Skip to content

Commit 3eb0198

Browse files
Merge PR #5445 from @swachchhanda000 - feat: add coverage for Unicode Space Character Obfuscation
update: Suspicious Double Extension Files: add more suspicious extension combination update: Potential CommandLine Obfuscation Using Unicode Characters From Suspicious Image - add Unicode space character update: Suspicious Double Extension File Execution: add more suspicious extension combination --------- Co-authored-by: nasbench <[email protected]>
1 parent 4c8e709 commit 3eb0198

File tree

3 files changed

+60
-28
lines changed

3 files changed

+60
-28
lines changed

rules/windows/file/file_event/file_event_win_susp_double_extension.yml

Lines changed: 9 additions & 2 deletions
Original file line numberDiff line numberDiff line change
@@ -13,9 +13,10 @@ references:
1313
- https://www.cybereason.com/blog/research/a-bazar-of-tricks-following-team9s-development-cycles
1414
- https://twitter.com/malwrhunterteam/status/1235135745611960321
1515
- https://twitter.com/luc4m/status/1073181154126254080
16+
- https://cloud.google.com/blog/topics/threat-intelligence/cybercriminals-weaponize-fake-ai-websites
1617
author: Nasreddine Bencherchali (Nextron Systems), frack113
1718
date: 2022-06-19
18-
modified: 2022-11-07
19+
modified: 2025-05-30
1920
tags:
2021
- attack.defense-evasion
2122
- attack.t1036.007
@@ -27,16 +28,22 @@ detection:
2728
TargetFilename|endswith:
2829
- '.exe'
2930
- '.iso'
30-
# - '.lnk' # legitimate links can happen just anywhere
3131
- '.rar'
3232
- '.zip'
33+
# - '.lnk' # legitimate links can happen just anywhere
3334
TargetFilename|contains:
3435
- '.doc.'
3536
- '.docx.'
37+
- '.gif.'
38+
- '.jpeg.'
3639
- '.jpg.'
40+
- '.mp3.'
41+
- '.mp4.'
3742
- '.pdf.'
43+
- '.png.'
3844
- '.ppt.'
3945
- '.pptx.'
46+
- '.svg.'
4047
- '.xls.'
4148
- '.xlsx.'
4249
selection_exe:

rules/windows/process_creation/proc_creation_win_susp_cli_obfuscation_unicode_img.yml

Lines changed: 5 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -16,7 +16,7 @@ references:
1616
- https://github.com/redcanaryco/atomic-red-team/blob/f339e7da7d05f6057fdfcdd3742bfcf365fee2a9/atomics/T1027/T1027.md#atomic-test-6---dlp-evasion-via-sensitive-data-in-vba-macro-over-http
1717
author: frack113, Florian Roth (Nextron Systems), Josh Nickels
1818
date: 2024-09-02
19-
modified: 2024-09-05
19+
modified: 2025-05-30
2020
tags:
2121
- attack.defense-evasion
2222
- attack.t1027
@@ -29,12 +29,14 @@ detection:
2929
- '\cmd.exe'
3030
- '\cscript.exe'
3131
- '\powershell.exe'
32+
- '\powershell_ise.exe'
3233
- '\pwsh.exe'
3334
- '\wscript.exe'
3435
OriginalFileName:
3536
- 'Cmd.EXE'
3637
- 'cscript.exe'
3738
- 'PowerShell.EXE'
39+
- 'PowerShell_ISE.EXE'
3840
- 'pwsh.dll'
3941
- 'wscript.exe'
4042
selection_special_chars:
@@ -55,6 +57,8 @@ detection:
5557
- '¯'
5658
- '®'
5759
- ''
60+
# Unicode whitespace characters
61+
- '' # Braille Pattern Blank (Unicode: U+2800)
5862
condition: all of selection_*
5963
falsepositives:
6064
- Unknown

rules/windows/process_creation/proc_creation_win_susp_double_extension.yml

Lines changed: 46 additions & 25 deletions
Original file line numberDiff line numberDiff line change
@@ -8,9 +8,10 @@ description: Detects suspicious use of an .exe extension after a non-executable
88
references:
99
- https://blu3-team.blogspot.com/2019/06/misleading-extensions-xlsexe-docexe.html
1010
- https://twitter.com/blackorbird/status/1140519090961825792
11+
- https://cloud.google.com/blog/topics/threat-intelligence/cybercriminals-weaponize-fake-ai-websites
1112
author: Florian Roth (Nextron Systems), @blu3_team (idea), Nasreddine Bencherchali (Nextron Systems)
1213
date: 2019-06-26
13-
modified: 2023-02-28
14+
modified: 2025-05-30
1415
tags:
1516
- attack.initial-access
1617
- attack.t1566.001
@@ -20,48 +21,68 @@ logsource:
2021
detection:
2122
selection:
2223
Image|endswith:
23-
- '.doc.exe'
24-
- '.docx.exe'
25-
- '.xls.exe'
26-
- '.xlsx.exe'
27-
- '.ppt.exe'
28-
- '.pptx.exe'
29-
- '.rtf.exe'
30-
- '.pdf.exe'
31-
- '.txt.exe'
3224
- ' .exe'
3325
- '______.exe'
26+
- '.doc.exe'
3427
- '.doc.js'
28+
- '.docx.exe'
3529
- '.docx.js'
36-
- '.xls.js'
37-
- '.xlsx.js'
30+
- '.gif.exe'
31+
- '.jpeg.exe'
32+
- '.jpg.exe'
33+
- '.mkv.exe'
34+
- '.mov.exe'
35+
- '.mp3.exe'
36+
- '.mp4.exe'
37+
- '.pdf.exe'
38+
- '.pdf.js'
39+
- '.png.exe'
40+
- '.ppt.exe'
3841
- '.ppt.js'
42+
- '.pptx.exe'
3943
- '.pptx.js'
44+
- '.rtf.exe'
4045
- '.rtf.js'
41-
- '.pdf.js'
46+
- '.svg.exe'
47+
- '.txt.exe'
4248
- '.txt.js'
43-
CommandLine|contains:
44-
- '.doc.exe'
45-
- '.docx.exe'
4649
- '.xls.exe'
50+
- '.xls.js'
4751
- '.xlsx.exe'
48-
- '.ppt.exe'
49-
- '.pptx.exe'
50-
- '.rtf.exe'
51-
- '.pdf.exe'
52-
- '.txt.exe'
52+
- '.xlsx.js'
53+
- '⠀⠀⠀⠀⠀⠀.exe' # Unicode Space Character: Braille Pattern Blank (Unicode: U+2800)
54+
CommandLine|contains:
5355
- ' .exe'
5456
- '______.exe'
57+
- '.doc.exe'
5558
- '.doc.js'
59+
- '.docx.exe'
5660
- '.docx.js'
57-
- '.xls.js'
58-
- '.xlsx.js'
61+
- '.gif.exe'
62+
- '.jpeg.exe'
63+
- '.jpg.exe'
64+
- '.mkv.exe'
65+
- '.mov.exe'
66+
- '.mp3.exe'
67+
- '.mp4.exe'
68+
- '.pdf.exe'
69+
- '.pdf.js'
70+
- '.png.exe'
71+
- '.ppt.exe'
5972
- '.ppt.js'
73+
- '.pptx.exe'
6074
- '.pptx.js'
75+
- '.rtf.exe'
6176
- '.rtf.js'
62-
- '.pdf.js'
77+
- '.svg.exe'
78+
- '.txt.exe'
6379
- '.txt.js'
80+
- '.xls.exe'
81+
- '.xls.js'
82+
- '.xlsx.exe'
83+
- '.xlsx.js'
84+
- '⠀⠀⠀⠀⠀⠀.exe' # Unicode Space Character: Braille Pattern Blank (Unicode: U+2800)
6485
condition: selection
6586
falsepositives:
6687
- Unknown
67-
level: critical
88+
level: high

0 commit comments

Comments
 (0)