heroui logo

Suspicious Deno File Written from Remote Source

Sigma Rules

View Source
Summary
This detection rule targets potentially malicious behaviors associated with Deno, a runtime for JavaScript and TypeScript, particularly focusing on incidents where Deno writes files from remote sources. The rule specifically looks for file write events in the appdata folder that originate from direct HTTP(S) calls, indicative of script execution that may rely on externally hosted content. Given that Deno can execute code from URLs directly, this rule aims to flag instances where this capability is misused to execute malicious payloads, such as unauthorized DLLs. The detection logic leverages path-based criteria, targeting specific Deno-related directories like `\deno\gen\` and `\deno\remote\https\`, and it checks for file creation events occurring within user AppData directories, which are typical for potentially harmful operations. The detection is classified under a 'low' severity level, reflecting a cautious approach to managing false positives.
Categories
  • Windows
  • Endpoint
Data Sources
  • File
Created: 2025-05-22