EXPLORE
← Back to Explore
T1027.010

Command Obfuscation

Adversaries may obfuscate content during command execution to impede detection. Command-line obfuscation is a method of making strings and patterns within commands and scripts more difficult to signature and analyze. This type of obfuscation can be included within commands executed by delivered payloads (e.g., [Phishing](https://attack.mitre.org/techniques/T1566) and [Drive-by Compromise](https://attack.mitre.org/techniques/T1189)) or interactively via [Command and Scripting Interpreter](https:/...

LinuxmacOSWindows
31
Detections
4
Sources
28
Threat Actors

BY SOURCE

23elastic6sigma1crowdstrike_cql1splunk_escu

PROCEDURES (19)

Amsi4 detections

Auto-extracted: 4 detections for amsi

Bypass4 detections

Auto-extracted: 4 detections for bypass

Registry2 detections

Auto-extracted: 2 detections for registry

Script Block2 detections

Auto-extracted: 2 detections for script block

Obfuscat2 detections

Auto-extracted: 2 detections for obfuscat

Http2 detections

Auto-extracted: 2 detections for http

Token2 detections

Auto-extracted: 2 detections for token

Base642 detections

Auto-extracted: 2 detections for base64

Token1 detections

Auto-extracted: 1 detections for token

Suspicious1 detections

Auto-extracted: 1 detections for suspicious

Command Line Monitoring1 detections

Auto-extracted: 1 detections for command line monitoring

Base641 detections

Auto-extracted: 1 detections for base64

Script Execution Monitoring1 detections

Auto-extracted: 1 detections for script execution monitoring

Obfuscat1 detections

Auto-extracted: 1 detections for obfuscat

Obfuscat1 detections

Auto-extracted: 1 detections for obfuscat

Amsi1 detections

Auto-extracted: 1 detections for amsi

Suspicious1 detections

Auto-extracted: 1 detections for suspicious

Phish1 detections

Auto-extracted: 1 detections for phish

Unusual1 detections

Auto-extracted: 1 detections for unusual

DETECTIONS (31)

Command Line Obfuscation via Whitespace Padding
elasticmedium
Command Obfuscation via Unicode Modifier Letters
elastichigh
Decoded Payload Piped to Interpreter Detected via Defend for Containers
elastichigh
Deprecated - Potential PowerShell Obfuscated Script
elasticlow
Dynamic IEX Reconstruction via Method String Access
elasticlow
Multi-Base64 Decoding Attempt from Suspicious Location
elasticmedium
Obfuscated PowerShell MSI Install via WindowsInstaller COM
sigmahigh
Potential Antimalware Scan Interface Bypass via PowerShell
elastichigh
Potential Dynamic IEX Reconstruction via Environment Variables
elasticmedium
Potential Hex Payload Execution via Command-Line
elasticlow
Potential Obfuscated Ordinal Call Via Rundll32
sigmamedium
Potential PowerShell Obfuscated Script via High Entropy
elasticlow
Potential PowerShell Obfuscation via Backtick-Escaped Variable Expansion
elastichigh
Potential PowerShell Obfuscation via Character Array Reconstruction
elastichigh
Potential PowerShell Obfuscation via Concatenated Dynamic Command Invocation
elastichigh
Potential PowerShell Obfuscation via High Numeric Character Proportion
elasticlow
Potential PowerShell Obfuscation via Invalid Escape Sequences
elasticmedium
Potential PowerShell Obfuscation via Reverse Keywords
elasticlow
Potential PowerShell Obfuscation via Special Character Overuse
elasticmedium
Potential PowerShell Obfuscation via String Concatenation
elastichigh
Potential PowerShell Obfuscation via String Reordering
elasticmedium
Powershell Command Length Anomaly Detection
crowdstrike_cql
PowerShell Obfuscation via Negative Index String Reversal
elasticlow
Suspicious Execution with NodeJS
elastichigh
Suspicious Explorer Process with Whitespace Padding - ClickFix/FileFix
sigmahigh
Suspicious Powershell Script
elasticlow
Suspicious Space Characters in RunMRU Registry Path - ClickFix
sigmahigh
Suspicious Space Characters in TypedPaths Registry Path - FileFix
sigmahigh
Suspicious Usage of For Loop with Recursive Directory Search in CMD
sigmamedium
Suspicious Windows Powershell Arguments
elasticmedium
Windows PowerShell Process Implementing Manual Base64 Decoder
splunk_escu