion and Execution categories.
Categories
- Endpoint
- Windows
Data Sources
- Process
- Application Log
- Script
ATT&CK Techniques
- T1027
- T1140
- T1059
- T1059.001
Created: 2025-04-16