Right-to-Left Override Character Used for Defense Evasion
Adversaries are using the Right-to-Left Override (RTLO) character (U+202E) in command-line arguments to obfuscate malicious file names and trick users into executing them, achieving defense evasion.
The Right-to-Left Override (RTLO) character (U+202E) is a Unicode character that causes text to be rendered from right to left. Adversaries are leveraging this character in Windows command-line arguments to obfuscate malicious file names and extensions. By embedding the RTLO character within a file name or command, attackers can visually reverse the order of characters, making a malicious file appear to be harmless. For example, a file named “evil.exe” might be renamed to “evil[U+202E]exe.pdf”, which would display as “evilpdf.exe” to a user, potentially tricking them into executing the malicious file. This technique is used to bypass security controls and social engineering. The use of RTLO is not new, but it continues to be an effective method of tricking end users.
Attack Chain
- An attacker crafts a malicious executable file (e.g.,
trojan.exe). - The attacker renames the malicious file, embedding the RTLO character (U+202E) within the file name to reverse the visual presentation (e.g.,
trojan[U+202E]exe.scr). - The renamed file (e.g.,
trojanscr.exe) is distributed to the target, often via phishing or other social engineering methods. - The user, seeing the reversed file extension, mistakes the file for a screensaver file (
.scr) and executes it. - Upon execution, the malicious executable runs with the privileges of the user.
- The malware may then perform malicious activities such as installing additional malware, establishing persistence, or exfiltrating data.
- The attacker may use the initial foothold to escalate privileges and move laterally within the network.
Impact
Successful exploitation can lead to the execution of arbitrary code, potentially compromising the entire system. This can result in data theft, system damage, or further propagation of malware within the network. The obfuscation technique makes it harder for users to identify malicious files, increasing the likelihood of successful attacks.
Recommendation
- Deploy the Sigma rule
Detect Process Creation with Right-to-Left Override Characterto your SIEM to detect processes spawned with the RTLO character in the command line. - Educate users about the risks of the RTLO character and how it can be used to disguise malicious files.
- Implement file extension filtering to block execution of suspicious file types (e.g.,
.exe,.scr) from untrusted locations. - Monitor process creation events for unusual file names or command-line arguments containing the RTLO character.
- Enable Sysmon process creation logging to capture command-line arguments, which is essential for detecting this technique.
Detection coverage 2
Detect Process Creation with Right-to-Left Override Character
highDetects process creation events where the command line contains the Right-to-Left Override (RTLO) character (U+202E).
Detect File Creation with Right-to-Left Override Character
mediumDetects file creation events where the file name contains the Right-to-Left Override (RTLO) character (U+202E).
Detection queries are kept inside the platform. Get full rules →