
Summary
This rule detects suspicious process creation in Windows systems where the command line executed contains whitespace padding followed by a '#' character. Such a pattern may indicate the use of ClickFix or FileFix techniques. These are social engineering tactics where attackers trick users into executing commands that appear benign at first glance. The commands contain excessive whitespace using Unicode space characters which push the malicious command out of immediate visibility, rendering them less recognizable during inspection. This can occur through applications like Windows File Explorer or the Run dialog, where users are misled into pasting commands copied from deceptive sources.
Categories
- Endpoint
- Windows
Data Sources
- Process
- Application Log
Created: 2025-11-04