598d29f811
chore: change tags, date, modified fields to comply with v2 of the Sigma spec. chore: update the related type from `obsoletes` to `obsolete`. chore: update local json schema to the latest version.
42 lines
1.0 KiB
YAML
42 lines
1.0 KiB
YAML
title: Potential Dosfuscation Activity
|
|
id: a77c1610-fc73-4019-8e29-0f51efc04a51
|
|
status: test
|
|
description: Detects possible payload obfuscation via the commandline
|
|
references:
|
|
- https://www.fireeye.com/content/dam/fireeye-www/blog/pdfs/dosfuscation-report.pdf
|
|
- https://github.com/danielbohannon/Invoke-DOSfuscation
|
|
author: frack113, Nasreddine Bencherchali (Nextron Systems)
|
|
date: 2022-02-15
|
|
modified: 2023-03-06
|
|
tags:
|
|
- attack.execution
|
|
- attack.t1059
|
|
logsource:
|
|
category: process_creation
|
|
product: windows
|
|
detection:
|
|
selection:
|
|
CommandLine|contains:
|
|
- '^^'
|
|
- '^|^'
|
|
- ',;,'
|
|
- ';;;;'
|
|
- ';; ;;'
|
|
- '(,(,'
|
|
- '%COMSPEC:~'
|
|
- ' c^m^d'
|
|
- '^c^m^d'
|
|
- ' c^md'
|
|
- ' cm^d'
|
|
- '^cm^d'
|
|
- ' s^et '
|
|
- ' s^e^t '
|
|
- ' se^t '
|
|
# - '%%'
|
|
# - '&&'
|
|
# - '""'
|
|
condition: selection
|
|
falsepositives:
|
|
- Unknown
|
|
level: medium
|