← Back to SOC feed Coverage →

StrRAT-Malware-Persistence

kql MEDIUM Azure-Sentinel
DeviceProcessEvents
backdoorcredential-thefthuntingmicrosoftofficialpersistenceransomware
This rule was pulled from an open-source repository and enriched with AI. Validate in a test environment before deploying to production.
View original rule at Azure-Sentinel →
Retrieved: 2026-05-05T23:00:00Z · Confidence: medium

Hunt Hypothesis

The StrRAT-Malware-Persistence rule detects potential adversary persistence mechanisms by identifying suspicious Java-based remote access tool activity that could indicate long-term system control. SOC teams should proactively hunt for this behavior in Azure Sentinel to identify and mitigate StrRAT infections before they lead to data exfiltration or further lateral movement.

KQL Query

DeviceProcessEvents
| where InitiatingProcessFileName in~("java.exe","javaw.exe")
| where FileName == 'cmd.exe' and ProcessCommandLine has_all("schtasks /create", "tn Skype")

Analytic Rule Definition

id: fa9ef60d-4025-490b-94bd-5bff2aa3b4a7
name: StrRAT-Malware-Persistence
description: |
  StrRAT is a Java-based remote access tool which steals browser credentials, logs keystrokes and take remote control of infected systems. It also has a module to download additional payload onto to the infected machine based on C2 server command. Additionally, this threat also has a ransomware encryption/decryption module which appends .crimson extension.
requiredDataConnectors:
- connectorId: MicrosoftThreatProtection
  dataTypes:
  - DeviceProcessEvents
tactics:
- Persistence
query: |
  DeviceProcessEvents
  | where InitiatingProcessFileName in~("java.exe","javaw.exe")
  | where FileName == 'cmd.exe' and ProcessCommandLine has_all("schtasks /create", "tn Skype")

Required Data Sources

Sentinel TableNotes
DeviceProcessEventsEnsure this data connector is enabled

MITRE ATT&CK Context

References

False Positive Guidance

Original source: https://github.com/Azure/Azure-Sentinel/blob/main/Hunting Queries/Microsoft 365 Defender/Campaigns/StrRAT malware/StrRAT-Malware-Persistence.yaml