Skip to content

False Detections with Invoke-Obfuscation and Null Bytes #4875

Open
@KingKDot

Description

@KingKDot

Rule UUID

f3a98ce4-6164-4dd4-867c-4d83de7eca51

Example EventLog

I found this off virus total lol

Description

Script Block is

ScriptBlockText|re: '\w+`(\w+|-|.)`[\w+|\s]'

False code detected is:

$aes_key = "KDOT-ON-TOP`0`0`0`0`0`0`0`0`0`0`0`0`0`0`0`0`0`0`0`0`0"

Similar code it's meant to detect:

        # Examples:
        #   IN`V`o`Ke-eXp`ResSIOn (Ne`W-ob`ject Net.WebClient).DownloadString
        #   &('In'+'voke-Expressi'+'o'+'n') (.('New-Ob'+'jec'+'t') Net.WebClient).DownloadString
        #   &("{2}{3}{0}{4}{1}"-f 'e','Expression','I','nvok','-') (&("{0}{1}{2}"-f'N','ew-O','bject') Net.WebClient).DownloadString
        #   ${e`Nv:pATh}

It's looking for obfuscating text but mistaking null bytes as obfuscated text.

Metadata

Metadata

Assignees

Labels

False-PositiveIssue reporting a false positive with one of the rulesWork In ProgressSome changes are needed

Type

No type

Projects

No projects

Milestone

No milestone

Relationships

None yet

Development

No branches or pull requests

Issue actions