heroui logo

Potentially Suspicious Inline JavaScript Execution via NodeJS Binary

Sigma Rules

View Source
Summary
This detection rule targets potentially malicious inline JavaScript executions being executed through the Node.js binary on Windows systems. The rule is predicated on the identification of specific characteristics within the command line used to invoke Node.js, specifically looking for instances where the command line contains certain keywords associated with spawning and synchronizing file execution, such as 'execSync' and 'spawn', alongside modules like 'http', 'fs', 'path', and 'zlib'. Furthermore, the rule has a pair of selection criteria focusing on the image itself, requiring the executable to be 'node.exe'. This is important as it narrows down the detections to a specific environment likely exploited by threat actors. The potential false positives have been acknowledged, mainly situations involving legitimate Node.js scripts that utilize the identified modules. Overall, the intent of the rule is to mitigate risks posed by attackers that leverage Node.js functionalities for nefarious purposes, thus safeguarding system integrity.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
Created: 2025-04-21