File name:

electrum-3.0.3-setup.exe

Full analysis: https://app.any.run/tasks/a016b502-21d2-4894-9b5a-13a04485d5a0
Verdict: Malicious activity
Analysis date: March 09, 2018, 16:17:40
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
MD5:

AF109EE40F0D0EB30F1E088D0F98D381

SHA1:

C89556006A35672E294005165389D7B3332D76BC

SHA256:

9349E27BF9F315F4F4CC0EEB90A28D78AD1A0A37F3BCBA1F604078A554DC088C

SSDEEP:

393216:WnM/2+58eodEASCJ8I5XfJsK4iPLQifq8:WP+merwJ75PJPPLQi3

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application loaded dropped or rewritten executable

      • electrum-3.0.3-setup.exe (PID: 120)
      • electrum-3.0.3.exe (PID: 2536)
    • Application was dropped or rewritten from another process

      • electrum-3.0.3.exe (PID: 2536)
  • SUSPICIOUS

    • Creates files in the user directory

      • electrum-3.0.3-setup.exe (PID: 120)
      • electrum-3.0.3.exe (PID: 2536)
    • Modifies the open verb of a shell class

      • electrum-3.0.3-setup.exe (PID: 120)
    • Creates a software uninstall entry

      • electrum-3.0.3-setup.exe (PID: 120)
    • Creates files in the program directory

      • electrum-3.0.3-setup.exe (PID: 120)
  • INFO

    • Loads rich edit control libraries

      • electrum-3.0.3-setup.exe (PID: 120)
    • Dropped object may contain Bitcoin addresses

      • electrum-3.0.3-setup.exe (PID: 120)
    • Reads settings of System Certificates

      • electrum-3.0.3.exe (PID: 2536)
    • Dropped object may contain URL's

      • electrum-3.0.3-setup.exe (PID: 120)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (67.4)
.dll | Win32 Dynamic Link Library (generic) (14.2)
.exe | Win32 Executable (generic) (9.7)
.exe | Generic Win/DOS Executable (4.3)
.exe | DOS Executable Generic (4.3)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2017:08:01 02:33:55+02:00
PEType: PE32
LinkerVersion: 6
CodeSize: 25088
InitializedDataSize: 118784
UninitializedDataSize: 1024
EntryPoint: 0x330d
OSVersion: 4
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
Comments: The installer for Electrum
CompanyName: Electrum
FileDescription: Electrum Installer
FileVersion: 3.0.3
InternalName: Electrum Installer
LegalCopyright: 2013-2016 Electrum Technologies GmbH
LegalTrademarks: Electrum is a trademark of Electrum Technologies GmbH
OriginalFileName: Electrum.exe
ProductName: Electrum Installer
ProductVersion: 3.0.3

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 01-Aug-2017 00:33:55
Detected languages:
  • English - United States
Comments: The installer for Electrum
CompanyName: Electrum
FileDescription: Electrum Installer
FileVersion: 3.0.3
InternalName: Electrum Installer
LegalCopyright: 2013-2016 Electrum Technologies GmbH
LegalTrademarks: Electrum is a trademark of Electrum Technologies GmbH
OriginalFilename: Electrum.exe
ProductName: Electrum Installer
ProductVersion: 3.0.3

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x000000D8

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 5
Time date stamp: 01-Aug-2017 00:33:55
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_LINE_NUMS_STRIPPED
  • IMAGE_FILE_LOCAL_SYMS_STRIPPED
  • IMAGE_FILE_RELOCS_STRIPPED

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x0000603C
0x00006200
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.39362
.rdata
0x00008000
0x00001248
0x00001400
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
5.04426
.data
0x0000A000
0x0001A838
0x00000400
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
5.22313
.ndata
0x00025000
0x0000F000
0x00000000
IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0
.rsrc
0x00034000
0x0000DB58
0x0000DC00
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
6.07474

Resources

Title
Entropy
Size
Codepage
Language
Type
1
5.2901
1072
UNKNOWN
English - United States
RT_MANIFEST
2
3.20642
9640
UNKNOWN
English - United States
RT_ICON
3
3.52336
4264
UNKNOWN
English - United States
RT_ICON
4
2.80722
3752
UNKNOWN
English - United States
RT_ICON
5
2.47831
2216
UNKNOWN
English - United States
RT_ICON
6
2.66811
1640
UNKNOWN
English - United States
RT_ICON
7
1.15935
1384
UNKNOWN
English - United States
RT_ICON
8
4.17452
1128
UNKNOWN
English - United States
RT_ICON
9
2.65167
744
UNKNOWN
English - United States
RT_ICON
10
1.734
296
UNKNOWN
English - United States
RT_ICON

Imports

ADVAPI32.dll
COMCTL32.dll
GDI32.dll
KERNEL32.dll
SHELL32.dll
USER32.dll
ole32.dll
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
38
Monitored processes
3
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start electrum-3.0.3-setup.exe electrum-3.0.3.exe electrum-3.0.3-setup.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
120"C:\Users\admin\AppData\Local\Temp\electrum-3.0.3-setup.exe" C:\Users\admin\AppData\Local\Temp\electrum-3.0.3-setup.exe
explorer.exe
User:
admin
Company:
Electrum
Integrity Level:
HIGH
Description:
Electrum Installer
Exit code:
0
Version:
3.0.3
Modules
Images
c:\users\admin\appdata\local\temp\electrum-3.0.3-setup.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
2536"C:\Program Files\Electrum\electrum-3.0.3.exe" C:\Program Files\Electrum\electrum-3.0.3.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\program files\electrum\electrum-3.0.3.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ws2_32.dll
3428"C:\Users\admin\AppData\Local\Temp\electrum-3.0.3-setup.exe" C:\Users\admin\AppData\Local\Temp\electrum-3.0.3-setup.exeexplorer.exe
User:
admin
Company:
Electrum
Integrity Level:
MEDIUM
Description:
Electrum Installer
Exit code:
3221226540
Version:
3.0.3
Modules
Images
c:\users\admin\appdata\local\temp\electrum-3.0.3-setup.exe
c:\systemroot\system32\ntdll.dll
Total events
988
Read events
929
Write events
58
Delete events
1

Modification events

(PID) Process:(120) electrum-3.0.3-setup.exeKey:HKEY_CURRENT_USER\Software\Electrum
Operation:writeName:
Value:
C:\Program Files\Electrum
(PID) Process:(120) electrum-3.0.3-setup.exeKey:HKEY_CLASSES_ROOT\bitcoin
Operation:writeName:
Value:
URL:bitcoin Protocol
(PID) Process:(120) electrum-3.0.3-setup.exeKey:HKEY_CLASSES_ROOT\bitcoin
Operation:writeName:URL Protocol
Value:
(PID) Process:(120) electrum-3.0.3-setup.exeKey:HKEY_CLASSES_ROOT\bitcoin
Operation:writeName:DefaultIcon
Value:
"C:\Program Files\Electrum\electrum.ico, 0"
(PID) Process:(120) electrum-3.0.3-setup.exeKey:HKEY_CLASSES_ROOT\bitcoin\shell\open\command
Operation:writeName:
Value:
"C:\Program Files\Electrum\electrum-3.0.3.exe" "%1"
(PID) Process:(120) electrum-3.0.3-setup.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\Electrum
Operation:writeName:DisplayName
Value:
Electrum
(PID) Process:(120) electrum-3.0.3-setup.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\Electrum
Operation:writeName:UninstallString
Value:
C:\Program Files\Electrum\Uninstall.exe
(PID) Process:(120) electrum-3.0.3-setup.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\Electrum
Operation:writeName:DisplayVersion
Value:
3.0.3
(PID) Process:(120) electrum-3.0.3-setup.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\Electrum
Operation:writeName:URLInfoAbout
Value:
https://github.com/spesmilo/electrum
(PID) Process:(120) electrum-3.0.3-setup.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Uninstall\Electrum
Operation:writeName:Publisher
Value:
Electrum Technologies GmbH
Executable files
76
Suspicious files
1
Text files
102
Unknown types
38

Dropped files

PID
Process
Filename
Type
120electrum-3.0.3-setup.exeC:\Users\admin\AppData\Local\Temp\nsoF1A2.tmp\UserInfo.dllexecutable
MD5:C051C86F6FA84AC87EFB0CF3961950A1
SHA256:D0949B4C0640EE6A80DB5A7F6D93FC631ED194DE197D79BF080EC1752C6F1166
120electrum-3.0.3-setup.exeC:\Program Files\Electrum\PyQt5.Qt.pydexecutable
MD5:944380C3198C31872DAD761AF5026FE5
SHA256:6AA65D830905E596332B3187A67C7D61E9CDEF0542FE6D6689CA351174AA4B57
120electrum-3.0.3-setup.exeC:\Program Files\Electrum\Qt5Svg.dllexecutable
MD5:01798904617CBB44B9E0065A16C5EFBA
SHA256:DD9B945D554D981CF9F76AFC7BD4BA9E7D31B8C2EF6DDAAD59F88B17DE944E4E
120electrum-3.0.3-setup.exeC:\Program Files\Electrum\_ctypes.pydexecutable
MD5:0E6F80C66C293CC38F5E0644A137A437
SHA256:8D9BAFDA26A7F1A3F11F62D4F06FB69BC3DF359B61E2B6ADEAAF20A99BE836C9
120electrum-3.0.3-setup.exeC:\Program Files\Electrum\_bz2.pydexecutable
MD5:BA168455CE3546714C74BCB8539F155E
SHA256:4066CC9E43ED93EF1D60D46B33BA92E4BD1F0D5506A112C69FF7E692D718A60F
120electrum-3.0.3-setup.exeC:\Program Files\Electrum\_hashlib.pydexecutable
MD5:A275AD2BDCDE6D0CCD3DA9D79D2E5A4F
SHA256:E8EABCBDA3DB40581F68579AA5667C0350F53404ED2BDF123A4F8A4053FE219D
120electrum-3.0.3-setup.exeC:\Program Files\Electrum\_lzma.pydexecutable
MD5:8528784C860B6D18E554E73E3C2EFA62
SHA256:2B0AE3EE2AAFB749D06CD2A5159A3E33EC9FEEAD10EF1A90980270B932F84FDE
120electrum-3.0.3-setup.exeC:\Program Files\Electrum\_decimal.pydexecutable
MD5:6A9669E2F5DA15C9EF2644954B944A2A
SHA256:455AC18CDAEFB3A243E628AA83B07FFE96E179B564636418C6C313B1D329CE45
120electrum-3.0.3-setup.exeC:\Program Files\Electrum\_socket.pydexecutable
MD5:E4C88A3E847BFA4FB85239152773C214
SHA256:4C9866C39726EA4C18E1BD08E6F6E306837B14F27AD300154C4CF5005E9BA239
120electrum-3.0.3-setup.exeC:\Program Files\Electrum\_ssl.pydexecutable
MD5:6BE68D51DC8B89210C8F47C51E3991BD
SHA256:3BA56A1100CFEAF64B687C1CD5F169C35C7CA38B3D7A2831584205D28DDB19CE
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
18
DNS requests
9
Threats
4

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
217.233.84.167:50002
ndnd.selfhost.eu
Deutsche Telekom AG
DE
unknown
144.217.204.104:50002
electrum.cutie.ga
OVH SAS
CA
unknown
216.189.151.199:50002
node1.volatilevictory.com
HostUS
US
unknown
45.77.138.212:50002
songbird.bauerj.eu
US
unknown
37.59.46.112:50002
electrum.vom-stausee.de
OVH SAS
FR
unknown
51.15.77.78:50002
VPS.hsmiths.com
Online S.a.s.
FR
unknown
178.32.88.133:50002
helicarrier.bauerj.eu
OVH SAS
FR
unknown
78.46.103.75:443
headers.electrum.org
Hetzner Online GmbH
DE
unknown

DNS requests

Domain
IP
Reputation
ndnd.selfhost.eu
  • 217.233.84.167
malicious
electrum.cutie.ga
  • 144.217.204.104
malicious
node1.volatilevictory.com
  • 216.189.151.199
unknown
songbird.bauerj.eu
  • 45.77.138.212
unknown
electrum.vom-stausee.de
  • 37.59.46.112
whitelisted
s5.noip.pl
unknown
VPS.hsmiths.com
  • 51.15.77.78
unknown
helicarrier.bauerj.eu
  • 178.32.88.133
unknown
headers.electrum.org
  • 78.46.103.75
unknown

Threats

PID
Process
Class
Message
Potentially Bad Traffic
ET INFO DNS Query for Suspicious .ga Domain
Not Suspicious Traffic
ET POLICY OpenSSL Demo CA - Internet Widgits Pty (O)
Not Suspicious Traffic
ET POLICY OpenSSL Demo CA - Internet Widgits Pty (O)
Not Suspicious Traffic
ET POLICY OpenSSL Demo CA - Internet Widgits Pty (O)
Process
Message
electrum-3.0.3.exe
QWindowsNativeFileDialogBase::onSelectionChange () 0