
Summary
This detection rule targets potential defense evasion tactics by identifying the use of emojis within command line arguments on Windows systems. The presence of emojis in command line usage can indicate attempts by malware authors or attackers to obfuscate commands and evade detection mechanisms. This rule monitors process creation events and scans the command line data for a wide range of Unicode emoji characters. A high-level alert is generated whenever emojis are detected, requiring further investigation into the context of the command executed. It addresses the risk of defense evasion by providing a means to flag suspicious activity that deviates from normal operational patterns. The potential for abuse in automated scripts or malicious payloads makes this rule critical for enhancing visibility where unexpected characters appear in command lines.
Categories
- Endpoint
- Windows
Data Sources
- Process
Created: 2022-12-05