File name:

wextract.exe

Full analysis: https://app.any.run/tasks/d07e169f-9c68-4b5b-841f-3f348d6aa7cb
Verdict: Malicious activity
Threats:

RedLine Stealer is a malicious program that collects users’ confidential data from browsers, systems, and installed software. It also infects operating systems with other malware.

Analysis date: October 27, 2023, 08:46:08
OS: Windows 7 Professional Service Pack 1 (build: 7601, 64 bit)
Tags:
stealc
stealer
sinkhole
redline
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

751B48D719E1FCA2BDA5F16480E8BC85

SHA1:

35FA46A82EDBA147FDD4A2751F7F1A7EA203A4D9

SHA256:

5304B4F24C9283FAB4E768233A26E2CB6A40CEDABBCDB711588FEEE0361692BF

SSDEEP:

49152:tLnemIreQ6FvAUH5TemprSKoulT3lxc8iGDJHR+hz+MNorA4/8Z8bPlVBtUTNEcq:Jn2S5H5TeG2KoiTXc9GD9UHSrRe8Jrtl

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • UR4jf4pv.exe (PID: 844)
      • wextract.exe (PID: 2612)
      • Cm6LD8uU.exe (PID: 2008)
      • GU4bi5we.exe (PID: 3020)
    • Application was dropped or rewritten from another process

      • GU4bi5we.exe (PID: 3020)
      • Cm6LD8uU.exe (PID: 2008)
      • UR4jf4pv.exe (PID: 844)
      • 1ep95yZ9.exe (PID: 640)
      • 2xV122Gv.exe (PID: 276)
      • 4QD330tD.exe (PID: 2444)
      • 3Bz6tq00.exe (PID: 2204)
    • Connects to the CnC server

      • AppLaunch.exe (PID: 3056)
      • 2xV122Gv.exe (PID: 276)
    • STEALC has been detected (SURICATA)

      • AppLaunch.exe (PID: 3056)
    • REDLINE has been detected (SURICATA)

      • 2xV122Gv.exe (PID: 276)
    • Steals credentials from Web Browsers

      • 2xV122Gv.exe (PID: 276)
    • Actions looks like stealing of personal data

      • 2xV122Gv.exe (PID: 276)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • wextract.exe (PID: 2612)
      • UR4jf4pv.exe (PID: 844)
      • Cm6LD8uU.exe (PID: 2008)
    • Reads the Internet Settings

      • AppLaunch.exe (PID: 3056)
      • 3Bz6tq00.exe (PID: 2204)
    • Reads browser cookies

      • 2xV122Gv.exe (PID: 276)
    • Searches for installed software

      • 2xV122Gv.exe (PID: 276)
    • Connects to unusual port

      • 2xV122Gv.exe (PID: 276)
    • Connects to the server without a host name

      • AppLaunch.exe (PID: 3056)
      • 3Bz6tq00.exe (PID: 2204)
  • INFO

    • Checks supported languages

      • wextract.exe (PID: 2612)
      • UR4jf4pv.exe (PID: 844)
      • Cm6LD8uU.exe (PID: 2008)
      • GU4bi5we.exe (PID: 3020)
      • 1ep95yZ9.exe (PID: 640)
      • AppLaunch.exe (PID: 3056)
      • 2xV122Gv.exe (PID: 276)
      • 3Bz6tq00.exe (PID: 2204)
      • 4QD330tD.exe (PID: 2444)
    • Create files in a temporary directory

      • wextract.exe (PID: 2612)
      • UR4jf4pv.exe (PID: 844)
      • Cm6LD8uU.exe (PID: 2008)
      • GU4bi5we.exe (PID: 3020)
    • Reads the computer name

      • 2xV122Gv.exe (PID: 276)
      • AppLaunch.exe (PID: 3056)
      • 3Bz6tq00.exe (PID: 2204)
    • Checks proxy server information

      • AppLaunch.exe (PID: 3056)
      • 3Bz6tq00.exe (PID: 2204)
    • Reads the machine GUID from the registry

      • AppLaunch.exe (PID: 3056)
      • 2xV122Gv.exe (PID: 276)
      • 3Bz6tq00.exe (PID: 2204)
    • Reads Environment values

      • 2xV122Gv.exe (PID: 276)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2022:05:25 00:49:06+02:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14.13
CodeSize: 25600
InitializedDataSize: 1363456
UninitializedDataSize: -
EntryPoint: 0x6a60
OSVersion: 10
ImageVersion: 10
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 11.0.17763.1
ProductVersionNumber: 11.0.17763.1
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: Microsoft Corporation
FileDescription: Win32 Cabinet Self-Extractor
FileVersion: 11.00.17763.1 (WinBuild.160101.0800)
InternalName: Wextract
LegalCopyright: © Microsoft Corporation. All rights reserved.
OriginalFileName: WEXTRACT.EXE .MUI
ProductName: Internet Explorer
ProductVersion: 11.00.17763.1
No data.
screenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
41
Monitored processes
9
Malicious processes
8
Suspicious processes
1

Behavior graph

Click at the process to see the details
drop and start start drop and start drop and start drop and start drop and start drop and start drop and start wextract.exe no specs ur4jf4pv.exe no specs cm6ld8uu.exe no specs gu4bi5we.exe no specs 1ep95yz9.exe no specs #STEALC applaunch.exe #REDLINE 2xv122gv.exe 3bz6tq00.exe 4qd330td.exe

Process information

PID
CMD
Path
Indicators
Parent process
276C:\Users\admin\AppData\Local\Temp\IXP003.TMP\2xV122Gv.exeC:\Users\admin\AppData\Local\Temp\IXP003.TMP\2xV122Gv.exe
GU4bi5we.exe
User:
admin
Integrity Level:
MEDIUM
Description:
Fps boost
Exit code:
0
Version:
15.9.1.22
Modules
Images
c:\users\admin\appdata\local\temp\ixp003.tmp\2xv122gv.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\kernelbase.dll
640C:\Users\admin\AppData\Local\Temp\IXP003.TMP\1ep95yZ9.exeC:\Users\admin\AppData\Local\Temp\IXP003.TMP\1ep95yZ9.exeGU4bi5we.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\ixp003.tmp\1ep95yz9.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\kernelbase.dll
844C:\Users\admin\AppData\Local\Temp\IXP000.TMP\UR4jf4pv.exeC:\Users\admin\AppData\Local\Temp\IXP000.TMP\UR4jf4pv.exewextract.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Win32 Cabinet Self-Extractor
Exit code:
0
Version:
11.00.17763.1 (WinBuild.160101.0800)
Modules
Images
c:\users\admin\appdata\local\temp\ixp000.tmp\ur4jf4pv.exe
c:\windows\syswow64\ntdll.dll
c:\windows\system32\ntdll.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\wow64.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\system32\user32.dll
2008C:\Users\admin\AppData\Local\Temp\IXP001.TMP\Cm6LD8uU.exeC:\Users\admin\AppData\Local\Temp\IXP001.TMP\Cm6LD8uU.exeUR4jf4pv.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Win32 Cabinet Self-Extractor
Exit code:
0
Version:
11.00.17763.1 (WinBuild.160101.0800)
Modules
Images
c:\users\admin\appdata\local\temp\ixp001.tmp\cm6ld8uu.exe
c:\windows\syswow64\ntdll.dll
c:\windows\system32\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\advapi32.dll
2204C:\Users\admin\AppData\Local\Temp\IXP002.TMP\3Bz6tq00.exeC:\Users\admin\AppData\Local\Temp\IXP002.TMP\3Bz6tq00.exe
Cm6LD8uU.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
1
Modules
Images
c:\users\admin\appdata\local\temp\ixp002.tmp\3bz6tq00.exe
c:\windows\syswow64\ntdll.dll
c:\windows\system32\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\kernelbase.dll
2444C:\Users\admin\AppData\Local\Temp\IXP001.TMP\4QD330tD.exeC:\Users\admin\AppData\Local\Temp\IXP001.TMP\4QD330tD.exe
UR4jf4pv.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\windows\system32\ntdll.dll
c:\users\admin\appdata\local\temp\ixp001.tmp\4qd330td.exe
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\kernelbase.dll
2612"C:\Users\admin\AppData\Local\Temp\wextract.exe" C:\Users\admin\AppData\Local\Temp\wextract.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Win32 Cabinet Self-Extractor
Exit code:
0
Version:
11.00.17763.1 (WinBuild.160101.0800)
Modules
Images
c:\users\admin\appdata\local\temp\wextract.exe
c:\windows\syswow64\ntdll.dll
c:\windows\system32\ntdll.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\wow64.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\kernelbase.dll
3020C:\Users\admin\AppData\Local\Temp\IXP002.TMP\GU4bi5we.exeC:\Users\admin\AppData\Local\Temp\IXP002.TMP\GU4bi5we.exeCm6LD8uU.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Win32 Cabinet Self-Extractor
Exit code:
0
Version:
11.00.17763.1 (WinBuild.160101.0800)
Modules
Images
c:\users\admin\appdata\local\temp\ixp002.tmp\gu4bi5we.exe
c:\windows\syswow64\ntdll.dll
c:\windows\system32\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\kernelbase.dll
3056"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
1ep95yZ9.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET ClickOnce Launch Utility
Exit code:
1
Version:
4.7.2558.0 built by: NET471REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\applaunch.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\kernelbase.dll
Total events
1 021
Read events
1 013
Write events
8
Delete events
0

Modification events

(PID) Process:(3056) AppLaunch.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(3056) AppLaunch.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(3056) AppLaunch.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(3056) AppLaunch.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
46000000C1000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(2204) 3Bz6tq00.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(2204) 3Bz6tq00.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(2204) 3Bz6tq00.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(2204) 3Bz6tq00.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
46000000C2000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
Executable files
8
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
2612wextract.exeC:\Users\admin\AppData\Local\Temp\IXP000.TMP\5Tl19rh.exeexecutable
MD5:BC86CA064DD470669C0DD1B020E4C67E
SHA256:6C6F3A37EECB15C7558FAF5D6DB535E46ECC1C9DFB26C00FE3CDE00211545620
3020GU4bi5we.exeC:\Users\admin\AppData\Local\Temp\IXP003.TMP\2xV122Gv.exeexecutable
MD5:1408C7DD4A3A4F8CE30ABC66A3E6A199
SHA256:88FDFE1871031C0B99C274A6ECD25DB501A4E8DDCD80EB52199C8FA8572C32A0
3020GU4bi5we.exeC:\Users\admin\AppData\Local\Temp\IXP003.TMP\1ep95yZ9.exeexecutable
MD5:1C4D409E35DD87E1BD3B8A77B8C3000D
SHA256:F901B9504F6098DB96DCEFE5D83298F85CDEDD326D1C3E30AECACD9A968D8079
2008Cm6LD8uU.exeC:\Users\admin\AppData\Local\Temp\IXP002.TMP\GU4bi5we.exeexecutable
MD5:7288969905779598014E022E75AF89E8
SHA256:19EDBA3D4C9B60F59471DCACEAC19C323B0998BD7389E5AD5A9C344955C63DF3
2612wextract.exeC:\Users\admin\AppData\Local\Temp\IXP000.TMP\UR4jf4pv.exeexecutable
MD5:0679464F3E08D4566F8139CEE4D39D3E
SHA256:69AF53170DD9D057961C7B6C2651925EA1E141BD137DC353F827D154D4FDEF6E
2008Cm6LD8uU.exeC:\Users\admin\AppData\Local\Temp\IXP002.TMP\3Bz6tq00.exeexecutable
MD5:57B875DD6C1ACFB1F4F03DB1FF643AB4
SHA256:B937C1568455D6195210871F74CAF02756280CEF1E4B71724C57FDA76081BAEE
844UR4jf4pv.exeC:\Users\admin\AppData\Local\Temp\IXP001.TMP\4QD330tD.exeexecutable
MD5:331AC8C8594C4C00AE89548CB001787A
SHA256:7D88595FCFDDA1BC273A4159EF62F6624C1AA410E078607258AF33CFDD928425
844UR4jf4pv.exeC:\Users\admin\AppData\Local\Temp\IXP001.TMP\Cm6LD8uU.exeexecutable
MD5:AA009FE6F2AE327053E304109922920E
SHA256:290D55852C6A2BBA5D293A35593DBE449E4B5A7291C75FD13FE80F08017DDD4B
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
2
TCP/UDP connections
9
DNS requests
0
Threats
30

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2204
3Bz6tq00.exe
POST
200
193.233.255.73:80
http://193.233.255.73/loghub/master
unknown
text
8 b
unknown
3056
AppLaunch.exe
POST
200
193.233.255.73:80
http://193.233.255.73/loghub/master
unknown
text
8 b
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
324
svchost.exe
224.0.0.252:5355
unknown
1956
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:138
whitelisted
3056
AppLaunch.exe
193.233.255.73:80
LLC Baxet
RU
malicious
276
2xV122Gv.exe
77.91.124.86:19084
Foton Telecom CJSC
RU
malicious
2204
3Bz6tq00.exe
193.233.255.73:80
LLC Baxet
RU
malicious

DNS requests

No data

Threats

PID
Process
Class
Message
3056
AppLaunch.exe
A Network Trojan was detected
STEALER [ANY.RUN] Win32/Stealc (Check-In)
3056
AppLaunch.exe
A Network Trojan was detected
ET MALWARE [ANY.RUN] Win32/Stealc Checkin (POST)
3056
AppLaunch.exe
Potentially Bad Traffic
ET HUNTING GENERIC SUSPICIOUS POST to Dotted Quad with Fake Browser 1
276
2xV122Gv.exe
Potentially Bad Traffic
ET INFO Microsoft net.tcp Connection Initialization Activity
276
2xV122Gv.exe
A Network Trojan was detected
ET MALWARE [ANY.RUN] RedLine Stealer Related (MC-NMF Authorization)
276
2xV122Gv.exe
A Network Trojan was detected
ET MALWARE Redline Stealer TCP CnC Activity
276
2xV122Gv.exe
A Network Trojan was detected
ET MALWARE Redline Stealer TCP CnC - Id1Response
276
2xV122Gv.exe
A Network Trojan was detected
ET MALWARE Redline Stealer TCP CnC Activity
276
2xV122Gv.exe
A Network Trojan was detected
ET MALWARE Redline Stealer TCP CnC Activity
276
2xV122Gv.exe
A Network Trojan was detected
ET MALWARE Redline Stealer TCP CnC Activity
No debug info