Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
62s -
max time network
68s -
platform
windows7_x64 -
resource
win7-20220901-en -
resource tags
arch:x64arch:x86image:win7-20220901-enlocale:en-usos:windows7-x64system -
submitted
07/02/2023, 20:18
Static task
static1
Behavioral task
behavioral1
Sample
launcherfull-shiginima-v4400.exe
Resource
win7-20220901-en
Behavioral task
behavioral2
Sample
launcherfull-shiginima-v4400.exe
Resource
win10v2004-20220812-en
General
-
Target
launcherfull-shiginima-v4400.exe
-
Size
5.4MB
-
MD5
c3db052da531710367faf5e011475715
-
SHA1
46f599e4e1ece582006739debe0a522925a9cd13
-
SHA256
7c6220b046553f9c95b8098ff83bfc6b7828093650becbc1b44e3d7819d7efd1
-
SHA512
67bfb67b36dab91e37b1ada7fbd688dc39cf19c337e3938d1f7e4f47173b7dc9d0b93dc035d6511ce65b8fe44384bb9cffa9953e97c6fffadb29fd561eec7feb
-
SSDEEP
98304:qpTJ89MMbcZsgsDlilods/txVGHTJKsTnEFnAzvDfBzXEYNsJ5Ono:aTm9MMbcFililB0HdRTnEFnAzlEQsJ5H
Malware Config
Signatures
-
Downloads MZ/PE file
-
Executes dropped EXE 2 IoCs
pid Process 1456 JavaSetup8u361.exe 1776 JavaSetup8u361.exe -
Loads dropped DLL 1 IoCs
pid Process 1456 JavaSetup8u361.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
-
Modifies Internet Explorer Phishing Filter 1 TTPs 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\PhishingFilter iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\PhishingFilter\ClientSupported_MigrationTime = e8b3b57a313bd901 iexplore.exe -
description ioc Process Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DontShowMeThisDialogAgain iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Zoom iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\CompatibilityFlags = "0" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\java.com\Total = "22" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "229" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\InternetRegistry iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry\DOMStorage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\java.com\NumberOfSubdomains = "1" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\PageSetup iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\java.com\Total = "224" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main JavaSetup8u361.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "224" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\java.com\Total = "209" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IntelliForms iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\java.com\Total = "42" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.java.com\ = "122" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\LowRegistry iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive\{A9B7B6A1-A724-11ED-9FD0-D6EA6736E294} = "0" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\BrowserEmulation\LowMic iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.java.com\ = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "122" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\java.com\Total = "229" IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "42" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.java.com\ = "42" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "22" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\java.com IEXPLORE.EXE Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch\Version = "WS not running" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.java.com\ = "22" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Toolbar\WebBrowser iexplore.exe Set value (str) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\FullScreen = "no" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\Window_Placement = 2c0000000200000003000000ffffffffffffffffffffffffffffffff2400000024000000aa04000089020000 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.java.com IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\java.com\Total = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\java.com\Total = "122" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NTPFirstRun = "1" iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\IETld\LowMic iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\AdminActive iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\LastProcessed = 30207881313bd901 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "0" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.java.com\ = "224" IEXPLORE.EXE Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main\WindowsSearch iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Recovery\PendingRecovery\AdminActive = "0" iexplore.exe Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\DecayDateQueue = 01000000d08c9ddf0115d1118c7a00c04fc297eb01000000c7bbb319e4ef77489405bc3fa0f39f500000000002000000000010660000000100002000000040c76653b15eaf070b4b83e5a58a2cf8f22e184c12b172d237f10b1dda2e9205000000000e800000000200002000000081fd2495f86cff00534c45feb48a52bb0d611df212c29d02e14fce1c66cd141220000000e6d2eeeb777b4e56ea6e5ee9fbd4a8cced2e27b464db815eb63ee9931685fafb400000005a5f8f33207d6547137ef76a5179acdaf852278a8ab9fb3d311e16f545adffc3563116d981e518c367ae0dec53cd65c4e1acbdb55e56ea77f58cd78d8dd9af55 iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\GPU iexplore.exe Key created \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\Main IEXPLORE.EXE Set value (data) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\TabbedBrowsing\NewTabPage\MFV = 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 iexplore.exe Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.java.com\ = "229" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\Total\ = "209" IEXPLORE.EXE Set value (int) \REGISTRY\USER\S-1-5-21-4063495947-34355257-727531523-1000\Software\Microsoft\Internet Explorer\DOMStorage\www.java.com\ = "209" IEXPLORE.EXE -
Suspicious use of FindShellTrayWindow 2 IoCs
pid Process 900 iexplore.exe 900 iexplore.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 900 iexplore.exe 900 iexplore.exe 1896 IEXPLORE.EXE 1896 IEXPLORE.EXE 1896 IEXPLORE.EXE 1896 IEXPLORE.EXE 1776 JavaSetup8u361.exe 1776 JavaSetup8u361.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 1808 wrote to memory of 900 1808 launcherfull-shiginima-v4400.exe 27 PID 1808 wrote to memory of 900 1808 launcherfull-shiginima-v4400.exe 27 PID 1808 wrote to memory of 900 1808 launcherfull-shiginima-v4400.exe 27 PID 1808 wrote to memory of 900 1808 launcherfull-shiginima-v4400.exe 27 PID 900 wrote to memory of 1896 900 iexplore.exe 29 PID 900 wrote to memory of 1896 900 iexplore.exe 29 PID 900 wrote to memory of 1896 900 iexplore.exe 29 PID 900 wrote to memory of 1896 900 iexplore.exe 29 PID 900 wrote to memory of 1896 900 iexplore.exe 29 PID 900 wrote to memory of 1896 900 iexplore.exe 29 PID 900 wrote to memory of 1896 900 iexplore.exe 29 PID 1456 wrote to memory of 1776 1456 JavaSetup8u361.exe 33 PID 1456 wrote to memory of 1776 1456 JavaSetup8u361.exe 33 PID 1456 wrote to memory of 1776 1456 JavaSetup8u361.exe 33 PID 1456 wrote to memory of 1776 1456 JavaSetup8u361.exe 33 PID 1456 wrote to memory of 1776 1456 JavaSetup8u361.exe 33 PID 1456 wrote to memory of 1776 1456 JavaSetup8u361.exe 33 PID 1456 wrote to memory of 1776 1456 JavaSetup8u361.exe 33
Processes
-
C:\Users\Admin\AppData\Local\Temp\launcherfull-shiginima-v4400.exe"C:\Users\Admin\AppData\Local\Temp\launcherfull-shiginima-v4400.exe"1⤵
- Suspicious use of WriteProcessMemory
PID:1808 -
C:\Program Files\Internet Explorer\iexplore.exe"C:\Program Files\Internet Explorer\iexplore.exe" http://java.com/download2⤵
- Modifies Internet Explorer Phishing Filter
- Modifies Internet Explorer settings
- Suspicious use of FindShellTrayWindow
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE"C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:900 CREDAT:275457 /prefetch:23⤵
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1896
-
-
-
C:\Users\Admin\Downloads\JavaSetup8u361.exe"C:\Users\Admin\Downloads\JavaSetup8u361.exe"1⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\jds7123785.tmp\JavaSetup8u361.exe"C:\Users\Admin\AppData\Local\Temp\jds7123785.tmp\JavaSetup8u361.exe"2⤵
- Executes dropped EXE
- Modifies Internet Explorer settings
- Suspicious use of SetWindowsHookEx
PID:1776
-
Network
MITRE ATT&CK Enterprise v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04
Filesize471B
MD5c74b9af3d6411715572f207cb1460251
SHA159858bf060791f509599db648a2abc44a52900a3
SHA256a97a05517d57f8b6411280e12c5ba17edbc8a8e09d6c0e27b949144c603a620b
SHA5127fd69f09e6b303c08d127c261e78c0925642f1c04549d04369a641e0c9ffa1b029984b6c41d8a694186a49a53326d3e8042593b1cc2ed36374832c75bcc0ab62
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015
Filesize344B
MD5377d46a17730914bd41dfd584f717877
SHA1e6c04ae50a86858349688820d4d9f191c8675cc6
SHA25680c141c67106337992832b0f16b58930bc6feb987d9329f0b31086e37d6551f9
SHA51264ef0b125ab5459e80fdc70aa392e4900b2dd956fe0448ea7bbb2ee4a49b19b777d3dfac93d98d7b6c8c1b98c99df9ddb40e4223e56644f61cef3bcaa79cd341
-
C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B398B80134F72209547439DB21AB308D_A4CF52CCA82D7458083F7280801A3A04
Filesize430B
MD5aef13fb4c5d9e86e0bdd4b2f3d0fe92d
SHA1007d6125b4afc94c069da1657c4b1be70f6c820d
SHA2567e81764e35d589b402f7258f018876fef64f4589035043c24274f9a9c63f99ff
SHA5128727196194cce637d67b631784e432f2a585db40cd1db053db6e7ed412a3aa5eb5a7ced10655146aa771a4d8044b235c441fc4e38c6297ce48a06973ec56a411
-
Filesize
5KB
MD5f83be8a0e104ddd89942a6e71d84286b
SHA15154c81106d4218a62d0fb8b95b8a4bfbacb7e74
SHA256c4f97221cceb8ad3650bd39273b733cef9c06159543ad30e03c82c0271ab863f
SHA5123a435160532b2d530025f1c6efe5b1e127e5b5e54474343089021ab71188f0ca606e4ee81cc3cdfd5f323b28a10610add7bc0f5ddfc57e18fdf9752d37c48886
-
Filesize
1.9MB
MD5442dcacd62016db76c61af770301626f
SHA11ef7a54bb0fb6395b271d88e4d87e7ac3b76e58a
SHA2568aa49738b3efd4a2e2b3d71991c209db46e082e1739de43147041f9af2a7fff7
SHA5123c21efe1f3422107bddc48d0edd842924dfdf6682b1e81ace83aa992ba49e224d45fd0fc6a73be9de6806effe71d8a1908f550c8b1cf520df4972c252b721bf9
-
Filesize
1.9MB
MD5442dcacd62016db76c61af770301626f
SHA11ef7a54bb0fb6395b271d88e4d87e7ac3b76e58a
SHA2568aa49738b3efd4a2e2b3d71991c209db46e082e1739de43147041f9af2a7fff7
SHA5123c21efe1f3422107bddc48d0edd842924dfdf6682b1e81ace83aa992ba49e224d45fd0fc6a73be9de6806effe71d8a1908f550c8b1cf520df4972c252b721bf9
-
Filesize
1KB
MD5c215a25b91a7e72b335c6b1a125c0a8e
SHA19362afa8b043895abd6fb497e4ca98952e2ae719
SHA25633602f69ec7e94dfc39868a164a42abdce31a309c347c1ad117d4c163842d9fd
SHA5124bd0c65bde3a0f8c434ce288529321bbd2877455927bb5050282e5c7ad6da543f44a8063aa6de69d4af52286aa80014ffc3df3b273334c7ec7409788562a2e62
-
Filesize
512B
MD58d232c85ea7d19ac085625d3e0aa8563
SHA11c9da6480c7976746796d14e2b67594d7e6050ab
SHA256f1d7f831ec8c7545f596b1bff82bc3d8a406b5e65b370741578eb1b2d41dfab8
SHA5129e88ed176d32966bccf2d335ec8407245294ca78b2e0d6c1eebd8a85bb0fa49e25ae5f9a7bd4455b96534765ffb65879a35c12e9fc04c7ddf607887c8dcf5182
-
Filesize
2.2MB
MD5d3809baddaf7b1e7d94484160043328b
SHA1e1979f5248d3b20858b11386ce22b1ccb0a9bfb5
SHA256e28f198ca200445ab45dd4e94d49993ad1a9a21548908ca9c09ade6419c2e079
SHA51296350ef6c81a1bc7d3c6b29c2a66ffaa1cf4f86172d3f52d39bcbf3886da41208b75cfe16bbf4ea23e04b2e0616637083eeacdefb8c0edc3ce6d0f2f89f881c6
-
Filesize
2.2MB
MD5d3809baddaf7b1e7d94484160043328b
SHA1e1979f5248d3b20858b11386ce22b1ccb0a9bfb5
SHA256e28f198ca200445ab45dd4e94d49993ad1a9a21548908ca9c09ade6419c2e079
SHA51296350ef6c81a1bc7d3c6b29c2a66ffaa1cf4f86172d3f52d39bcbf3886da41208b75cfe16bbf4ea23e04b2e0616637083eeacdefb8c0edc3ce6d0f2f89f881c6
-
Filesize
1.9MB
MD5442dcacd62016db76c61af770301626f
SHA11ef7a54bb0fb6395b271d88e4d87e7ac3b76e58a
SHA2568aa49738b3efd4a2e2b3d71991c209db46e082e1739de43147041f9af2a7fff7
SHA5123c21efe1f3422107bddc48d0edd842924dfdf6682b1e81ace83aa992ba49e224d45fd0fc6a73be9de6806effe71d8a1908f550c8b1cf520df4972c252b721bf9