| File name: | electrumx64.exe |
| Full analysis: | https://app.any.run/tasks/22b1b2d5-4683-43f7-8943-02d118f0b7cb |
| Verdict: | Malicious activity |
| Analysis date: | October 30, 2024, 03:38:36 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, 6 sections |
| MD5: | CF837466C42AA63D4E4DF0352A8063EF |
| SHA1: | 461A44B862408C89F16F845B7367B51800344A41 |
| SHA256: | 451070B87E0B3ACF9DE1F6FD858BFADBDAF23FE75CD6F56A29EC817946E70A42 |
| SSDEEP: | 393216:hsTjRbSdyHI7cekLo6h1q/la3/yu744BdSwo2:hSCy/Boy1qo3/t7Owo2 |
| .exe | | | Win32 Executable MS Visual C++ (generic) (42.2) |
|---|---|---|
| .exe | | | Win64 Executable (generic) (37.3) |
| .dll | | | Win32 Dynamic Link Library (generic) (8.8) |
| .exe | | | Win32 Executable (generic) (6) |
| .exe | | | Generic Win/DOS Executable (2.7) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2012:02:24 19:20:04+00:00 |
| ImageFileCharacteristics: | Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 10 |
| CodeSize: | 29696 |
| InitializedDataSize: | 489984 |
| UninitializedDataSize: | 16896 |
| EntryPoint: | 0x38af |
| OSVersion: | 5 |
| ImageVersion: | 6 |
| SubsystemVersion: | 5 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 2.5.0.0 |
| ProductVersionNumber: | 2.5.0.0 |
| FileFlagsMask: | 0x0000 |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Neutral |
| CharacterSet: | Windows, Chinese (Simplified) |
| CompanyName: | Electrum |
| FileDescription: | Electrum |
| FileVersion: | 2.5.0.0 |
| InternalName: | appres\Shextutoply.exe |
| LegalCopyright: | Electrum Copyright(c)2024 |
| ProductName: | Electrum |
| ProductVersion: | 2.5.0.0 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1336 | fsutil sparse setflag "C:\Users\admin\AppData\Roaming\Electrum\blockchain_headers" 1 | C:\Windows\SysWOW64\fsutil.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: fsutil.exe Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1568 | C:\WINDOWS\system32\cmd.exe /c "ver" | C:\Windows\SysWOW64\cmd.exe | — | electrum-4.5.8.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1788 | "C:\Electrum_27386\appres\Shextutoply.exe" 218467 | C:\Electrum_27386\appres\Shextutoply.exe | explorer.exe | ||||||||||||
User: admin Company: 厦门市百胜通软件技术有限公司 Integrity Level: MEDIUM Description: 转易侠HEIC转换器 Version: 2.2.0.4 Modules
| |||||||||||||||
| 3108 | "C:\Electrum_27386\electrum-4.5.8.exe" | C:\Electrum_27386\electrum-4.5.8.exe | Shextutoply.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Modules
| |||||||||||||||
| 4828 | C:\WINDOWS\system32\cmd.exe /c "ver" | C:\Windows\SysWOW64\cmd.exe | — | electrum-4.5.8.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5944 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6556 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6664 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6756 | C:\WINDOWS\system32\cmd.exe /c fsutil sparse setflag "C:\Users\admin\AppData\Roaming\Electrum\blockchain_headers" 1 | C:\Windows\SysWOW64\cmd.exe | — | electrum-4.5.8.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6812 | "C:\Users\admin\AppData\Local\Temp\electrumx64.exe" | C:\Users\admin\AppData\Local\Temp\electrumx64.exe | explorer.exe | ||||||||||||
User: admin Company: Electrum Integrity Level: MEDIUM Description: Electrum Exit code: 0 Version: 2.5.0.0 Modules
| |||||||||||||||
| (PID) Process: | (1788) Shextutoply.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run |
| Operation: | write | Name: | ShextutoplyShextutoply |
Value: C:\Electrum_27386\appres\Shextutoply.exe | |||
| (PID) Process: | (1788) Shextutoply.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\J6UBF379D39E71EFHJ67I |
| Operation: | write | Name: | InstallTime |
Value: 2024-10-30 3:39:45 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 6812 | electrumx64.exe | C:\Electrum_27386\app.7z | — | |
MD5:— | SHA256:— | |||
| 6812 | electrumx64.exe | C:\Electrum_27386\pyexpat.pyd | executable | |
MD5:92C72753FA5C8EAA615B007F89CDB482 | SHA256:EBBDE07AFB2BB356CD400E97D8AFB5ABBC121CC0CC90F99BEC9C3FA5CA60DE14 | |||
| 6812 | electrumx64.exe | C:\Electrum_27386\hid.cp310-win32.pyd | executable | |
MD5:084F1A8DB3FDF6520F6B63D7489B1971 | SHA256:59E478CB62FFEAF7B3EACB59B3BB94C3225E3307B2CB2370FAAB55C3B99E93C7 | |||
| 6812 | electrumx64.exe | C:\Electrum_27386\electrum.ico | image | |
MD5:8AEC9FD7C3D563FAED700948BB821327 | SHA256:2C4FE327580AAD0AA4B30FA15B2770BBBC0736D28C849D1B66C6767127697C4B | |||
| 6812 | electrumx64.exe | C:\Electrum_27386\_bz2.pyd | executable | |
MD5:5C952E57426E429F6F4CEC9FEB841815 | SHA256:B682E9E8152036BDEBF4CA5410D3C0F88FA3272A969830F63C7B61BB1F0DA89F | |||
| 6812 | electrumx64.exe | C:\Users\admin\AppData\Local\Temp\nseD0D7.tmp\nsNiuniuSkin.dll | executable | |
MD5:01A743D2E92F42035F694EB7BA16C6C4 | SHA256:ACF0A9F02F82E3F684CF90CD1FA3F587124CC2D1CF1D01F10017CEEFE4892C76 | |||
| 6812 | electrumx64.exe | C:\Users\admin\AppData\Local\Temp\nseD0D7.tmp\skin.zip | compressed | |
MD5:B9FED73562A2CC77C86E8E61C05DCEFA | SHA256:F60AD8F4AB4AD0B6156813DC1898A39D4D3E3401754CDB81EE2D6A8CEEA68F72 | |||
| 6812 | electrumx64.exe | C:\Electrum_27386\_ctypes.pyd | executable | |
MD5:FF0992DFB0D4D90BDCEAAD68246C5C22 | SHA256:F879F86BF65CE05EE3467DF65C55B9837F9DFFB0F024C350C9A9869A08609759 | |||
| 6812 | electrumx64.exe | C:\Electrum_27386\unicodedata.pyd | executable | |
MD5:73A25EF47977BFF82315023F7F8E9DB1 | SHA256:AC2966C1A1F1FBEE97666E0AAADE5AB960B445AF3BACC1650B83EA8B637F2F7A | |||
| 6812 | electrumx64.exe | C:\Electrum_27386\base_library.zip | compressed | |
MD5:F2462FAB571A87A8C1884B186CCCAB73 | SHA256:4872929FFBAF2FC9F0598DB66B6FEA94EFC58960CA6AFBB1A82EA1E518830991 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
5488 | MoUsoCoreWorker.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
5488 | MoUsoCoreWorker.exe | GET | 200 | 2.16.164.49:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
6500 | SIHClient.exe | GET | 200 | 23.52.120.96:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
4360 | SearchApp.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D | unknown | — | — | whitelisted |
624 | svchost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
5196 | backgroundTaskHost.exe | GET | 200 | 192.229.221.95:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAn5bsKVVV8kdJ6vHl3O1J0%3D | unknown | — | — | whitelisted |
6500 | SIHClient.exe | GET | 200 | 23.52.120.96:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
— | — | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
7056 | RUXIMICS.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
5488 | MoUsoCoreWorker.exe | 2.16.164.49:80 | crl.microsoft.com | Akamai International B.V. | NL | whitelisted |
5488 | MoUsoCoreWorker.exe | 95.101.149.131:80 | www.microsoft.com | Akamai International B.V. | NL | whitelisted |
— | — | 239.255.255.250:1900 | — | — | — | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
4360 | SearchApp.exe | 2.23.209.182:443 | www.bing.com | Akamai International B.V. | GB | whitelisted |
4360 | SearchApp.exe | 192.229.221.95:80 | ocsp.digicert.com | EDGECAST | US | whitelisted |
624 | svchost.exe | 20.190.159.0:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
www.bing.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
login.live.com |
| whitelisted |
th.bing.com |
| whitelisted |
go.microsoft.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
3108 | electrum-4.5.8.exe | Potentially Bad Traffic | ET POLICY DNS Query to DynDNS Domain *.hopto .me |
3108 | electrum-4.5.8.exe | Potentially Bad Traffic | ET DNS Query to a *.pw domain - Likely Hostile |
3108 | electrum-4.5.8.exe | Potentially Bad Traffic | ET POLICY DNS Query to DynDNS Domain *.hopto .me |
3108 | electrum-4.5.8.exe | Potentially Bad Traffic | ET DNS Query to a *.pw domain - Likely Hostile |
3108 | electrum-4.5.8.exe | Potential Corporate Privacy Violation | ET POLICY DNS Query for TOR Hidden Domain .onion Accessible Via TOR |
3108 | electrum-4.5.8.exe | Potential Corporate Privacy Violation | ET POLICY DNS Query for TOR Hidden Domain .onion Accessible Via TOR |
3108 | electrum-4.5.8.exe | Potential Corporate Privacy Violation | ET POLICY DNS Query for TOR Hidden Domain .onion Accessible Via TOR |
3108 | electrum-4.5.8.exe | Potential Corporate Privacy Violation | ET POLICY DNS Query for TOR Hidden Domain .onion Accessible Via TOR |
3108 | electrum-4.5.8.exe | Misc Attack | ET TOR Known Tor Relay/Router (Not Exit) Node Traffic group 151 |
Process | Message |
|---|---|
electrumx64.exe | Window, caption, 0,0,0,390
|
electrumx64.exe | Window, showshadow, true
|
electrumx64.exe | Window, shadowcorner, 14,14,14,14
|
electrumx64.exe | Window, sizebox, 0,0,0,0
|
electrumx64.exe | Window, shadowimage, bk_shadow.png
|
electrumx64.exe | Window, shadowsize, 14
|
electrumx64.exe | Window, size, 480,390
|
electrumx64.exe | LabelUI, text, ????:
|
electrumx64.exe | RichEdit, bkimage, public\edit\edit0.png
|
electrumx64.exe | LabelUI, textcolor, #FF333333
|