File name:

Shiginima Launcher SE v4400.exe

Full analysis: https://app.any.run/tasks/7ae2900d-3965-4741-a6f8-5269bf2b6d31
Verdict: Malicious activity
Analysis date: May 09, 2025, 09:57:25
OS: Windows 10 Professional (build: 19044, 64 bit)
Indicators:
MIME: application/zip
File info: Zip archive, with extra data prepended
MD5:

C3DB052DA531710367FAF5E011475715

SHA1:

46F599E4E1ECE582006739DEBE0A522925A9CD13

SHA256:

7C6220B046553F9C95B8098FF83BFC6B7828093650BECBC1B44E3D7819D7EFD1

SSDEEP:

98304:+5uOC8VJzxZUhyU48rlEu1qq7eq3fI2odeXyQrtr3B+nTxUU22jlko089H8DykSB:SS+cCmPxNyb

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Checks for Java to be installed

      • Shiginima Launcher SE v4400.exe (PID: 7272)
    • There is functionality for taking screenshot (YARA)

      • javaw.exe (PID: 7288)
  • INFO

    • Checks supported languages

      • Shiginima Launcher SE v4400.exe (PID: 7272)
      • javaw.exe (PID: 7288)
    • The sample compiled with english language support

      • Shiginima Launcher SE v4400.exe (PID: 7272)
    • Creates files in the program directory

      • javaw.exe (PID: 7288)
    • Creates files or folders in the user directory

      • javaw.exe (PID: 7288)
    • Reads the computer name

      • javaw.exe (PID: 7288)
    • Reads the machine GUID from the registry

      • javaw.exe (PID: 7288)
    • Create files in a temporary directory

      • javaw.exe (PID: 7288)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (41)
.exe | Win64 Executable (generic) (36.3)
.dll | Win32 Dynamic Link Library (generic) (8.6)
.exe | Win32 Executable (generic) (5.9)
.exe | Win16/32 Executable Delphi generic (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2020:02:01 00:14:31+00:00
ImageFileCharacteristics: No relocs, Executable, No line numbers, No symbols, 32-bit, No debug
PEType: PE32
LinkerVersion: 2.22
CodeSize: 19968
InitializedDataSize: 23040
UninitializedDataSize: 36864
EntryPoint: 0x1290
OSVersion: 4
ImageVersion: 1
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 4.4.0.0
ProductVersionNumber: 4.4.0.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Windows NT
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
CompanyName: Shiginima
FileDescription: Shiginima Launcher SE v4.400
FileVersion: 4.4
InternalName: Shiginima Salad
LegalCopyright: Shiginima, Mojang
LegalTrademarks: -
OriginalFileName: Shiginima Launcher SE v4.400.exe
ProductName: Shiginima Launcher SE v4.300
ProductVersion: Shiginima Launcher SE v4.400
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
133
Monitored processes
7
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start shiginima launcher se v4400.exe no specs javaw.exe icacls.exe no specs conhost.exe no specs sppextcomobj.exe no specs slui.exe no specs svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
2196C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
7272"C:\Users\admin\AppData\Local\Temp\Shiginima Launcher SE v4400.exe" C:\Users\admin\AppData\Local\Temp\Shiginima Launcher SE v4400.exeexplorer.exe
User:
admin
Company:
Shiginima
Integrity Level:
MEDIUM
Description:
Shiginima Launcher SE v4.400
Exit code:
0
Version:
4.400
Modules
Images
c:\users\admin\appdata\local\temp\shiginima launcher se v4400.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\aclayers.dll
7288"C:\Program Files\Java\jre1.8.0_271\bin\javaw.exe" -classpath "C:\Users\admin\AppData\Local\Temp\Shiginima Launcher SE v4400.exe" net.mc.main.MainC:\Program Files\Java\jre1.8.0_271\bin\javaw.exe
Shiginima Launcher SE v4400.exe
User:
admin
Company:
Oracle Corporation
Integrity Level:
MEDIUM
Description:
Java(TM) Platform SE binary
Exit code:
0
Version:
8.0.2710.9
Modules
Images
c:\program files\java\jre1.8.0_271\bin\javaw.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
7376C:\WINDOWS\system32\icacls.exe C:\ProgramData\Oracle\Java\.oracle_jre_usage /grant "everyone":(OI)(CI)MC:\Windows\System32\icacls.exejavaw.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\icacls.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
7384\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeicacls.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
7496C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
7528"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
Total events
4 510
Read events
4 510
Write events
0
Delete events
0

Modification events

No data
Executable files
44
Suspicious files
20
Text files
6
Unknown types
0

Dropped files

PID
Process
Filename
Type
7288javaw.exeC:\Users\admin\AppData\Roaming\Microsoft\Crypto\RSA\S-1-5-21-1693682860-607145093-2874071422-1001\83aa4cc77f591dfc2374580bbd95f6ba_bb926e54-e3ca-40fd-ae90-2764341e7792binary
MD5:C8366AE350E7019AEFC9D1E6E6A498C6
SHA256:11E6ACA8E682C046C83B721EEB5C72C5EF03CB5936C60DF6F4993511DDC61238
7288javaw.exeC:\ProgramData\Oracle\Java\.oracle_jre_usage\17dfc292991c8061.timestamptext
MD5:5DA99B092D64094B91A92E0721CF0E06
SHA256:D6ED8F9F06E5490D09B8D79E8CF7C63F7B592FCCA5BC3DFCF594287F7C2B6AD7
7288javaw.exeC:\Users\admin\AppData\Roaming\.minecraft\shig.inimatext
MD5:571CC0288E3F5DB4C85AE85DCD1C64CE
SHA256:36ED29282E1D008064F2C06952EDDABDF7C73B58E2BC5215A497AC4541BE6553
7288javaw.exeC:\Users\admin\AppData\Local\Temp\imageio2217768178745051918.tmpimage
MD5:D2FC27C31904067D5E9C765700CD5292
SHA256:3E46FF5095EB7E0E7DDB78AD26D673D0F791A89D8741346F44EC706AE94CAE9F
7288javaw.exeC:\Users\admin\AppData\Roaming\.minecraft\libraries\com\mojang\brigadier\1.3.10\brigadier-1.3.10.jarcompressed
MD5:A755B426EB7942BB74B46A95B02F1DE4
SHA256:C8EE4136E474AC7723CA2B432EC8D1A2BC88EF7D1EC57C314BA9E33CDC83DD75
7288javaw.exeC:\Users\admin\AppData\Roaming\.minecraft\libraries\org\lwjgl\lwjgl-openal\3.3.3\lwjgl-openal-3.3.3.jarjava
MD5:3AE8606B16891AF57EB08ED5A6F78ED8
SHA256:AE0E82767CACF08921F578FBA9D84753DDEB00CEADA0510A2B4A882BE28FBF95
7288javaw.exeC:\Users\admin\AppData\Roaming\.minecraft\libraries\net\minidev\accessors-smart\2.5.1\accessors-smart-2.5.1.jarjava
MD5:51E60DBF9AC51F6666F0077317990944
SHA256:2796AE857D0C7BE4BC3580DAA4D3828D555212355F4C83D38DD0AF0742B3C812
7288javaw.exeC:\Users\admin\AppData\Roaming\.minecraft\libraries\org\apache\httpcomponents\httpcore\4.4.16\httpcore-4.4.16.jarjava
MD5:28D2CD9BF8789FD2EC774FB88436EBD1
SHA256:6C9B3DD142A09DC468E23AD39AAD6F75A0F2B85125104469F026E52A474E464F
7288javaw.exeC:\Users\admin\AppData\Local\Temp\imageio3667239460598269052.tmpimage
MD5:ECCE36EEF6A0792DFAE8A539F4ADE63D
SHA256:5EA73AC7D95F47B036D8FD70E60994FA33C19BA43FCC6A491F96292E05B01331
7288javaw.exeC:\Users\admin\AppData\Local\Temp\imageio558058592100803931.tmpimage
MD5:D2FC27C31904067D5E9C765700CD5292
SHA256:3E46FF5095EB7E0E7DDB78AD26D673D0F791A89D8741346F44EC706AE94CAE9F
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2 231
TCP/UDP connections
2 326
DNS requests
22
Threats
4

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
23.53.40.178:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
7288
javaw.exe
HEAD
69.16.230.165:80
http://teamshiginima.com/version.php
unknown
whitelisted
7288
javaw.exe
HEAD
69.16.230.165:80
http://teamshiginima.com/version.php
unknown
whitelisted
7288
javaw.exe
GET
69.16.230.165:80
http://news.teamshiginima.com/
unknown
whitelisted
7288
javaw.exe
GET
69.16.230.165:80
http://servers.teamshiginima.com/
unknown
whitelisted
6544
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7288
javaw.exe
GET
69.16.230.165:80
http://news.teamshiginima.com/
unknown
whitelisted
7288
javaw.exe
GET
69.16.230.165:80
http://servers.teamshiginima.com/
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:137
whitelisted
23.53.40.178:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4
System
192.168.100.255:138
whitelisted
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
5496
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
7288
javaw.exe
69.16.230.165:80
teamshiginima.com
LIQUIDWEB
US
whitelisted
6544
svchost.exe
40.126.31.129:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 40.127.240.158
whitelisted
crl.microsoft.com
  • 23.53.40.178
  • 23.53.40.176
whitelisted
google.com
  • 172.217.16.206
whitelisted
www.microsoft.com
  • 184.30.21.171
  • 95.101.149.131
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
teamshiginima.com
  • 69.16.230.165
whitelisted
shigmeahyea.us.to
unknown
login.live.com
  • 40.126.31.129
  • 40.126.31.3
  • 20.190.159.75
  • 40.126.31.131
  • 40.126.31.67
  • 20.190.159.64
  • 20.190.159.68
  • 40.126.31.0
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
servers.teamshiginima.com
  • 69.16.230.165
whitelisted

Threats

PID
Process
Class
Message
7288
javaw.exe
Potentially Bad Traffic
ET INFO Vulnerable Java Version 1.8.x Detected
2196
svchost.exe
Potentially Bad Traffic
ET DNS Query for .to TLD
7288
javaw.exe
Potentially Bad Traffic
ET INFO Vulnerable Java Version 1.8.x Detected
2196
svchost.exe
Potentially Bad Traffic
ET DYN_DNS DYNAMIC_DNS Query to a *.us .to Domain
No debug info