Suspicious Deno File Written from Remote Source

Detects Deno writing a file from a direct HTTP(s) call and writing to the appdata folder or bringing it's own malicious DLL. This behavior may indicate an attempt to execute remotely hosted, potentially malicious files through deno.

Sigma rule (View on GitHub)

 1title: Suspicious Deno File Written from Remote Source
 2id: 6c0ce3b6-85e2-49d4-9c3f-6e008ce9796e
 3status: experimental
 4description: |
 5    Detects Deno writing a file from a direct HTTP(s) call and writing to the appdata folder or bringing it's own malicious DLL.
 6    This behavior may indicate an attempt to execute remotely hosted, potentially malicious files through deno.    
 7references:
 8    - https://taggart-tech.com/evildeno/
 9author: Josh Nickels, Michael Taggart
10date: 2025-05-22
11tags:
12    - attack.execution
13    - attack.t1204
14    - attack.t1059.007
15    - attack.command-and-control
16    - attack.t1105
17logsource:
18    category: file_event
19    product: windows
20detection:
21    selection_path:
22        TargetFilename|contains:
23            - '\deno\gen\'
24            - '\deno\remote\https\'
25        TargetFilename|contains|all:
26            - ':\Users\'
27            - '\AppData\'
28    condition: selection_path
29falsepositives:
30    - Legitimate usage of deno to request a file or bring a DLL to a host
31level: low

References

Related rules

to-top