← Back to SOC feed Coverage →

Potential File Extension Spoofing Using Right-to-Left Override

sigma HIGH SigmaHQ
T1036.002
imFileEvent
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at SigmaHQ →
Retrieved: 2026-03-25T03:05:59Z · Confidence: medium

Hunt Hypothesis

Adversaries may use right-to-left override characters in filenames to spoof legitimate file extensions and evade detection. SOC teams should proactively hunt for this behavior in Azure Sentinel to identify potential file-based attacks that rely on visual deception to bypass user awareness and security controls.

Detection Rule

Sigma (Original)

title: Potential File Extension Spoofing Using Right-to-Left Override
id: 979baf41-ca44-4540-9d0c-4fcef3b5a3a4
related:
    - id: ad691d92-15f2-4181-9aa4-723c74f9ddc3
      type: derived
status: test
description: |
    Detects suspicious filenames that contain a right-to-left override character and a potentially spoofed file extensions.
references:
    - https://redcanary.com/blog/right-to-left-override/
    - https://www.malwarebytes.com/blog/news/2014/01/the-rtlo-method
    - https://tria.ge/241015-l98snsyeje/behavioral2
    - https://www.unicode.org/versions/Unicode5.2.0/ch02.pdf
author: Jonathan Peters (Nextron Systems), Florian Roth (Nextron Systems), Swachchhanda Shrawan Poudel (Nextron Systems)
date: 2024-11-17
modified: 2025-02-06
tags:
    - attack.execution
    - attack.defense-evasion
    - attack.t1036.002
logsource:
    category: file_event
    product: windows
detection:
    selection_rtlo_unicode:
        TargetFilename|contains:
            - '\u202e'  # Unicode RTLO character
            - '[U+202E]'
    selection_extensions:
        TargetFilename|contains:
            - '3pm.'  # Reversed `.mp3`
            - '4pm.'  # Reversed `.mp4`
            - 'cod.'  # Reversed `.doc`
            - 'fdp.'  # Reversed `.pdf`
            - 'ftr.'  # Reversed `.rtf`
            - 'gepj.'  # Reversed `.jpeg`
            - 'gnp.'  # Reversed `.png`
            - 'gpj.'  # Reversed `.jpg`
            - 'ism.'  # Reversed `.msi`
            - 'lmth.'  # Reversed `.html`
            - 'nls.' # Reversed `.sln`
            - 'piz.'  # Reversed `.zip`
            - 'slx.'  # Reversed `.xls`
            - 'tdo.'  # Reversed `.odt`
            - 'vsc.'  # Reversed `.csv`
            - 'vwm.'  # Reversed `.wmv`
            - 'xcod.'  # Reversed `.docx`
            - 'xslx.'  # Reversed `.xlsx`
            - 'xtpp.'  # Reversed `.pptx`
    condition: all of selection_*
falsepositives:
    - Filenames that contains scriptures such as arabic or hebrew might make use of this character
level: high

KQL (Azure Sentinel)

imFileEvent
| where (TargetFileName contains "\\u202e" or TargetFileName contains "[U+202E]") and (TargetFileName contains "3pm." or TargetFileName contains "4pm." or TargetFileName contains "cod." or TargetFileName contains "fdp." or TargetFileName contains "ftr." or TargetFileName contains "gepj." or TargetFileName contains "gnp." or TargetFileName contains "gpj." or TargetFileName contains "ism." or TargetFileName contains "lmth." or TargetFileName contains "nls." or TargetFileName contains "piz." or TargetFileName contains "slx." or TargetFileName contains "tdo." or TargetFileName contains "vsc." or TargetFileName contains "vwm." or TargetFileName contains "xcod." or TargetFileName contains "xslx." or TargetFileName contains "xtpp.")

False Positive Guidance

MITRE ATT&CK Context

Original source: https://github.com/SigmaHQ/sigma/blob/master/rules/windows/file/file_event/file_event_win_susp_right_to_left_override_extension_spoofing.yml