title: Adwind RAT / JRAT author: Florian Roth, Tom Ueltschi, Jonhnathan Ribeiro, oscd.community date: 2017/11/10 description: Detects javaw.exe in AppData folder as used by Adwind / JRAT detection: SELECTION_1: EventID: 11 SELECTION_2: TargetFilename: '*\AppData\Roaming\Oracle\bin\java*' SELECTION_3: TargetFilename: '*.exe*' SELECTION_4: TargetFilename: '*\Retrive*' SELECTION_5: TargetFilename: '*.vbs*' condition: (SELECTION_1 and ((SELECTION_2 and SELECTION_3) or (SELECTION_4 and SELECTION_5))) id: 0bcfabcb-7929-47f4-93d6-b33fb67d34d1 level: high logsource: category: file_event product: windows modified: 2021/09/19 references: - https://www.hybrid-analysis.com/sample/ba86fa0d4b6af2db0656a88b1dd29f36fe362473ae8ad04255c4e52f214a541c?environmentId=100 - https://www.first.org/resources/papers/conf2017/Advanced-Incident-Detection-and-Threat-Hunting-using-Sysmon-and-Splunk.pdf related: - id: 1fac1481-2dbc-48b2-9096-753c49b4ec71 type: derived status: experimental tags: - attack.execution - attack.t1059.005 - attack.t1059.007 - attack.t1064 yml_filename: file_event_mal_adwind.yml yml_path: /Users/user/Documents/YamatoSecurity/sigma/rules/windows/file_event