Query Details
# Rule : Suspicious Node.js Execution of Masqueraded Font Payload
## Description
Detects Node.js executing font/static asset extensions (e.g., .woff2) indicating masquerading and malicious execution.
## Detection Logic
- Node process execution
- Command line contains .woff/.woff2/.ttf/.otf
## MITRE ATT&CK
- T1059 – Command and Scripting Interpreter
- T1027 – Obfuscated Files or Information
## Tags
Execution, Defense Evasion, Masquerading, Supply Chain
## Search Query
```kql
DeviceProcessEvents
| where FileName in~ ("node.exe", "node")
| where ProcessCommandLine has_any (".woff", ".woff2", ".ttf", ".otf")
```
## References
- PolinRider Campaign
- OpenSourceMalware research
This query is designed to identify potentially malicious activity involving Node.js. Specifically, it looks for instances where Node.js is used to execute files with font-related extensions such as .woff, .woff2, .ttf, or .otf. This behavior is unusual and may indicate that these files are being used to disguise malicious scripts or payloads.
node.exe or node).In summary, this query helps security teams detect and investigate suspicious Node.js activity that could be part of a broader attack strategy involving disguised malicious scripts.

Ali Hussein
Released: March 29, 2026
Tables
Keywords
Operators