Analysis

  • max time kernel
    148s
  • max time network
    155s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20240611-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20240611-enlocale:en-usos:windows10-2004-x64system
  • submitted
    02-07-2024 13:56

General

  • Target

    ElectricLauncher/jre/bin/dtplugin/deployJava1.dll

  • Size

    1.2MB

  • MD5

    2c937101b876764ae379209d72120540

  • SHA1

    30ac1d97712cf9a56dc36176cee4ef398b6c395b

  • SHA256

    f258516d40b4ddce6fbb3da6791e71006aeca690b90e316e846d0336369cd1bb

  • SHA512

    966dde43cbaf7b905bbe24769b8d092ade97808028ad0fa346d10e02750bf893f57399d2ab3f2858d188555f36a66e1ff06fbdf88ca5a8de5fff8c59da6b5de1

  • SSDEEP

    12288:XXMEOOR48OLE3cvNvsV1wiAZSsrXxg0OSDDiU6ZJnL0oxQgSN2vChbOso6C6QJ1n:Xcg+8Qg2N0HwiAZhrq0OkDiU6ZJo2

Malware Config

Signatures

  • Event Triggered Execution: Component Object Model Hijacking 1 TTPs

    Adversaries may establish persistence by executing malicious content triggered by hijacked references to Component Object Model (COM) objects.

  • Modifies registry class 9 IoCs

Processes

  • C:\Windows\system32\regsvr32.exe
    regsvr32 /s C:\Users\Admin\AppData\Local\Temp\ElectricLauncher\jre\bin\dtplugin\deployJava1.dll
    1⤵
    • Modifies registry class
    PID:4952

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads