heroui logo

Potential PowerShell Obfuscation Via WCHAR

Sigma Rules

View Source
Summary
This rule detects potentially obfuscated PowerShell commands that utilize the WCHAR syntax, often associated with techniques to evade security measures. The rule focuses on examining process creation events where the command line contains a specific pattern, namely '(WCHAR)0x'. Such patterns can indicate a redirection technique used by malicious actors to execute PowerShell scripts while attempting to obfuscate their true intentions or functionality. By detecting these specific command line arguments, security teams can more promptly respond to potential threats, thus fortifying their security posture against advanced evasion tactics commonly employed in the cyber domain.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
Created: 2020-07-09