Back to Intelligence

Trojanized Gaming Tools Hijack Systems with Java RAT and PowerShell

SA
Security Arsenal Team
February 27, 2026
5 min read

Trojanized Gaming Tools Hijack Systems with Java RAT and PowerShell

Introduction

The gaming community has become a prime target for cybercriminals looking to exploit high-performance hardware and, often, relaxed security postures on personal machines. Security Arsenal analysts are tracking a concerning trend where threat actors distribute trojanized gaming utilities via browsers and chat platforms to deliver a Java-based Remote Access Trojan (RAT).

Unlike standard malware that relies on the host's installed software, this campaign is notable for its sophistication: the attackers stage their own portable Java runtime environment. This ensures the malicious payload executes regardless of the victim's local configuration, significantly broadening the attack surface.

Analysis: Breaking Down the Attack Chain

According to intelligence from Microsoft Threat Intelligence, the infection cycle begins when a user is lured into downloading a malicious file, often disguised as a cheat, mod, or game optimization tool. Once executed, the threat leverages a series of techniques to maintain persistence and obfuscation.

The Attack Vector

  1. Initial Access: The malware arrives through social engineering channels, primarily peer-to-peer chat platforms and forums where gamers congregate.
  2. Staging: Instead of relying on javaw.exe existing in a standard directory like C:\Program Files\Java\, the malicious downloader creates a portable Java Runtime Environment (JRE) on the fly. This "living-off-the-land" variation allows the attacker to bypass application whitelisting rules that might trust standard installation paths while flagging unknown binaries.
  3. Payload Execution: The chain culminates in the execution of a malicious Java Archive (JAR) file. In this specific campaign, the file has been observed masquerading as jd-gui.jar, a legitimate name for a popular Java decompiler. This naming convention is a clever social engineering tactic designed to trick technical users or analysts into believing the file is benign.
  4. Command and Control: The use of PowerShell facilitates the download and execution stages, providing the attacker with a powerful scripting interface to manipulate the system further.

Why Java-Based RATs are Dangerous

Java-based RATs are particularly insidious because they are cross-platform capable. While this specific campaign targets Windows users (evidenced by PowerShell usage), the underlying code can often be easily adapted for Linux or macOS. The use of a portable JRE further masks the malicious activity, as the process execution stems from a user-writeable directory rather than a trusted system location.

Detection and Threat Hunting

To identify this threat within your environment, security teams should hunt for anomalies involving Java processes spawned from non-standard paths or initiated by PowerShell. Below are specific queries and scripts to aid in detection.

KQL Queries (Microsoft Sentinel/Defender)

This query looks for Java processes (javaw.exe or java.exe) originating from directories outside of standard Program Files paths, specifically targeting user directories or temporary folders where portable runtimes typically reside.

Script / Code
DeviceProcessEvents
| where Timestamp > ago(7d)
| where FileName in~ ("javaw.exe", "java.exe")
| where FolderPath !contains @"Program Files\Java" 
and FolderPath !contains @"Program Files (x86)\Java"
| where InitiatingProcessFileName == "powershell.exe" or InitiatingProcessFileName == "cmd.exe"
| project Timestamp, DeviceName, FileName, FolderPath, InitiatingProcessFileName, InitiatingProcessCommandLine, SHA256
| order by Timestamp desc

This query hunts for the specific malicious file name mentioned in the reports.

Script / Code
DeviceFileEvents
| where Timestamp > ago(30d)
| where FileName =~ "jd-gui.jar"
| project Timestamp, DeviceName, FolderPath, ActionType, SHA256
| order by Timestamp desc

PowerShell Hunting Script

Analysts can use this script to scan user download directories and AppData folders for suspicious JAR files or portable Java folders that are not signed by known vendors.

Script / Code
$PathsToScan = @("$env:USERPROFILE\Downloads", "$env:USERPROFILE\AppData\Local\Temp", "$env:APPDATA")

Write-Host "Scanning for suspicious JAR files and portable Java runtimes..."

foreach ($Path in $PathsToScan) {
    if (Test-Path $Path) {
        # Find JAR files
        $Jars = Get-ChildItem -Path $Path -Filter "*.jar" -Recurse -ErrorAction SilentlyContinue
        foreach ($Jar in $Jars) {
            Write-Host "Found JAR: $($Jar.FullName)"
        }

        # Find portable java executables in non-standard paths
        $JavaExes = Get-ChildItem -Path $Path -Filter "java.exe" -Recurse -ErrorAction SilentlyContinue
        foreach ($Exe in $JavaExes) {
            # Check if it is in a subfolder that looks like a portable runtime (e.g., contains 'runtime' or 'jre')
            if ($Exe.Directory.FullName -match 'runtime|jre|bin') {
                Write-Host "Alert: Portable Java found at $($Exe.FullName)"
            }
        }
    }
}

Mitigation Strategies

Defending against this type of threat requires a layered approach that combines user awareness with technical controls.

  1. Application Allowlisting: Implement strict allowlisting policies (e.g., AppLocker) that prevent Java executables from running from user-profile directories or temporary folders. Java should only be allowed to execute from trusted, installation-specific paths.

  2. PowerShell Constrained Language Mode: Enforce Constrained Language Mode for users who do not require full scripting capabilities. This severely limits the ability of downloaders to execute complex staging scripts.

  3. Attack Surface Reduction (ASR) Rules: Enable the ASR rule "Block all Office applications from creating child processes" and "Block JavaScript or VBScript from launching downloaded executable content" where applicable, as these vectors often overlap.

  4. User Education: Specifically target staff or users known to engage in gaming or downloading third-party utilities. Emphasize the risks of "portable" software versions and the importance of verifying software sources.

  5. Network Segmentation: Ensure that BYOD or personal devices used for gaming do not have direct access to critical network segments if they are permitted on the corporate network.


Related Resources

Security Arsenal Alert Triage Automation AlertMonitor Platform Book a SOC Assessment platform Intel Hub

alert-fatiguetriagealertmonitorsocjava-ratthreat-huntinggaming-securitypowershell

Is your security operations ready?

Get a free SOC assessment or see how AlertMonitor cuts through alert noise with automated triage.