File name: | wextract.mui.exe |
Full analysis: | https://app.any.run/tasks/b0f6e987-a4ed-444e-b865-82819a58ef79 |
Verdict: | Malicious activity |
Threats: | RedLine Stealer is a malicious program that collects users’ confidential data from browsers, systems, and installed software. It also infects operating systems with other malware. |
Analysis date: | October 30, 2023, 15:54:32 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MIME: | application/x-dosexec |
File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
MD5: | 852147AA49C268CCC613A2701B80FB10 |
SHA1: | 40D77655C51F60F0DBCDBDE45D9F6AB7C8356173 |
SHA256: | 5B7083957796AEACB4EAD9E5160D8FB7362C7A2D72318197088CAF0207F20532 |
SSDEEP: | 49152:JLnemIO4Uf4INA/sdY5MKyrPT15Qw6kMBQEDtY3VTfowPBddfyTypGDdDZ4NJzCn:1n2DUwINqscMbzBaw6kMTUVTfozZDcNJ |
.exe | | | Win32 Executable MS Visual C++ (generic) (42.2) |
---|---|---|
.exe | | | Win64 Executable (generic) (37.3) |
.dll | | | Win32 Dynamic Link Library (generic) (8.8) |
.exe | | | Win32 Executable (generic) (6) |
.exe | | | Generic Win/DOS Executable (2.7) |
MachineType: | Intel 386 or later, and compatibles |
---|---|
TimeStamp: | 2022:05:25 00:49:06+02:00 |
ImageFileCharacteristics: | Executable, 32-bit |
PEType: | PE32 |
LinkerVersion: | 14.13 |
CodeSize: | 25600 |
InitializedDataSize: | 1060352 |
UninitializedDataSize: | - |
EntryPoint: | 0x6a60 |
OSVersion: | 10 |
ImageVersion: | 10 |
SubsystemVersion: | 6 |
Subsystem: | Windows GUI |
FileVersionNumber: | 11.0.17763.1 |
ProductVersionNumber: | 11.0.17763.1 |
FileFlagsMask: | 0x003f |
FileFlags: | (none) |
FileOS: | Windows NT 32-bit |
ObjectFileType: | Executable application |
FileSubtype: | - |
LanguageCode: | English (U.S.) |
CharacterSet: | Unicode |
CompanyName: | Microsoft Corporation |
FileDescription: | Win32 Cabinet Self-Extractor |
FileVersion: | 11.00.17763.1 (WinBuild.160101.0800) |
InternalName: | Wextract |
LegalCopyright: | © Microsoft Corporation. All rights reserved. |
OriginalFileName: | WEXTRACT.EXE .MUI |
ProductName: | Internet Explorer |
ProductVersion: | 11.00.17763.1 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
1884 | "C:\Users\admin\AppData\Local\Temp\wextract.mui.exe" | C:\Users\admin\AppData\Local\Temp\wextract.mui.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Win32 Cabinet Self-Extractor Exit code: 0 Version: 11.00.17763.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
1980 | C:\Users\admin\AppData\Local\Temp\IXP002.TMP\1mU08Oq9.exe | C:\Users\admin\AppData\Local\Temp\IXP002.TMP\1mU08Oq9.exe | — | yf9eZ65.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
2276 | C:\Users\admin\AppData\Local\Temp\IXP000.TMP\ab5kb68.exe | C:\Users\admin\AppData\Local\Temp\IXP000.TMP\ab5kb68.exe | — | wextract.mui.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Win32 Cabinet Self-Extractor Exit code: 0 Version: 11.00.17763.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
2292 | C:\Users\admin\AppData\Local\Temp\IXP001.TMP\3Wd84Mm.exe | C:\Users\admin\AppData\Local\Temp\IXP001.TMP\3Wd84Mm.exe | — | ab5kb68.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
3016 | C:\Users\admin\AppData\Local\Temp\IXP002.TMP\2wc0184.exe | C:\Users\admin\AppData\Local\Temp\IXP002.TMP\2wc0184.exe | — | yf9eZ65.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
3104 | C:\Users\admin\AppData\Local\Temp\IXP000.TMP\4gS687pq.exe | C:\Users\admin\AppData\Local\Temp\IXP000.TMP\4gS687pq.exe | — | wextract.mui.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
3212 | "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe" | C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe | — | 1mU08Oq9.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft .NET ClickOnce Launch Utility Exit code: 0 Version: 4.0.30319.34209 built by: FX452RTMGDR Modules
| |||||||||||||||
3448 | C:\Users\admin\AppData\Local\Temp\IXP001.TMP\yf9eZ65.exe | C:\Users\admin\AppData\Local\Temp\IXP001.TMP\yf9eZ65.exe | — | ab5kb68.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Win32 Cabinet Self-Extractor Exit code: 0 Version: 11.00.17763.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
3464 | "C:\Program Files\Windows Media Player\wmpnscfg.exe" | C:\Program Files\Windows Media Player\wmpnscfg.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Media Player Network Sharing Service Configuration Application Exit code: 0 Version: 12.0.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
3720 | "C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe" | C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe | 2wc0184.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft .NET ClickOnce Launch Utility Exit code: 1 Version: 4.0.30319.34209 built by: FX452RTMGDR Modules
|
(PID) Process: | (3720) AppLaunch.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
(PID) Process: | (3720) AppLaunch.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
(PID) Process: | (3720) AppLaunch.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings |
Operation: | write | Name: | ProxyEnable |
Value: 0 | |||
(PID) Process: | (3720) AppLaunch.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections |
Operation: | write | Name: | SavedLegacySettings |
Value: 4600000056010000090000000000000000000000000000000400000000000000C0E333BBEAB1D3010000000000000000000000000100000002000000C0A8016B000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 | |||
(PID) Process: | (3464) wmpnscfg.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Player NSS\3.0\Events\{059EA17F-42D1-4E0C-AC17-463A082CDCE7}\{7D29722E-F22F-4EAE-9616-83D9A4FBA62A} |
Operation: | delete key | Name: | (default) |
Value: | |||
(PID) Process: | (3464) wmpnscfg.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Player NSS\3.0\Events\{059EA17F-42D1-4E0C-AC17-463A082CDCE7} |
Operation: | delete key | Name: | (default) |
Value: | |||
(PID) Process: | (3464) wmpnscfg.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\MediaPlayer\Health\{F9E98FBE-4DC6-44BC-BA90-42ED1E9A03D4} |
Operation: | delete key | Name: | (default) |
Value: |
PID | Process | Filename | Type | |
---|---|---|---|---|
3448 | yf9eZ65.exe | C:\Users\admin\AppData\Local\Temp\IXP002.TMP\2wc0184.exe | executable | |
MD5:8A2E85BCF4FD6537F1D16D30EDB2DA0D | SHA256:21AAB0D03D97FD6200234021C2D334ACBC3F70D323C159460780829072C858BE | |||
1884 | wextract.mui.exe | C:\Users\admin\AppData\Local\Temp\IXP000.TMP\ab5kb68.exe | executable | |
MD5:E95F40E1B3EB0297E08D104E4E102009 | SHA256:2B1A4F41B743F19D23D733A4B812EE17DEB8CC3CE74E5326E85BEB09FDE5DD52 | |||
2276 | ab5kb68.exe | C:\Users\admin\AppData\Local\Temp\IXP001.TMP\yf9eZ65.exe | executable | |
MD5:0C062C909DDC69F7B0F23538273C3D30 | SHA256:D8D546DAA2EAEF2F2BA52CF373AC76CD7518C09D1B2B1F561BEBAF0600F438EE | |||
2276 | ab5kb68.exe | C:\Users\admin\AppData\Local\Temp\IXP001.TMP\3Wd84Mm.exe | executable | |
MD5:7279B79ED43D9259396E5C31462BCC67 | SHA256:A1A156EE7A4DC108D9DB43A43FE0ADB10CB75422C08404940B746BD0BAE7FCB3 | |||
1884 | wextract.mui.exe | C:\Users\admin\AppData\Local\Temp\IXP000.TMP\4gS687pq.exe | executable | |
MD5:3663D9E395E2D7FE0D3A189073605876 | SHA256:DDF9A3045D58A2EBEEDC578EC8AAB760172941BB47F3F16362C51C64C56E3E3E | |||
3448 | yf9eZ65.exe | C:\Users\admin\AppData\Local\Temp\IXP002.TMP\1mU08Oq9.exe | executable | |
MD5:B8C580963DB423A0A7D9255B9B5E209A | SHA256:17C915BCB9E3363CFB77C1F5C7DC1847E631B451537D79F8921A57A3A4E2A1A6 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
3720 | AppLaunch.exe | POST | 200 | 193.233.255.73:80 | http://193.233.255.73/loghub/master | unknown | text | 8 b | — |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
4 | System | 192.168.100.255:138 | — | — | — | unknown |
2656 | svchost.exe | 239.255.255.250:1900 | — | — | — | unknown |
4 | System | 192.168.100.255:137 | — | — | — | unknown |
3720 | AppLaunch.exe | 193.233.255.73:80 | — | LLC Baxet | RU | unknown |
1088 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
3780 | AppLaunch.exe | 77.91.124.86:19084 | — | Foton Telecom CJSC | RU | unknown |
PID | Process | Class | Message |
---|---|---|---|
— | — | A Network Trojan was detected | ET MALWARE [ANY.RUN] Win32/Stealc Checkin (POST) |
— | — | A Network Trojan was detected | STEALER [ANY.RUN] Win32/Stealc (Check-In) |
— | — | Potentially Bad Traffic | ET HUNTING GENERIC SUSPICIOUS POST to Dotted Quad with Fake Browser 1 |
— | — | Potentially Bad Traffic | ET INFO Microsoft net.tcp Connection Initialization Activity |
— | — | Potentially Bad Traffic | ET INFO Microsoft net.tcp Connection Initialization Activity |
— | — | A Network Trojan was detected | ET MALWARE Redline Stealer TCP CnC Activity |
— | — | A Network Trojan was detected | ET MALWARE [ANY.RUN] RedLine Stealer Related (MC-NMF Authorization) |
— | — | A Network Trojan was detected | ET MALWARE Redline Stealer TCP CnC - Id1Response |
— | — | A Network Trojan was detected | ET MALWARE Redline Stealer TCP CnC Activity |
— | — | A Network Trojan was detected | ET MALWARE Redline Stealer TCP CnC Activity |