| File name: | wextract.mui.exe |
| Full analysis: | https://app.any.run/tasks/b0f6e987-a4ed-444e-b865-82819a58ef79 |
| Verdict: | Malicious activity |
| Threats: | RedLine Stealer is a malicious program that collects users’ confidential data from browsers, systems, and installed software. It also infects operating systems with other malware. |
| Analysis date: | October 30, 2023, 15:54:32 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
| MD5: | 852147AA49C268CCC613A2701B80FB10 |
| SHA1: | 40D77655C51F60F0DBCDBDE45D9F6AB7C8356173 |
| SHA256: | 5B7083957796AEACB4EAD9E5160D8FB7362C7A2D72318197088CAF0207F20532 |
| SSDEEP: | 49152:JLnemIO4Uf4INA/sdY5MKyrPT15Qw6kMBQEDtY3VTfowPBddfyTypGDdDZ4NJzCn:1n2DUwINqscMbzBaw6kMTUVTfozZDcNJ |
| .exe | | | Win32 Executable MS Visual C++ (generic) (42.2) |
|---|---|---|
| .exe | | | Win64 Executable (generic) (37.3) |
| .dll | | | Win32 Dynamic Link Library (generic) (8.8) |
| .exe | | | Win32 Executable (generic) (6) |
| .exe | | | Generic Win/DOS Executable (2.7) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2022:05:25 00:49:06+02:00 |
| ImageFileCharacteristics: | Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 14.13 |
| CodeSize: | 25600 |
| InitializedDataSize: | 1060352 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x6a60 |
| OSVersion: | 10 |
| ImageVersion: | 10 |
| SubsystemVersion: | 6 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 11.0.17763.1 |
| ProductVersionNumber: | 11.0.17763.1 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Windows NT 32-bit |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | English (U.S.) |
| CharacterSet: | Unicode |
| CompanyName: | Microsoft Corporation |
| FileDescription: | Win32 Cabinet Self-Extractor |
| FileVersion: | 11.00.17763.1 (WinBuild.160101.0800) |
| InternalName: | Wextract |
| LegalCopyright: | © Microsoft Corporation. All rights reserved. |
| OriginalFileName: | WEXTRACT.EXE .MUI |
| ProductName: | Internet Explorer |
| ProductVersion: | 11.00.17763.1 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1884 | "C:\Users\admin\AppData\Local\Temp\wextract.mui.exe" | C:\Users\admin\AppData\Local\Temp\wextract.mui.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Win32 Cabinet Self-Extractor Exit code: 0 Version: 11.00.17763.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1980 | C:\Users\admin\AppData\Local\Temp\IXP002.TMP\1mU08Oq9.exe | C:\Users\admin\AppData\Local\Temp\IXP002.TMP\1mU08Oq9.exe | — | yf9eZ65.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 2276 | C:\Users\admin\AppData\Local\Temp\IXP000.TMP\ab5kb68.exe | C:\Users\admin\AppData\Local\Temp\IXP000.TMP\ab5kb68.exe | — | wextract.mui.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Win32 Cabinet Self-Extractor Exit code: 0 Version: 11.00.17763.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2292 | C:\Users\admin\AppData\Local\Temp\IXP001.TMP\3Wd84Mm.exe | C:\Users\admin\AppData\Local\Temp\IXP001.TMP\3Wd84Mm.exe | — | ab5kb68.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 3016 | C:\Users\admin\AppData\Local\Temp\IXP002.TMP\2wc0184.exe | C:\Users\admin\AppData\Local\Temp\IXP002.TMP\2wc0184.exe | — | yf9eZ65.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 3104 | C:\Users\admin\AppData\Local\Temp\IXP000.TMP\4gS687pq.exe | C:\Users\admin\AppData\Local\Temp\IXP000.TMP\4gS687pq.exe | — | wextract.mui.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 3212 | "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe" | C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe | — | 1mU08Oq9.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft .NET ClickOnce Launch Utility Exit code: 0 Version: 4.0.30319.34209 built by: FX452RTMGDR Modules
| |||||||||||||||
| 3448 | C:\Users\admin\AppData\Local\Temp\IXP001.TMP\yf9eZ65.exe | C:\Users\admin\AppData\Local\Temp\IXP001.TMP\yf9eZ65.exe | — | ab5kb68.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Win32 Cabinet Self-Extractor Exit code: 0 Version: 11.00.17763.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 3464 | "C:\Program Files\Windows Media Player\wmpnscfg.exe" | C:\Program Files\Windows Media Player\wmpnscfg.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Media Player Network Sharing Service Configuration Application Exit code: 0 Version: 12.0.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 3720 | "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe" | C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe | 2wc0184.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft .NET ClickOnce Launch Utility Exit code: 1 Version: 4.0.30319.34209 built by: FX452RTMGDR Modules
| |||||||||||||||
| (PID) Process: | (3720) AppLaunch.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (3720) AppLaunch.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
| (PID) Process: | (3720) AppLaunch.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings |
| Operation: | write | Name: | ProxyEnable |
Value: 0 | |||
| (PID) Process: | (3720) AppLaunch.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections |
| Operation: | write | Name: | SavedLegacySettings |
Value: 4600000056010000090000000000000000000000000000000400000000000000C0E333BBEAB1D3010000000000000000000000000100000002000000C0A8016B000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 | |||
| (PID) Process: | (3464) wmpnscfg.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Player NSS\3.0\Events\{059EA17F-42D1-4E0C-AC17-463A082CDCE7}\{7D29722E-F22F-4EAE-9616-83D9A4FBA62A} |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (3464) wmpnscfg.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Player NSS\3.0\Events\{059EA17F-42D1-4E0C-AC17-463A082CDCE7} |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (3464) wmpnscfg.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\MediaPlayer\Health\{F9E98FBE-4DC6-44BC-BA90-42ED1E9A03D4} |
| Operation: | delete key | Name: | (default) |
Value: | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2276 | ab5kb68.exe | C:\Users\admin\AppData\Local\Temp\IXP001.TMP\yf9eZ65.exe | executable | |
MD5:0C062C909DDC69F7B0F23538273C3D30 | SHA256:D8D546DAA2EAEF2F2BA52CF373AC76CD7518C09D1B2B1F561BEBAF0600F438EE | |||
| 3448 | yf9eZ65.exe | C:\Users\admin\AppData\Local\Temp\IXP002.TMP\1mU08Oq9.exe | executable | |
MD5:B8C580963DB423A0A7D9255B9B5E209A | SHA256:17C915BCB9E3363CFB77C1F5C7DC1847E631B451537D79F8921A57A3A4E2A1A6 | |||
| 1884 | wextract.mui.exe | C:\Users\admin\AppData\Local\Temp\IXP000.TMP\ab5kb68.exe | executable | |
MD5:E95F40E1B3EB0297E08D104E4E102009 | SHA256:2B1A4F41B743F19D23D733A4B812EE17DEB8CC3CE74E5326E85BEB09FDE5DD52 | |||
| 1884 | wextract.mui.exe | C:\Users\admin\AppData\Local\Temp\IXP000.TMP\4gS687pq.exe | executable | |
MD5:3663D9E395E2D7FE0D3A189073605876 | SHA256:DDF9A3045D58A2EBEEDC578EC8AAB760172941BB47F3F16362C51C64C56E3E3E | |||
| 2276 | ab5kb68.exe | C:\Users\admin\AppData\Local\Temp\IXP001.TMP\3Wd84Mm.exe | executable | |
MD5:7279B79ED43D9259396E5C31462BCC67 | SHA256:A1A156EE7A4DC108D9DB43A43FE0ADB10CB75422C08404940B746BD0BAE7FCB3 | |||
| 3448 | yf9eZ65.exe | C:\Users\admin\AppData\Local\Temp\IXP002.TMP\2wc0184.exe | executable | |
MD5:8A2E85BCF4FD6537F1D16D30EDB2DA0D | SHA256:21AAB0D03D97FD6200234021C2D334ACBC3F70D323C159460780829072C858BE | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
3720 | AppLaunch.exe | POST | 200 | 193.233.255.73:80 | http://193.233.255.73/loghub/master | unknown | text | 8 b | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
2656 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
3720 | AppLaunch.exe | 193.233.255.73:80 | — | LLC Baxet | RU | malicious |
1088 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
3780 | AppLaunch.exe | 77.91.124.86:19084 | — | Foton Telecom CJSC | RU | malicious |
PID | Process | Class | Message |
|---|---|---|---|
3720 | AppLaunch.exe | A Network Trojan was detected | ET MALWARE [ANY.RUN] Win32/Stealc Checkin (POST) |
3720 | AppLaunch.exe | A Network Trojan was detected | STEALER [ANY.RUN] Win32/Stealc (Check-In) |
3720 | AppLaunch.exe | Potentially Bad Traffic | ET HUNTING GENERIC SUSPICIOUS POST to Dotted Quad with Fake Browser 1 |
3780 | AppLaunch.exe | Potentially Bad Traffic | ET INFO Microsoft net.tcp Connection Initialization Activity |
3780 | AppLaunch.exe | Potentially Bad Traffic | ET INFO Microsoft net.tcp Connection Initialization Activity |
3780 | AppLaunch.exe | A Network Trojan was detected | ET MALWARE Redline Stealer TCP CnC Activity |
3780 | AppLaunch.exe | A Network Trojan was detected | ET MALWARE [ANY.RUN] RedLine Stealer Related (MC-NMF Authorization) |
3780 | AppLaunch.exe | A Network Trojan was detected | ET MALWARE Redline Stealer TCP CnC - Id1Response |
3780 | AppLaunch.exe | A Network Trojan was detected | ET MALWARE Redline Stealer TCP CnC Activity |
3780 | AppLaunch.exe | A Network Trojan was detected | ET MALWARE Redline Stealer TCP CnC Activity |