heroui logo

Suspicious JavaScript Execution via Deno

Elastic Detection Rules

View Source
Summary
Detects Windows endpoint processes that start a Deno JavaScript runtime (deno.exe) with suspicious command-line patterns. The rule flags starts where the process name, PE original file name, or code-signature subject matches Deno Land Inc., and the command line contains JavaScript-related indicators such as base64-encoded payloads, eval statements, http imports, or JavaScript imports. This pattern is commonly used by adversaries to execute inline or remote JavaScript for initial access, execution, or staging. The query (in EQL) targets Windows hosts and examines process.start events for deno.exe with command lines matching the specified patterns. It aligns with MITRE ATT&CK Execution (T1059, T1059.007 - JavaScript) and aggregates signals from multiple telemetry sources (Sysmon, Windows Security Event Logs, Defender for Endpoint, CrowdStrike, Elastic Endgame, SentinelOne, etc.). The rule has a high severity and risk score, reflecting its potential for rapid code execution abuse. It supports triage and investigation by correlating script execution with parent processes, downloads, or network activity, and informs containment and remediation if abuse is confirmed.
Categories
  • Endpoint
  • Windows
Data Sources
  • Process
  • Image
  • File
  • Certificate
ATT&CK Techniques
  • T1059
  • T1059.007
Created: 2026-03-19