download:

Bit4id_Middleware.exe

Full analysis: https://app.any.run/tasks/19ee428e-4d40-46ce-bc25-3bc48dd5dc9b
Verdict: Malicious activity
Analysis date: April 07, 2019, 12:00:46
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows, Nullsoft Installer self-extracting archive
MD5:

0E774956505B25B4F9F6CCAF05D698F8

SHA1:

3D258886E45E9ECF0A320276B111B8A983813774

SHA256:

DB836691890A9A46B70B1832F6669376E4C911D3F3669850628708DE57EA13FF

SSDEEP:

393216:QohAZXA6xGmM3ztV3NLk8j1oMllVq8P6qQNa5jUK6DK5XCV:QoATMjtXLkZhH1adx6DK5m

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes settings of System certificates

      • Bit4id_Middleware.exe (PID: 2332)
    • Loads dropped or rewritten executable

      • Bit4id_Middleware.exe (PID: 2332)
      • RUNDLL32.EXE (PID: 2140)
      • RUNDLL32.EXE (PID: 2356)
      • rundll32.exe (PID: 2560)
      • modutil.exe (PID: 672)
      • modutil.exe (PID: 3504)
      • crtmgr.exe (PID: 3256)
    • Changes the autorun value in the registry

      • Bit4id_Middleware.exe (PID: 2332)
    • Application was dropped or rewritten from another process

      • b4notify.exe (PID: 1360)
      • crtmgr.exe (PID: 3256)
      • modutil.exe (PID: 3504)
      • modutil.exe (PID: 672)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • Bit4id_Middleware.exe (PID: 2332)
    • Uses RUNDLL32.EXE to load library

      • Bit4id_Middleware.exe (PID: 2332)
      • RUNDLL32.EXE (PID: 2356)
    • Application launched itself

      • RUNDLL32.EXE (PID: 2356)
    • Creates files in the Windows directory

      • Bit4id_Middleware.exe (PID: 2332)
    • Creates a software uninstall entry

      • Bit4id_Middleware.exe (PID: 2332)
    • Loads Python modules

      • crtmgr.exe (PID: 3256)
    • Creates files in the program directory

      • Bit4id_Middleware.exe (PID: 2332)
  • INFO

    • Reads settings of System Certificates

      • RUNDLL32.EXE (PID: 2356)
      • RUNDLL32.EXE (PID: 2140)
    • Dropped object may contain Bitcoin addresses

      • Bit4id_Middleware.exe (PID: 2332)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (64.6)
.dll | Win32 Dynamic Link Library (generic) (15.4)
.exe | Win32 Executable (generic) (10.5)
.exe | Generic Win/DOS Executable (4.6)
.exe | DOS Executable Generic (4.6)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2016:04:02 05:20:09+02:00
PEType: PE32
LinkerVersion: 6
CodeSize: 24064
InitializedDataSize: 120320
UninitializedDataSize: 1024
EntryPoint: 0x326c
OSVersion: 4
ImageVersion: 6
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.4.10.404
ProductVersionNumber: 1.4.10.404
FileFlagsMask: 0x0000
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Windows, Latin1
Comments: Bit4id - Universal MW
CompanyName: -
FileDescription: Bit4id - Universal MW
FileVersion: 1.4.10.404
LegalCopyright: (C) 2005-2016
LegalTrademarks: -
OriginalFileName: bit4id_xpki_1.4.10.404-ng-crtmgr.exe
ProductName: Bit4id - Universal MW

Summary

Architecture: IMAGE_FILE_MACHINE_I386
Subsystem: IMAGE_SUBSYSTEM_WINDOWS_GUI
Compilation Date: 02-Apr-2016 03:20:09
Detected languages:
  • English - United States
Comments: Bit4id - Universal MW
CompanyName: -
FileDescription: Bit4id - Universal MW
FileVersion: 1.4.10.404
LegalCopyright: (C) 2005-2016
LegalTrademarks: -
OriginalFilename: bit4id_xpki_1.4.10.404-ng-crtmgr.exe
ProductName: Bit4id - Universal MW

DOS Header

Magic number: MZ
Bytes on last page of file: 0x0090
Pages in file: 0x0003
Relocations: 0x0000
Size of header: 0x0004
Min extra paragraphs: 0x0000
Max extra paragraphs: 0xFFFF
Initial SS value: 0x0000
Initial SP value: 0x00B8
Checksum: 0x0000
Initial IP value: 0x0000
Initial CS value: 0x0000
Overlay number: 0x0000
OEM identifier: 0x0000
OEM information: 0x0000
Address of NE header: 0x000000C8

PE Headers

Signature: PE
Machine: IMAGE_FILE_MACHINE_I386
Number of sections: 5
Time date stamp: 02-Apr-2016 03:20:09
Pointer to Symbol Table: 0x00000000
Number of symbols: 0
Size of Optional Header: 0x00E0
Characteristics:
  • IMAGE_FILE_32BIT_MACHINE
  • IMAGE_FILE_EXECUTABLE_IMAGE
  • IMAGE_FILE_LINE_NUMS_STRIPPED
  • IMAGE_FILE_LOCAL_SYMS_STRIPPED
  • IMAGE_FILE_RELOCS_STRIPPED

Sections

Name
Virtual Address
Virtual Size
Raw Size
Charateristics
Entropy
.text
0x00001000
0x00005C74
0x00005E00
IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
6.41039
.rdata
0x00007000
0x00001196
0x00001200
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
5.20374
.data
0x00009000
0x0001B058
0x00000600
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
4.13053
.ndata
0x00025000
0x0000C000
0x00000000
IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
0
.rsrc
0x00031000
0x000016E8
0x00001800
IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
4.45585

Resources

Title
Entropy
Size
Codepage
Language
Type
1
5.21417
958
UNKNOWN
English - United States
RT_MANIFEST
103
1.5789
20
UNKNOWN
English - United States
RT_GROUP_ICON
105
2.58881
500
UNKNOWN
English - United States
RT_DIALOG
106
2.80484
236
UNKNOWN
English - United States
RT_DIALOG
107
2.32668
148
UNKNOWN
English - United States
RT_DIALOG
109
2.5719
200
UNKNOWN
English - United States
RT_DIALOG
111
2.84525
226
UNKNOWN
English - United States
RT_DIALOG

Imports

ADVAPI32.dll
COMCTL32.dll
GDI32.dll
KERNEL32.dll
SHELL32.dll
USER32.dll
ole32.dll
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
45
Monitored processes
9
Malicious processes
7
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start drop and start drop and start start bit4id_middleware.exe rundll32.exe no specs b4notify.exe no specs rundll32.exe no specs modutil.exe no specs modutil.exe no specs rundll32.exe no specs crtmgr.exe no specs bit4id_middleware.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
572"C:\Users\admin\AppData\Local\Temp\Bit4id_Middleware.exe" C:\Users\admin\AppData\Local\Temp\Bit4id_Middleware.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Bit4id - Universal MW
Exit code:
3221226540
Version:
1.4.10.404
Modules
Images
c:\users\admin\appdata\local\temp\bit4id_middleware.exe
672"C:\Program Files\Bit4Id\Universal MW\nssmod\modutil.exe" -force -dbdir "C:\Users\admin\\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default" -delete "Bit4id-PKCS11"C:\Program Files\Bit4Id\Universal MW\nssmod\modutil.exeBit4id_Middleware.exe
User:
admin
Integrity Level:
HIGH
Exit code:
16
Modules
Images
c:\program files\bit4id\universal mw\nssmod\modutil.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\bit4id\universal mw\nssmod\smime3.dll
c:\program files\bit4id\universal mw\nssmod\nss3.dll
c:\program files\bit4id\universal mw\nssmod\softokn3.dll
c:\program files\bit4id\universal mw\nssmod\plc4.dll
c:\program files\bit4id\universal mw\nssmod\nspr4.dll
c:\windows\system32\advapi32.dll
1360"C:\Windows\system32\b4notify.exe"C:\Windows\system32\b4notify.exeBit4id_Middleware.exe
User:
admin
Integrity Level:
HIGH
Description:
b4notify Application
Exit code:
0
Version:
1, 0, 3, 0
Modules
Images
c:\windows\system32\b4notify.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winspool.drv
2140"C:\Windows\system32\RUNDLL32.EXE" "C:\Windows\system32\bit4upki-store.dll",RunImportSequenceC:\Windows\system32\RUNDLL32.EXERUNDLL32.EXE
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\rundll32.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imagehlp.dll
2332"C:\Users\admin\AppData\Local\Temp\Bit4id_Middleware.exe" C:\Users\admin\AppData\Local\Temp\Bit4id_Middleware.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Description:
Bit4id - Universal MW
Exit code:
0
Version:
1.4.10.404
Modules
Images
c:\users\admin\appdata\local\temp\bit4id_middleware.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shell32.dll
2356"RUNDLL32.EXE" "C:\Windows\system32\bit4upki-store.dll",RunImportServerC:\Windows\system32\RUNDLL32.EXEBit4id_Middleware.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\rundll32.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imagehlp.dll
2560"C:\Windows\system32\rundll32.exe " "C:\Windows\system32\bit4upki-store.dll",RunImportServerC:\Windows\system32\rundll32.exeBit4id_Middleware.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\rundll32.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\imagehlp.dll
3256"C:\Program Files\Bit4Id\Universal MW\bin\crtmgr.exe" C:\Program Files\Bit4Id\Universal MW\bin\crtmgr.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\program files\bit4id\universal mw\bin\crtmgr.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\bit4id\universal mw\bin\python27.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
3504"C:\Program Files\Bit4Id\Universal MW\nssmod\modutil.exe" -force -dbdir "C:\Users\admin\\AppData\Roaming\Mozilla\Firefox\Profiles\qldyz51w.default" -add "Bit4id-PKCS11" -libfile "C:\Windows\system32\bit4xpki.dll"C:\Program Files\Bit4Id\Universal MW\nssmod\modutil.exeBit4id_Middleware.exe
User:
admin
Integrity Level:
HIGH
Exit code:
16
Modules
Images
c:\program files\bit4id\universal mw\nssmod\modutil.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\bit4id\universal mw\nssmod\smime3.dll
c:\program files\bit4id\universal mw\nssmod\nss3.dll
c:\program files\bit4id\universal mw\nssmod\softokn3.dll
c:\program files\bit4id\universal mw\nssmod\plc4.dll
c:\program files\bit4id\universal mw\nssmod\nspr4.dll
c:\windows\system32\advapi32.dll
Total events
749
Read events
394
Write events
355
Delete events
0

Modification events

(PID) Process:(2332) Bit4id_Middleware.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\bit4id\pkimanager
Operation:writeName:path
Value:
C:\Program Files\Bit4Id\Universal MW\bin\crtmgr.exe
(PID) Process:(2332) Bit4id_Middleware.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\bit4id\pkimanager
Operation:writeName:name
Value:
Bit4id - PKI Manager
(PID) Process:(2332) Bit4id_Middleware.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\Defaults\Provider\Bit4id Universal Middleware Provider
Operation:writeName:
Value:
(PID) Process:(2332) Bit4id_Middleware.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\Defaults\Provider\Bit4id Universal Middleware Provider
Operation:writeName:Image Path
Value:
bit4ucsp1.dll
(PID) Process:(2332) Bit4id_Middleware.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\Defaults\Provider\Bit4id Universal Middleware Provider
Operation:writeName:Type
Value:
1
(PID) Process:(2332) Bit4id_Middleware.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\Defaults\Provider\Bit4id Universal Middleware Provider
Operation:writeName:SigInFile
Value:
0
(PID) Process:(2332) Bit4id_Middleware.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography\Defaults\Provider\Bit4id Universal Middleware Provider
Operation:writeName:Signature
Value:
E4B581DE9789FB55A13EE0729F15BE9B4D62E3FCB9CCA518822A8FB08B4D8676CAA48E63B64B968E6AFF0985C61708D2A293A8C66D70BDF4F1E4B9BF9DA885B7003E04E558BF9EE01DDBB351AA3E1CD0DB0D517E62873FAE2EE325188FDF0DAAA55E7F1B22F8BDD14567A0B099EA3D8D1A3DC6ABEC451671F313A9A289E711910000000000000000
(PID) Process:(2332) Bit4id_Middleware.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\bit4id\stub
Operation:writeName:bit4ucsp2.dll
Value:
C:\Windows\system32\basecsp.dll
(PID) Process:(2332) Bit4id_Middleware.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\bit4id\log
Operation:writeName:bit4ucsp2.dll
Value:
0
(PID) Process:(2332) Bit4id_Middleware.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\bit4id\log
Operation:writeName:csp12.dll
Value:
0
Executable files
90
Suspicious files
12
Text files
56
Unknown types
16

Dropped files

PID
Process
Filename
Type
2332Bit4id_Middleware.exeC:\Users\admin\AppData\Local\Temp\nsa83DA.tmp\ioSpecial.initext
MD5:
SHA256:
2332Bit4id_Middleware.exeC:\Users\admin\AppData\Local\Temp\nsa83DA.tmp\InstallOptions.dllexecutable
MD5:D753362649AECD60FF434ADF171A4E7F
SHA256:8F24C6CF0B06D18F3C07E7BFCA4E92AFCE71834663746CFAA9DDF52A25D5C586
2332Bit4id_Middleware.exeC:\Users\admin\AppData\Local\Temp\nsa83DA.tmp\modern-wizard.bmpimage
MD5:2DDDAFD7D1C70ECE7D062EA77DEF5CC8
SHA256:D092789EC8AEBD227408D874E7F7FF9A7937A1BCB6F3E78EDB1AAB4ECC490465
2332Bit4id_Middleware.exeC:\Program Files\Bit4Id\Universal MW\icon.icoimage
MD5:0B24CB6BE9CF9C217EC21156B9CBBB10
SHA256:586ACCAD16A20DF8A55F5D86C7637C6A5907444AAAFCF4C9844C294FC5B44311
2332Bit4id_Middleware.exeC:\Users\admin\AppData\Local\Temp\nsa83DA.tmp\System.dllexecutable
MD5:56A321BD011112EC5D8A32B2F6FD3231
SHA256:BB6DF93369B498EAA638B0BCDC4BB89F45E9B02CA12D28BCEDF4629EA7F5E0F1
2332Bit4id_Middleware.exeC:\Program Files\Bit4Id\Universal MW\bin\crtmgr.exeexecutable
MD5:AF847B9B13CA4401078C31FCA45B89E3
SHA256:CF0547D790E2BAD1FA6E80F8B46EB4A25CBBE296FB780DB35F85502ED33AF009
2332Bit4id_Middleware.exeC:\Program Files\Bit4Id\Universal MW\bin\qt.conftext
MD5:D0C3389EB6E14F0639E4F239A178E4E2
SHA256:FA40BAFE3FF14BE61C2AA9FC205B34D3C07FDEEC3DB0125E563D57CC95BF95D8
2332Bit4id_Middleware.exeC:\Program Files\Bit4Id\Universal MW\bin\Microsoft.VC90.CRT.manifestxml
MD5:8AD846D90D4BCBCAF1A54CB2775F02E5
SHA256:DDC41D9A17E607F33E5E1C23EA43CF691F761A3C7595225601DFB80615ABE620
2332Bit4id_Middleware.exeC:\Program Files\Bit4Id\Universal MW\bin\qt_it.qmqm
MD5:E4888EFFC8DB9F6F3B36DAEDE6064FA9
SHA256:6DE08B33C00A239BC252431487D46BE4463F6A05BDCD8459EE08C1C15710D8DE
2332Bit4id_Middleware.exeC:\Program Files\Bit4Id\Universal MW\etc\ebkeybinary
MD5:67EA9A7253CFE3C289570480412B2B88
SHA256:A41181B50A4227F28B4645C61B2F851FB32542F8522F5289B679BCE329DF22C1
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
0
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

No data

DNS requests

No data

Threats

No threats detected
No debug info