File name:

WEXTRACT.exe

Full analysis: https://app.any.run/tasks/638cd007-f49a-402a-8fe4-dc07809efba7
Verdict: Malicious activity
Analysis date: December 28, 2023, 17:52:58
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

12382062C6ABC23EBDF6AEC25F383FA4

SHA1:

9834DC9A4FD1F037C574C27A932C96D68409C882

SHA256:

24B66C0D6F26F5DE09B4CB7A2496BF87AD0ED9D45E846870DEE70941B565BC3C

SSDEEP:

49152:SLnemI4SBofQmk5fozRgpxdsFzIv8HqCTmU4ABHA+xskww4YmUvHLcL8bbtg8VWl:2n2CfQmktozRg7dsFzIv8HxTR40A2skD

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Changes the autorun value in the registry

      • explothe.exe (PID: 584)
    • Uses Task Scheduler to run other applications

      • explothe.exe (PID: 584)
  • SUSPICIOUS

    • Reads the Internet Settings

      • 5NS8xD0.exe (PID: 1044)
      • explothe.exe (PID: 584)
      • cmd.exe (PID: 1820)
    • Starts CMD.EXE for commands execution

      • cmd.exe (PID: 1592)
      • explothe.exe (PID: 584)
      • 7ct2pQ14.exe (PID: 764)
    • Executing commands from a ".bat" file

      • 7ct2pQ14.exe (PID: 764)
    • Uses ICACLS.EXE to modify access control lists

      • cmd.exe (PID: 1592)
  • INFO

    • Process drops legitimate windows executable

      • WEXTRACT.exe (PID: 120)
      • Rw4YT03.exe (PID: 128)
      • nf4rn60.exe (PID: 124)
      • FJ4OU94.exe (PID: 1776)
      • kK0yG24.exe (PID: 1432)
    • Checks supported languages

      • Rw4YT03.exe (PID: 128)
      • WEXTRACT.exe (PID: 120)
      • nf4rn60.exe (PID: 124)
      • FJ4OU94.exe (PID: 1776)
      • kK0yG24.exe (PID: 1432)
      • AppLaunch.exe (PID: 1056)
      • 1rs14bk1.exe (PID: 1288)
      • 2Ro9432.exe (PID: 324)
      • AppLaunch.exe (PID: 668)
      • AppLaunch.exe (PID: 2420)
      • 3Hm09Ej.exe (PID: 2016)
      • 4ew995pG.exe (PID: 268)
      • explothe.exe (PID: 584)
      • qP5Qb44.exe (PID: 1356)
      • 5NS8xD0.exe (PID: 1044)
      • 6dg6UC8.exe (PID: 1836)
      • 7ct2pQ14.exe (PID: 764)
    • Create files in a temporary directory

      • Rw4YT03.exe (PID: 128)
      • nf4rn60.exe (PID: 124)
      • WEXTRACT.exe (PID: 120)
      • FJ4OU94.exe (PID: 1776)
      • kK0yG24.exe (PID: 1432)
      • qP5Qb44.exe (PID: 1356)
      • 5NS8xD0.exe (PID: 1044)
      • 7ct2pQ14.exe (PID: 764)
    • Drops the executable file immediately after the start

      • Rw4YT03.exe (PID: 128)
      • nf4rn60.exe (PID: 124)
      • WEXTRACT.exe (PID: 120)
      • FJ4OU94.exe (PID: 1776)
      • kK0yG24.exe (PID: 1432)
      • qP5Qb44.exe (PID: 1356)
      • 5NS8xD0.exe (PID: 1044)
    • Reads the computer name

      • AppLaunch.exe (PID: 1056)
      • 5NS8xD0.exe (PID: 1044)
      • AppLaunch.exe (PID: 668)
      • explothe.exe (PID: 584)
    • Starts itself from another location

      • 5NS8xD0.exe (PID: 1044)
    • Reads the machine GUID from the registry

      • AppLaunch.exe (PID: 668)
      • explothe.exe (PID: 584)
    • Application launched itself

      • cmd.exe (PID: 1592)
      • msedge.exe (PID: 2312)
      • msedge.exe (PID: 2296)
      • msedge.exe (PID: 2192)
      • msedge.exe (PID: 2328)
      • msedge.exe (PID: 2736)
      • msedge.exe (PID: 2320)
      • msedge.exe (PID: 2888)
      • msedge.exe (PID: 664)
      • msedge.exe (PID: 1036)
      • msedge.exe (PID: 2792)
    • Checks proxy server information

      • explothe.exe (PID: 584)
    • Connects to unusual port

      • AppLaunch.exe (PID: 668)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2022:05:25 00:49:06+02:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14.13
CodeSize: 25600
InitializedDataSize: 1590784
UninitializedDataSize: -
EntryPoint: 0x6a60
OSVersion: 10
ImageVersion: 10
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 11.0.17763.1
ProductVersionNumber: 11.0.17763.1
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: Microsoft Corporation
FileDescription: Win32 Cabinet Self-Extractor
FileVersion: 11.00.17763.1 (WinBuild.160101.0800)
InternalName: Wextract
LegalCopyright: © Microsoft Corporation. All rights reserved.
OriginalFileName: WEXTRACT.EXE .MUI
ProductName: Internet Explorer
ProductVersion: 11.00.17763.1
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
109
Monitored processes
72
Malicious processes
1
Suspicious processes
1

Behavior graph

Click at the process to see the details
start wextract.exe no specs rw4yt03.exe no specs nf4rn60.exe no specs fj4ou94.exe no specs kk0yg24.exe no specs qp5qb44.exe no specs 1rs14bk1.exe no specs applaunch.exe no specs 2ro9432.exe no specs applaunch.exe no specs 3hm09ej.exe no specs 4ew995pg.exe no specs applaunch.exe 5ns8xd0.exe no specs explothe.exe 6dg6uc8.exe no specs 7ct2pq14.exe no specs schtasks.exe no specs cmd.exe no specs cmd.exe no specs cmd.exe no specs cacls.exe no specs cacls.exe no specs cmd.exe no specs cacls.exe no specs msedge.exe no specs msedge.exe no specs cacls.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
120"C:\Users\admin\Desktop\WEXTRACT.exe" C:\Users\admin\Desktop\WEXTRACT.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Win32 Cabinet Self-Extractor
Exit code:
0
Version:
11.00.17763.1 (WinBuild.160101.0800)
Modules
Images
c:\users\admin\desktop\wextract.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
124C:\Users\admin\AppData\Local\Temp\IXP001.TMP\nf4rn60.exeC:\Users\admin\AppData\Local\Temp\IXP001.TMP\nf4rn60.exeRw4YT03.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Win32 Cabinet Self-Extractor
Exit code:
0
Version:
11.00.17763.1 (WinBuild.160101.0800)
Modules
Images
c:\users\admin\appdata\local\temp\ixp001.tmp\nf4rn60.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
128C:\Users\admin\AppData\Local\Temp\IXP000.TMP\Rw4YT03.exeC:\Users\admin\AppData\Local\Temp\IXP000.TMP\Rw4YT03.exeWEXTRACT.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Win32 Cabinet Self-Extractor
Exit code:
0
Version:
11.00.17763.1 (WinBuild.160101.0800)
Modules
Images
c:\users\admin\appdata\local\temp\ixp000.tmp\rw4yt03.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
268C:\Users\admin\AppData\Local\Temp\IXP003.TMP\4ew995pG.exeC:\Users\admin\AppData\Local\Temp\IXP003.TMP\4ew995pG.exeFJ4OU94.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\ixp003.tmp\4ew995pg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\apppatch\aclayers.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
324C:\Users\admin\AppData\Local\Temp\IXP005.TMP\2Ro9432.exeC:\Users\admin\AppData\Local\Temp\IXP005.TMP\2Ro9432.exeqP5Qb44.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\ixp005.tmp\2ro9432.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\apppatch\aclayers.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
584"C:\Users\admin\AppData\Local\Temp\fefffe8cea\explothe.exe" C:\Users\admin\AppData\Local\Temp\fefffe8cea\explothe.exe
5NS8xD0.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\fefffe8cea\explothe.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shell32.dll
c:\windows\system32\shlwapi.dll
664"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --single-argument https://steamcommunity.com/openid/loginform/C:\Program Files\Microsoft\Edge\Application\msedge.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\apphelp.dll
c:\windows\apppatch\aclayers.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
668"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
4ew995pG.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET ClickOnce Launch Utility
Exit code:
0
Version:
4.8.3761.0 built by: NET48REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\applaunch.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\apppatch\aclayers.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
764C:\Users\admin\AppData\Local\Temp\IXP000.TMP\7ct2pQ14.exeC:\Users\admin\AppData\Local\Temp\IXP000.TMP\7ct2pQ14.exeWEXTRACT.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\ixp000.tmp\7ct2pq14.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.24483_none_2b200f664577e14b\comctl32.dll
796"C:\Program Files\Microsoft\Edge\Application\msedge.exe" --type=crashpad-handler "--user-data-dir=C:\Users\admin\AppData\Local\Microsoft\Edge\User Data" /prefetch:7 --monitor-self-annotation=ptype=crashpad-handler "--database=C:\Users\admin\AppData\Local\Microsoft\Edge\User Data\Crashpad" "--metrics-dir=C:\Users\admin\AppData\Local\Microsoft\Edge\User Data" --annotation=IsOfficialBuild=1 --annotation=channel= --annotation=chromium-version=109.0.5414.149 "--annotation=exe=C:\Program Files\Microsoft\Edge\Application\msedge.exe" --annotation=plat=Win32 "--annotation=prod=Microsoft Edge" --annotation=ver=109.0.1518.115 --initial-client-data=0x178,0x17c,0x180,0x14c,0x188,0x6d63f598,0x6d63f5a8,0x6d63f5b4C:\Program Files\Microsoft\Edge\Application\msedge.exemsedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Exit code:
0
Version:
109.0.1518.115
Modules
Images
c:\program files\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\microsoft\edge\application\109.0.1518.115\msedge_elf.dll
c:\windows\system32\apphelp.dll
c:\windows\apppatch\aclayers.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
Total events
6 202
Read events
6 054
Write events
148
Delete events
0

Modification events

(PID) Process:(1044) 5NS8xD0.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(1044) 5NS8xD0.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(1044) 5NS8xD0.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(1044) 5NS8xD0.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(584) explothe.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\User Shell Folders
Operation:writeName:Startup
Value:
%USERPROFILE%\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup
(PID) Process:(584) explothe.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(584) explothe.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(584) explothe.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(584) explothe.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(2296) msedge.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Edge\BLBeacon
Operation:writeName:failed_count
Value:
0
Executable files
13
Suspicious files
12
Text files
10
Unknown types
0

Dropped files

PID
Process
Filename
Type
2636msedge.exe
MD5:
SHA256:
2052msedge.exe
MD5:
SHA256:
2660msedge.exe
MD5:
SHA256:
2324msedge.exe
MD5:
SHA256:
2672msedge.exe
MD5:
SHA256:
2900msedge.exe
MD5:
SHA256:
1220msedge.exe
MD5:
SHA256:
128Rw4YT03.exeC:\Users\admin\AppData\Local\Temp\IXP001.TMP\nf4rn60.exeexecutable
MD5:C9E0455AC52FF3674FB40C1BD95BE627
SHA256:6426531E3CCFFA7E54B3D1DDACCF90F9BE07BBD14A2CB2ECCBA6FFC6F21C3CF9
120WEXTRACT.exeC:\Users\admin\AppData\Local\Temp\IXP000.TMP\Rw4YT03.exeexecutable
MD5:C21BFF299A662C17AF5E4E9730B3A464
SHA256:735390B07D329A0474622E85810F58C274B467C311EA35D714EC26B324E7286D
1776FJ4OU94.exeC:\Users\admin\AppData\Local\Temp\IXP003.TMP\4ew995pG.exeexecutable
MD5:B39225654BE17D5E910F2E2359F88A8C
SHA256:06A9D4BD4DF6EB615A8E2D7F686CC737267E43F8F3D827DFF23AA481AF54CE90
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
11
DNS requests
1
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
HEAD
200
23.214.232.9:80
http://query.prod.cms.rt.microsoft.com/cms/api/am/binary/RE2JgkA?v=133482596214840000
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
unknown
4
System
192.168.100.255:137
unknown
1080
svchost.exe
224.0.0.252:5355
unknown
584
explothe.exe
77.91.124.1:80
Foton Telecom CJSC
RU
unknown
668
AppLaunch.exe
77.91.124.86:19084
Foton Telecom CJSC
RU
unknown
224.0.0.252:5355
unknown
23.214.232.9:80
query.prod.cms.rt.microsoft.com
Reliance Jio Infocomm Limited
IN
unknown

DNS requests

Domain
IP
Reputation
query.prod.cms.rt.microsoft.com
  • 23.214.232.9
unknown

Threats

No threats detected
No debug info