download:

Bitmessage-0.5.8.exe

Full analysis: https://app.any.run/tasks/fa8b99c5-bb90-4e4d-b5db-3971881bb19b
Verdict: Malicious activity
Analysis date: May 27, 2018, 19:00:21
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386 (stripped to external PDB), for MS Windows
MD5:

FCA9358723342C2A62599C2666C6AAC1

SHA1:

D26C9D9324FF3521E1CFA1D30AC3D1868B5F5693

SHA256:

3A628FCF02ACAC4DA5A8CA16BCE95720B7C25E4130B9B5A071E3E7ED60C547B6

SSDEEP:

786432:MtK3Hgu/HYQGr7m22xjtiIhpn5t2zR4oU6FMH/Nb:t9Graxjt7h2zR1A

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Loads dropped or rewritten executable

      • Bitmessage-0.5.8.exe (PID: 2612)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • Bitmessage-0.5.8.exe (PID: 2016)
    • Application launched itself

      • Bitmessage-0.5.8.exe (PID: 2016)
    • Creates files in the user directory

      • Bitmessage-0.5.8.exe (PID: 2612)
  • INFO

    • Dropped object may contain Bitcoin addresses

      • Bitmessage-0.5.8.exe (PID: 2016)
    • Dropped object may contain URL's

      • Bitmessage-0.5.8.exe (PID: 2016)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.1)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 0000:00:00 00:00:00
PEType: PE32
LinkerVersion: 2.24
CodeSize: 39424
InitializedDataSize: 131584
UninitializedDataSize: 51200
EntryPoint: 0x14d0
OSVersion: 4
ImageVersion: 1
SubsystemVersion: 4
Subsystem: Windows GUI

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 01-Jan-1970 00:00:00
TLS Callbacks: 2 callback(s) detected.

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x00000080

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 8
Time date stamp: 01-Jan-1970 00:00:00
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_DEBUG_STRIPPED
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_LARGE_ADDRESS_AWARE
  • IMAGE_FILE_LINE_NUMS_STRIPPED
  • IMAGE_FILE_LOCAL_SYMS_STRIPPED
  • IMAGE_FILE_RELOCS_STRIPPED

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x000099F0
0x00009A00
IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.12883
.data
0x0000B000
0x00000038
0x00000200
IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0.657434
.rdata
0x0000C000
0x00005008
0x00005200
IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
6.94029
.bss
0x00012000
0x0000C698
0x00000000
IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_2048BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_8BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0
.idata
0x0001F000
0x00000BBC
0x00000C00
IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
5.1322
.CRT
0x00020000
0x00000034
0x00000200
IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0.274825
.tls
0x00021000
0x00000020
0x00000200
IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0.190489
.rsrc
0x00022000
0x00019CBC
0x00019E00
IMAGE_SCN_ALIGN_1024BYTES, IMAGE_SCN_ALIGN_16BYTES, IMAGE_SCN_ALIGN_1BYTES, IMAGE_SCN_ALIGN_256BYTES, IMAGE_SCN_ALIGN_2BYTES, IMAGE_SCN_ALIGN_32BYTES, IMAGE_SCN_ALIGN_4096BYTES, IMAGE_SCN_ALIGN_4BYTES, IMAGE_SCN_ALIGN_512BYTES, IMAGE_SCN_ALIGN_64BYTES, IMAGE_SCN_ALIGN_8192BYTES, IMAGE_SCN_ALIGN_MASK, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
4.74605

Resources

Title
Entropy
Size
Codepage
Language
Type
0
2.60989
76
Latin 1 / Western European
UNKNOWN
RT_GROUP_ICON
1
5.15308
1128
Latin 1 / Western European
UNKNOWN
RT_ICON
2
4.90474
4264
Latin 1 / Western European
UNKNOWN
RT_ICON
3
4.80729
9640
Latin 1 / Western European
UNKNOWN
RT_ICON
4
4.6877
16936
Latin 1 / Western European
UNKNOWN
RT_ICON
5
4.4884
67624
Latin 1 / Western European
UNKNOWN
RT_ICON
6
6.15081
4264
Latin 1 / Western European
UNKNOWN
RT_ICON
7
6.39466
1128
Latin 1 / Western European
UNKNOWN
RT_ICON
101
2.71858
104
Latin 1 / Western European
UNKNOWN
RT_GROUP_ICON

Imports

KERNEL32.dll
USER32.dll
WS2_32.dll
msvcrt.dll
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
32
Monitored processes
2
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start bitmessage-0.5.8.exe bitmessage-0.5.8.exe

Process information

PID
CMD
Path
Indicators
Parent process
2016"C:\Users\admin\AppData\Local\Temp\Bitmessage-0.5.8.exe" C:\Users\admin\AppData\Local\Temp\Bitmessage-0.5.8.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\bitmessage-0.5.8.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\ws2_32.dll
2612"C:\Users\admin\AppData\Local\Temp\Bitmessage-0.5.8.exe" C:\Users\admin\AppData\Local\Temp\Bitmessage-0.5.8.exe
Bitmessage-0.5.8.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\bitmessage-0.5.8.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\ws2_32.dll
Total events
37
Read events
12
Write events
25
Delete events
0

Modification events

(PID) Process:(2612) Bitmessage-0.5.8.exeKey:HKEY_CURRENT_USER\Software\Trolltech\OrganizationDefaults\Qt Plugin Cache 4.8.false\C:\Users\admin\AppData\Local\Temp\_MEI20162\qt4_plugins\imageformats
Operation:writeName:qgif4.dll
Value:
40807
(PID) Process:(2612) Bitmessage-0.5.8.exeKey:HKEY_CURRENT_USER\Software\Trolltech\OrganizationDefaults\Qt Factory Cache 4.8\com.trolltech.Qt.QImageIOHandlerFactoryInterface:\C:\Users\admin\AppData\Local\Temp\_MEI20162\qt4_plugins\imageformats
Operation:writeName:qgif4.dll
Value:
2018-05-27T20:01:08
(PID) Process:(2612) Bitmessage-0.5.8.exeKey:HKEY_CURRENT_USER\Software\Trolltech\OrganizationDefaults\Qt Plugin Cache 4.8.false\C:\Users\admin\AppData\Local\Temp\_MEI20162\qt4_plugins\imageformats
Operation:writeName:qico4.dll
Value:
40807
(PID) Process:(2612) Bitmessage-0.5.8.exeKey:HKEY_CURRENT_USER\Software\Trolltech\OrganizationDefaults\Qt Factory Cache 4.8\com.trolltech.Qt.QImageIOHandlerFactoryInterface:\C:\Users\admin\AppData\Local\Temp\_MEI20162\qt4_plugins\imageformats
Operation:writeName:qico4.dll
Value:
2018-05-27T20:01:08
(PID) Process:(2612) Bitmessage-0.5.8.exeKey:HKEY_CURRENT_USER\Software\Trolltech\OrganizationDefaults\Qt Plugin Cache 4.8.false\C:\Users\admin\AppData\Local\Temp\_MEI20162\qt4_plugins\imageformats
Operation:writeName:qjpeg4.dll
Value:
40807
(PID) Process:(2612) Bitmessage-0.5.8.exeKey:HKEY_CURRENT_USER\Software\Trolltech\OrganizationDefaults\Qt Factory Cache 4.8\com.trolltech.Qt.QImageIOHandlerFactoryInterface:\C:\Users\admin\AppData\Local\Temp\_MEI20162\qt4_plugins\imageformats
Operation:writeName:qjpeg4.dll
Value:
2018-05-27T20:01:08
(PID) Process:(2612) Bitmessage-0.5.8.exeKey:HKEY_CURRENT_USER\Software\Trolltech\OrganizationDefaults\Qt Plugin Cache 4.8.false\C:\Users\admin\AppData\Local\Temp\_MEI20162\qt4_plugins\imageformats
Operation:writeName:qmng4.dll
Value:
40807
(PID) Process:(2612) Bitmessage-0.5.8.exeKey:HKEY_CURRENT_USER\Software\Trolltech\OrganizationDefaults\Qt Factory Cache 4.8\com.trolltech.Qt.QImageIOHandlerFactoryInterface:\C:\Users\admin\AppData\Local\Temp\_MEI20162\qt4_plugins\imageformats
Operation:writeName:qmng4.dll
Value:
2018-05-27T20:01:08
(PID) Process:(2612) Bitmessage-0.5.8.exeKey:HKEY_CURRENT_USER\Software\Trolltech\OrganizationDefaults\Qt Plugin Cache 4.8.false\C:\Users\admin\AppData\Local\Temp\_MEI20162\qt4_plugins\imageformats
Operation:writeName:qsvg4.dll
Value:
40807
(PID) Process:(2612) Bitmessage-0.5.8.exeKey:HKEY_CURRENT_USER\Software\Trolltech\OrganizationDefaults\Qt Factory Cache 4.8\com.trolltech.Qt.QImageIOHandlerFactoryInterface:\C:\Users\admin\AppData\Local\Temp\_MEI20162\qt4_plugins\imageformats
Operation:writeName:qsvg4.dll
Value:
2018-05-27T20:01:08
Executable files
72
Suspicious files
0
Text files
25
Unknown types
34

Dropped files

PID
Process
Filename
Type
2016Bitmessage-0.5.8.exeC:\Users\admin\AppData\Local\Temp\_MEI20162\python27.dllexecutable
MD5:
SHA256:
2016Bitmessage-0.5.8.exeC:\Users\admin\AppData\Local\Temp\_MEI20162\msvcm90.dllexecutable
MD5:D34A527493F39AF4491B3E909DC697CA
SHA256:7A74DA389FBD10A710C294C2E914DC6F18E05F028F07958A2FA53AC44F0E4B90
2016Bitmessage-0.5.8.exeC:\Users\admin\AppData\Local\Temp\_MEI20162\qt4_plugins\imageformats\qtga4.dllexecutable
MD5:4CDE7A7A725E74F2E2AC7DB7775DD79F
SHA256:EA5C4B6EF9F23DEA24480AD0B48103F089872C5F7044AB8683FE306BD42BA2DC
2016Bitmessage-0.5.8.exeC:\Users\admin\AppData\Local\Temp\_MEI20162\microsoft.vc90.crt.manifestxml
MD5:BFB93876892CCA8E2AD0021585C34C8B
SHA256:0D060ED7C25159B7B75F16D449963BFD639C15B3C5280BC7897403268C2B9F35
2016Bitmessage-0.5.8.exeC:\Users\admin\AppData\Local\Temp\_MEI20162\qt4_plugins\imageformats\qtiff4.dllexecutable
MD5:9FA36F497BF3958EE882765EFFC6CCD8
SHA256:8953C758C1596FC6B300FF1EFEF148E60ACA0A55D78011E8573AF9262DAB1063
2016Bitmessage-0.5.8.exeC:\Users\admin\AppData\Local\Temp\_MEI20162\pywintypes27.dllexecutable
MD5:F3EF005E60F838EAAA44529DAEEB93AB
SHA256:241ECBD87410E9B23339D494F9ECA7DDF8083472661989F489FDD7FE0B8776B4
2016Bitmessage-0.5.8.exeC:\Users\admin\AppData\Local\Temp\_MEI20162\qt4_plugins\iconengines\qsvgicon4.dllexecutable
MD5:868E62F6725CD3E238B15CFF3F3B8AE4
SHA256:3E5FBF134FFC50F68833DC2F346848D84885E74DB5A1D886E797AFE13BBF80A1
2016Bitmessage-0.5.8.exeC:\Users\admin\AppData\Local\Temp\_MEI20162\qt4_plugins\codecs\qtwcodecs4.dllexecutable
MD5:A93C190A56305B7EDB6085705096754E
SHA256:13B6E4E835247CDE33B8F720A384010D304E84E6088E95077967749993940A13
2016Bitmessage-0.5.8.exeC:\Users\admin\AppData\Local\Temp\_MEI20162\qt4_plugins\imageformats\qico4.dllexecutable
MD5:497DE77253D1D5C81DE9A817C171DBE9
SHA256:22525EB44C12024D29D1181CE00DCFC521C1919779085E84A6861AFDAC76A4AF
2016Bitmessage-0.5.8.exeC:\Users\admin\AppData\Local\Temp\_MEI20162\qt4_plugins\imageformats\qjpeg4.dllexecutable
MD5:EBFDF0BC3C93E310383975FCABF6DB87
SHA256:717A1CA6B51C2DE060D2B01F3D70520AC9F3CADDBA2A87B662E80DB0EAC5C029
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
No debug info