
Summary
The detection rule identifies potential arbitrary code execution through `node.exe`, a runtime environment for executing JavaScript code. This executable is commonly bundled with various software products like VMware and Adobe, making its presence in unexpected contexts a potential security concern. The rule specifically looks for instances where `node.exe` is executed with command-line arguments that could indicate an attempt to run arbitrary scripts or commands. One notable attack vector includes establishing reverse shells, especially relevant in light of the Log4j vulnerabilities that were exploited in various cyber intrusions. The rule captures two main criteria: the execution of `node.exe` (with the image path ending in `node.exe`), combined with command-line parameters that could trigger script execution or socket creation for outbound connections—characteristic of reverse shell activities. By monitoring the combination of these indicators, the rule seeks to provide a proactive measure against script-based exploitation attempts.
Categories
- Endpoint
- Windows
- Cloud
- Application
Data Sources
- Process
Created: 2022-09-09