
Summary
This detection rule identifies suspicious execution patterns involving the NodeJS interpreter on Windows systems. It focuses on processes initiated by 'node.exe' that may indicate malicious activities, specifically targeting scenarios where adversaries exploit scripting utilities to execute harmful scripts. The rule triggers when certain conditions are met, such as monitoring the invocation of 'node.exe' with specific command-line arguments, unusual parent-child process structures, and execution contexts that deviate from normal operational behavior. It correlates various data sources including logs from Microsoft Defender for Endpoint, CrowdStrike, and SentinelOne to enhance detection efficacy and reduce the likelihood of false positives. Investigative steps associated with the alert include analyzing command line arguments, parent processes, and verifying user actions to discern legitimate script usage from potential threats. The high risk score of 73 reflects the prioritization of such behavioral detections within an endpoint security framework.
Categories
- Endpoint
- Windows
Data Sources
- Process
- Windows Registry
- Application Log
- User Account
- Network Traffic
ATT&CK Techniques
- T1059
- T1059.007
Created: 2025-08-21