Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    150s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20230831-en
  • resource tags

    arch:x64arch:x86image:win7-20230831-enlocale:en-usos:windows7-x64system
  • submitted
    19/09/2023, 21:26

General

  • Target

    launcherfull-shiginima-v4300.exe

  • Size

    5.4MB

  • MD5

    3e1ad25616e2d1435fc938fc4fb0cf79

  • SHA1

    48baffa8089e4b29fa9acacde0ef4e82a6f28771

  • SHA256

    952a0c261f263416f2dde7896b526539bbad9fa81ba382f7fbd0628b9a18c3a2

  • SHA512

    f165a25062fcc5e8f5b69fd7db2f97668d88ff236a509120a8cfd78befc45e3777f27030654bfc624a4b54da12152225f61c05ac945ef37cbf0451751f0b995d

  • SSDEEP

    98304:Y2LidbOU72RGEaRja98Xq1N/dIFbpeK0TLzE9XuS5tSXylo/LHz0k:HSbOU72naja9HYFlz0TLzE9Xgym/LHQk

Score
1/10

Malware Config

Signatures

  • Modifies Internet Explorer settings 1 TTPs 62 IoCs
  • Suspicious use of AdjustPrivilegeToken 4 IoCs
  • Suspicious use of FindShellTrayWindow 1 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 11 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\launcherfull-shiginima-v4300.exe
    "C:\Users\Admin\AppData\Local\Temp\launcherfull-shiginima-v4300.exe"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2220
    • C:\Program Files\Internet Explorer\iexplore.exe
      "C:\Program Files\Internet Explorer\iexplore.exe" http://java.com/download
      2⤵
      • Modifies Internet Explorer settings
      • Suspicious use of FindShellTrayWindow
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1736
      • C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE
        "C:\Program Files (x86)\Internet Explorer\IEXPLORE.EXE" SCODEF:1736 CREDAT:275457 /prefetch:2
        3⤵
        • Modifies Internet Explorer settings
        • Suspicious use of SetWindowsHookEx
        PID:2752
  • C:\Windows\explorer.exe
    "C:\Windows\explorer.exe"
    1⤵
      PID:1892
    • C:\Windows\system32\AUDIODG.EXE
      C:\Windows\system32\AUDIODG.EXE 0x1a0
      1⤵
      • Suspicious use of AdjustPrivilegeToken
      PID:2156

    Network

    MITRE ATT&CK Enterprise v15

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      b2325db52c6e101c0344a0ee8d1c14c2

      SHA1

      b315387494d4fd17fd2177a0aa821d17c3fa17c6

      SHA256

      dc35af0f36f78d782d4e0e4f3f9833ac64b274ed0c00a4e1e9cf9fc4a82d3f79

      SHA512

      9d9b1333fd11ab4ef107c3ad1c72c051eb488fec8f60135b0e112210592b8efa231493cf3f632662cd91c3df2f02e0c402222ed1963cff304fc1cf76a673eabe

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      2af1ab9c5150be054a64c440c509b547

      SHA1

      b3fef11f7403f8c58fe031e47b770cd28262102f

      SHA256

      af00d986f825af9091a5d3c5cb8c0a2ee77da2455ef9ad233bfa767e5de701ab

      SHA512

      5b391acacdda7a46af06f70e5b6cfbe69f9d5681972529799cfe8eee09484eadffdaee712aec6d4445dc46cb16fbeb1762280317085d31e3676d78a371fd5767

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      b59ed4bc7d7e2a43fb7ecedac791b3db

      SHA1

      59bebdd1ce1de2a30be6ebcb83268d47ddbd2363

      SHA256

      5b9bf104add7c47b7a9019ea7225e1ce4bf961729fb73c961bb7b47defec830e

      SHA512

      bce5d4c3ae8526260a44980fe66071ddcd023e875d40ab8a90da33c0cf0b431c753839445cd0ca47cf13b425d70cfc7c66aab4579e56a321d3fcd03e8d18b542

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      56d5f4d7b794f27c5911c2f45cbc6be1

      SHA1

      2d2a90505ff87afbe55dbd339505218f879381e3

      SHA256

      a6ea66d39d9cde760385dc6a2084b83e52ecb0103e4e89ac2e7abbc43442a76f

      SHA512

      ec5a86783d681428f8c181779cbfb6ae8ca3308de99591b3c94a5eab77bfd0439bdb42463ef5c7b0f1dbb15556f0b22c2e0d03eac7b09a9b977079947acbda6b

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      eef89c2de8f859804cb75cc248229fed

      SHA1

      ec1e3879845e39990bcdda42469a5d8d01f03717

      SHA256

      220c970df3490c643d8f729ab8c6b181aca5bfe4952a37c4f519e57186f4fbbb

      SHA512

      ec76ac0f48ce288d5c43642d6640fba01ab35efd8d13a50bdf6413c46a9f695fb148d1ccc9ae112db4ed5959faf5171dff9fdcc1410bdf7d5dfd12bc97bf9e3d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      dacb5c4b3d163cbb542d4ea96bdab5f3

      SHA1

      54bb630610642264379bebcbd3000a65f90b399c

      SHA256

      36cbb0490935969b7f3a46230fa203867f43fcd36eae56a38a47a8c966be5a90

      SHA512

      d8e1ab16f02bc0635da040850254413eaad011bb78de343339dfe45446dab037973e400187d304619339ae469d2c86b71b2e59886aa01b6c147675101b13d825

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      1cb6e485669ec4978b817b6bcc81f566

      SHA1

      6d26644a12c2384c0480c2698cbb0bf8d7b38c6f

      SHA256

      328a9dcd650094dcd0980055eb2c4d4c5763bc9c6c201f1ebe5161f61172ce3b

      SHA512

      f581e3f4477e1ffc90d3241de4b1dca41e0e6b64d364ba0f5d654a48b4ae4e9a56fc4f5d2bd341821b9ebce226c71174964f408b7d76af96012793ee0c8a5675

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      c162601868a6f78719076ef094283d45

      SHA1

      951e847a9224eaaa659be6c5a5f3696da11e4a71

      SHA256

      dd7a1c2461082c3ddba68b31c9c40d779d3f1d62be58cae7234dfd436b4ab0ce

      SHA512

      69fe25bd6b03c261dccf52200afb933f2e0b51e455798cfa483172ff99f164e655cda91805840d07722e2d50ff434f154e1bca0441cbc62e667df2063ddd6269

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      a3ff753d26a523de349ca7d6d88c175e

      SHA1

      6c19cabacab61505981d4b1eb70a9056e97ab3ca

      SHA256

      eb0bd49d4d1c9c5ee896cc35a5956738f31a61ee87d97755b012295a5461ee6e

      SHA512

      f0c07d0131da4a005e41f022ad0f6f5722eff071febc0daf07fa2f1f035b04e9c164247796d005655805e579aec30aea07d973987f8320a14c8ba8732f3f3842

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      2888f3662715e566b42fb5f79541be5c

      SHA1

      b8aeded0e3db8f649a0c56f7bf49b7b31d71afc4

      SHA256

      f25f7c2941bf1f11f3c951524b72079dd07cb298ceba22994bee54d8ecb3980e

      SHA512

      61bf0f36ac47c1fcbaa797c90b04cd79d80fa1a2ddf259b7cb52f7d9ba191037fcc24c26d99f01a56728da2f7fbb936195888eb07d7f3befeb4da2050a624c53

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      79bc787e94a9a7c1a66fa82a4955dbe7

      SHA1

      2a8363b613dc8435bfb23c0240e1cb027b8087c9

      SHA256

      d5239dfcc2ecf12ff5f8ff932098c251a5f40565daa70a955af7bbf90293c53b

      SHA512

      76e587e94c85d0f39ac89bf50e791e62b48dc527edf4a00a7307f6db58fbfa045141c45401d6738204c529617a22756b032edc54070b06fdb0a54d3625ce5efe

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      42bf4d3614b0e814832957cec11c41af

      SHA1

      a20c1abfaf2ab55a3f12043e3b98079199a3a608

      SHA256

      699a00fbeaa364c4517ca41e00b5b71bf081fe5de9ef364940e7114594ed1b08

      SHA512

      89f32c789d132dc524abd006c7f27c6edabd7c59d2a13ca911de2a1a770c180aa0ab9f7cdc61b74300f761c3c0cc271f2569f79c099949e0863a0e699d60c339

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      34ba343f5d55ba5d4810adf51fc232da

      SHA1

      df998e2d97ccdbb2de6f079d6c32793682d667cb

      SHA256

      350dadc0d164ff841fcaa519d0add70d43639071d5fc8ef788620e5063a91e76

      SHA512

      44cc4a807ef5681df8a9a9f14b02237d4d9e45cf7729c0ab22fa14a6ced5c3a219a001cf1f9f52e29c5adb5973c59bd51875c8a32e8057658a8323b603597261

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      0dae98215cdba612975a078ee5e7049a

      SHA1

      86751685e7166081b37cf2df3babf39875430d07

      SHA256

      fdc45a34cc4f0f4cf99a917104b24b588e6105b60047982864d7c843c67aaac7

      SHA512

      805b32e8ec38768806fbc9ce51b1ae86e5df754b662fa3958ecc992a936d5e4f1ceb366215f1095b2552450a3432794780f7096ab27630994913841dc0e4d7ee

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      160266127405428f5c49af40a424099d

      SHA1

      2dc2b55cd802954e554a11db161ffbc6256e1b30

      SHA256

      def9ff94c15d79dcba929ca20fd5654e69d648e185afe79c1b5f4013db7efd9f

      SHA512

      13a00ab153fbb40409787402c95ce28ec7c16c0c10c34500b298249caf20a90bbd296d589f7698630f078b0a875a8da523bfae4bf01e0c2a1fa6d3189856f88d

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      76ad61d33120a5d02d0afcf8f14b351e

      SHA1

      b6de9e58bcc698e8e8b548d38bafcec625e436ed

      SHA256

      fbd4deffef7117b0c0213536f52576c35baf444346b75ab1d7cd2db1fc26f518

      SHA512

      5bb8e00f0ec9b1bed233367fc32a6cb9d59c320b3c16b7d8cc1cc6ec0b1ba9569f7a1093101160b655e7536f609e82df8218e98694dafd0ae7aa66f06e2759f3

    • C:\Users\Admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\94308059B57B3142E455B38A6EB92015

      Filesize

      344B

      MD5

      1e8ccd19f727dd08956edbb0207fae26

      SHA1

      09e7ee39a8efcde446c3363c5beda4cc9f5c975b

      SHA256

      6b86b8ea8595a9eb46ec4171f91e959472a71f19ce890d94f8859a605c94b9c7

      SHA512

      f5c4376f370077d16ac97b5c1104bc6e357b741c26bee0d199642c7a4c2f287beed24053c31016a3c804a43b4ccb5038db9535b416423eb0e0a34fa69e5f8fa9

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\4B1G0XN4\www.java[1].xml

      Filesize

      322B

      MD5

      bba40cd1da395040a1ce60cfc4a6c40b

      SHA1

      7849cdceeaa1ce76322b525acac558e717ae13c5

      SHA256

      fdab1263b7e59c8202ad9201c1db9c37f83974ba4363ba2fabd5ffbbbbb3777b

      SHA512

      87c70018f509379ade11bf9b9afeee4c3fd7301f743c90a1b6e747438e672a8a282130e2324d0884ba4f1522c039b0e72e6257a419d35adbb5b4a7c5ea013858

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\DOMStore\4B1G0XN4\www.java[1].xml

      Filesize

      13B

      MD5

      c1ddea3ef6bbef3e7060a1a9ad89e4c5

      SHA1

      35e3224fcbd3e1af306f2b6a2c6bbea9b0867966

      SHA256

      b71e4d17274636b97179ba2d97c742735b6510eb54f22893d3a2daff2ceb28db

      SHA512

      6be8cec7c862afae5b37aa32dc5bb45912881a3276606da41bf808a4ef92c318b355e616bf45a257b995520d72b7c08752c0be445dceade5cf79f73480910fed

    • C:\Users\Admin\AppData\Local\Microsoft\Internet Explorer\imagestore\bucspth\imagestore.dat

      Filesize

      1KB

      MD5

      3a300d983252d5b42ff22b6aa1309fbb

      SHA1

      6b058a861904740cae9efa217870b7ae584a37c9

      SHA256

      c39a7ec4f1621c87fe372a7b69bedd3dcac72e996f078031eec4d83df6000129

      SHA512

      cde78264737f589dac568f8cedd498591bbe142bab7dc6d7914932f0fd52fdf2559ca9606548f152c96f8ee3b1c9372f5e457bdef064af52eb1cb6d75f01aea5

    • C:\Users\Admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\27V93E5X\favicon[1].ico

      Filesize

      1KB

      MD5

      8e39f067cc4f41898ef342843171d58a

      SHA1

      ab19e81ce8ccb35b81bf2600d85c659e78e5c880

      SHA256

      872bad18b566b0833d6b496477daab46763cf8bdec342d34ac310c3ac045cefd

      SHA512

      47cd7f4ce8fcf0fc56b6ffe50450c8c5f71e3c379ecfcfd488d904d85ed90b4a8dafa335d0e9ca92e85b02b7111c9d75205d12073253eed681868e2a46c64890

    • C:\Users\Admin\AppData\Local\Temp\Cab7E45.tmp

      Filesize

      61KB

      MD5

      f3441b8572aae8801c04f3060b550443

      SHA1

      4ef0a35436125d6821831ef36c28ffaf196cda15

      SHA256

      6720349e7d82ee0a8e73920d3c2b7cb2912d9fcf2edb6fd98f2f12820158b0bf

      SHA512

      5ba01ba421b50030e380ae6bbcd2f681f2a91947fe7fedb3c8e6b5f24dce9517abf57b1cf26cc6078d4bb53bde6fcfb2561591337c841f8f2cb121a3d71661b9

    • C:\Users\Admin\AppData\Local\Temp\Tar7E77.tmp

      Filesize

      163KB

      MD5

      9441737383d21192400eca82fda910ec

      SHA1

      725e0d606a4fc9ba44aa8ffde65bed15e65367e4

      SHA256

      bc3a6e84e41faeb57e7c21aa3b60c2a64777107009727c5b7c0ed8fe658909e5

      SHA512

      7608dd653a66cd364392a78d4711b48d1707768d36996e4d38871c6843b5714e1d7da4b4cc6db969e6000cfa182bcb74216ef6823d1063f036fc5c3413fb8dcf

    • memory/2220-0-0x0000000000400000-0x0000000000417000-memory.dmp

      Filesize

      92KB