heroui logo

Potential Defense Evasion Activity Via Emoji Usage In CommandLine - 2

Sigma Rules

View Source
Summary
This detection rule focuses on identifying potential defense evasion activity through the unusual use of emojis in command line inputs on Windows systems. The rationale behind this approach is that attackers might use non-standard characters, such as emojis, to obfuscate their commands and evade detection by traditional security systems. The rule triggers when the command line contains any emojis included in a predefined list, suggesting suspicious behavior that warrants further investigation. The detection strategy hinges on monitoring process creation events and analyzing command line arguments for the presence of these emojis. Given the inherent uniqueness of emojis, this behavior can indicate attempts to conceal malicious intent or bypass standard command line filters.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
Created: 2022-12-05