heroui logo

Potential CommandLine Obfuscation Using Unicode Characters From Suspicious Image

Sigma Rules

View Source
Summary
This rule aims to detect potentially malicious command-line obfuscation techniques employed by adversaries utilizing Unicode characters. Adversaries often encrypt, encode, or otherwise obfuscate executables or files to evade detection mechanisms and analytical processes. By particularly focusing on common Windows executables like cmd.exe, cscript.exe, PowerShell, and wscript.exe, the rule inspects command-line arguments for specific Unicode characters that could indicate attempts at obfuscation. The presence of certain characters, such as '\u02e3', '\u02ea', and others listed, in conjunction with the creation of these executables prompts an alert for possible defensive evasion or malicious activity. This type of activity is prevalent in attack scenarios that seek to mask the true intentions of command-line operations, making it critical to monitor for such behaviors in environments where command-line utilities are commonly used.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
ATT&CK Techniques
  • T1027
Created: 2024-09-02