File name:

WEXTRACT.EXE

Full analysis: https://app.any.run/tasks/2b35d9d5-6b6a-428e-846b-f3af624230c5
Verdict: Malicious activity
Analysis date: November 09, 2023, 07:15:40
OS: Windows 7 Professional Service Pack 1 (build: 7601, 64 bit)
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

D6B211EF48F31C6DA275D5699F946AE6

SHA1:

E40164EB3735B4098F0FA751A230581D69A6B68D

SHA256:

51C21635D3B4C39E3CF1B7CB44225F61738B1EDDA535FA652501BD6DB656766C

SSDEEP:

24576:4LnTKqndILT27l7pGM1yr4XIwHNuyyFQeFixWIxZ:4LnemILT27l7YM1yr4XIwHsyyFQeFixj

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • WEXTRACT.EXE (PID: 988)
  • SUSPICIOUS

    • Reads the Internet Settings

      • AppLaunch.exe (PID: 2600)
    • Connects to unusual port

      • 2bm497NA.exe (PID: 2672)
  • INFO

    • Checks supported languages

      • 1Xr03Ea5.exe (PID: 2328)
      • WEXTRACT.EXE (PID: 988)
      • 2bm497NA.exe (PID: 2672)
      • AppLaunch.exe (PID: 2600)
    • Create files in a temporary directory

      • WEXTRACT.EXE (PID: 988)
    • Reads the computer name

      • 2bm497NA.exe (PID: 2672)
      • AppLaunch.exe (PID: 2600)
    • Checks proxy server information

      • AppLaunch.exe (PID: 2600)
    • Reads the machine GUID from the registry

      • AppLaunch.exe (PID: 2600)
      • 2bm497NA.exe (PID: 2672)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2022:05:25 00:49:06+02:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14.13
CodeSize: 25600
InitializedDataSize: 544768
UninitializedDataSize: -
EntryPoint: 0x6a60
OSVersion: 10
ImageVersion: 10
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 11.0.17763.1
ProductVersionNumber: 11.0.17763.1
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: Microsoft Corporation
FileDescription: Win32 Cabinet Self-Extractor
FileVersion: 11.00.17763.1 (WinBuild.160101.0800)
InternalName: Wextract
LegalCopyright: © Microsoft Corporation. All rights reserved.
OriginalFileName: WEXTRACT.EXE .MUI
ProductName: Internet Explorer
ProductVersion: 11.00.17763.1
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
35
Monitored processes
4
Malicious processes
2
Suspicious processes
0

Behavior graph

Click at the process to see the details
start wextract.exe no specs 1xr03ea5.exe no specs applaunch.exe 2bm497na.exe

Process information

PID
CMD
Path
Indicators
Parent process
988"C:\Users\admin\AppData\Local\Temp\WEXTRACT.EXE" C:\Users\admin\AppData\Local\Temp\WEXTRACT.EXEexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Win32 Cabinet Self-Extractor
Exit code:
0
Version:
11.00.17763.1 (WinBuild.160101.0800)
Modules
Images
c:\users\admin\appdata\local\temp\wextract.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\kernelbase.dll
2328C:\Users\admin\AppData\Local\Temp\IXP000.TMP\1Xr03Ea5.exeC:\Users\admin\AppData\Local\Temp\IXP000.TMP\1Xr03Ea5.exeWEXTRACT.EXE
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\ixp000.tmp\1xr03ea5.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\kernelbase.dll
2600"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
1Xr03Ea5.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET ClickOnce Launch Utility
Exit code:
1
Version:
4.7.2558.0 built by: NET471REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\applaunch.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\kernelbase.dll
2672C:\Users\admin\AppData\Local\Temp\IXP000.TMP\2bm497NA.exeC:\Users\admin\AppData\Local\Temp\IXP000.TMP\2bm497NA.exe
WEXTRACT.EXE
User:
admin
Integrity Level:
MEDIUM
Description:
Fps boost
Exit code:
0
Version:
15.9.1.22
Modules
Images
c:\users\admin\appdata\local\temp\ixp000.tmp\2bm497na.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\mscoree.dll
Total events
591
Read events
587
Write events
4
Delete events
0

Modification events

(PID) Process:(2600) AppLaunch.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(2600) AppLaunch.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(2600) AppLaunch.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(2600) AppLaunch.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
46000000C1000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
Executable files
2
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
988WEXTRACT.EXEC:\Users\admin\AppData\Local\Temp\IXP000.TMP\1Xr03Ea5.exeexecutable
MD5:A5A72ED79AE5E9780A11E88E6C6853C2
SHA256:4D29C049F541CF4CFC30160228C05C981A115B3890004FB839FF261B99B62051
988WEXTRACT.EXEC:\Users\admin\AppData\Local\Temp\IXP000.TMP\2bm497NA.exeexecutable
MD5:15CC2ABBE3DB1C1B803C2D09798F3D66
SHA256:4E79DB983BA0E6A9B3DACF1E49BC34E2512F4C25D34AC889D225F66E372548E7
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
62
DNS requests
0
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
1956
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:137
whitelisted
2600
AppLaunch.exe
193.233.255.73:80
LLC Baxet
RU
malicious
2672
2bm497NA.exe
77.91.124.86:19084
Foton Telecom CJSC
RU
malicious
324
svchost.exe
224.0.0.252:5355
unknown
4
System
192.168.100.255:138
whitelisted

DNS requests

No data

Threats

No threats detected
No debug info