← Back to SOC feed Coverage →

Suspicious Deno File Written from Remote Source

sigma LOW SigmaHQ
T1204T1059.007T1105
imFileEvent
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at SigmaHQ →
Retrieved: 2026-03-25T02:50:08Z · Confidence: low

Hunt Hypothesis

Adversaries may be using Deno to download and execute malicious files from remote HTTP(s) sources, leveraging the appdata directory to persist or execute payloads. SOC teams should proactively hunt for this behavior in Azure Sentinel to identify potential remote code execution attempts and early-stage malware deployment.

Detection Rule

Sigma (Original)

title: Suspicious Deno File Written from Remote Source
id: 6c0ce3b6-85e2-49d4-9c3f-6e008ce9796e
status: experimental
description: |
    Detects Deno writing a file from a direct HTTP(s) call and writing to the appdata folder or bringing it's own malicious DLL.
    This behavior may indicate an attempt to execute remotely hosted, potentially malicious files through deno.
references:
    - https://taggart-tech.com/evildeno/
author: Josh Nickels, Michael Taggart
date: 2025-05-22
tags:
    - attack.execution
    - attack.t1204
    - attack.t1059.007
    - attack.command-and-control
    - attack.t1105
logsource:
    category: file_event
    product: windows
detection:
    selection_path:
        TargetFilename|contains:
            - '\deno\gen\'
            - '\deno\remote\https\'
        TargetFilename|contains|all:
            - ':\Users\'
            - '\AppData\'
    condition: selection_path
falsepositives:
    - Legitimate usage of deno to request a file or bring a DLL to a host
level: low

KQL (Azure Sentinel)

imFileEvent
| where (TargetFileName contains "\\deno\\gen\\" or TargetFileName contains "\\deno\\remote\\https\\") and (TargetFileName contains ":\\Users\\" and TargetFileName contains "\\AppData\\")

False Positive Guidance

MITRE ATT&CK Context

Original source: https://github.com/SigmaHQ/sigma/blob/master/rules/windows/file/file_event/file_event_win_creation_deno.yml