Detection rules › Sigma

Suspicious Deno File Written from Remote Source

Severity
low
Author
Josh Nickels, Michael Taggart
Source
upstream

Detects Deno writing a file from a direct HTTP(s) call and writing to the appdata folder or bringing it's own malicious DLL. This behavior may indicate an attempt to execute remotely hosted, potentially malicious files through deno.

MITRE ATT&CK coverage

TacticTechniques
ExecutionT1059.007 Command and Scripting Interpreter: JavaScript, T1204 User Execution
Command & ControlT1105 Ingress Tool Transfer

Event coverage

ProviderEvent IDTitle
Sysmon11FileCreate

Stages and Predicates

Stage 1: selection_path

or:
TargetFilename|contains: '\deno\gen\'
TargetFilename|contains: '\deno\remote\https\'
TargetFilename|contains: ':\Users\'
TargetFilename|contains: '\AppData\'

Indicators

Each row is a field, operator, and value that the rule matches. The corpus column counts how many other rules in the catalog look for the same combination: high numbers point to widely-used, community-vetted indicators. Blank or 1 shows that the indicator is specific to this rule.

FieldKindValues
TargetFilenamematch
  • :\Users\ corpus 3 (sigma 3)
  • \AppData\ corpus 3 (sigma 3)
  • \deno\gen\
  • \deno\remote\https\