File name:

wextract.mui.exe

Full analysis: https://app.any.run/tasks/b0f6e987-a4ed-444e-b865-82819a58ef79
Verdict: Malicious activity
Threats:

RedLine Stealer is a malicious program that collects users’ confidential data from browsers, systems, and installed software. It also infects operating systems with other malware.

Analysis date: October 30, 2023, 15:54:32
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
stealc
stealer
sinkhole
redline
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

852147AA49C268CCC613A2701B80FB10

SHA1:

40D77655C51F60F0DBCDBDE45D9F6AB7C8356173

SHA256:

5B7083957796AEACB4EAD9E5160D8FB7362C7A2D72318197088CAF0207F20532

SSDEEP:

49152:JLnemIO4Uf4INA/sdY5MKyrPT15Qw6kMBQEDtY3VTfowPBddfyTypGDdDZ4NJzCn:1n2DUwINqscMbzBaw6kMTUVTfozZDcNJ

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • wextract.mui.exe (PID: 1884)
      • ab5kb68.exe (PID: 2276)
      • yf9eZ65.exe (PID: 3448)
    • Application was dropped or rewritten from another process

      • yf9eZ65.exe (PID: 3448)
      • ab5kb68.exe (PID: 2276)
      • 1mU08Oq9.exe (PID: 1980)
      • 4gS687pq.exe (PID: 3104)
      • 2wc0184.exe (PID: 3016)
      • 3Wd84Mm.exe (PID: 2292)
    • STEALC has been detected (SURICATA)

      • AppLaunch.exe (PID: 3720)
    • Connects to the CnC server

      • AppLaunch.exe (PID: 3720)
      • AppLaunch.exe (PID: 3780)
    • Steals credentials from Web Browsers

      • AppLaunch.exe (PID: 3780)
    • REDLINE has been detected (SURICATA)

      • AppLaunch.exe (PID: 3780)
    • Actions looks like stealing of personal data

      • AppLaunch.exe (PID: 3780)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • wextract.mui.exe (PID: 1884)
      • ab5kb68.exe (PID: 2276)
    • Reads the Internet Settings

      • AppLaunch.exe (PID: 3720)
    • Connects to the server without a host name

      • AppLaunch.exe (PID: 3720)
    • Reads browser cookies

      • AppLaunch.exe (PID: 3780)
    • Searches for installed software

      • AppLaunch.exe (PID: 3780)
    • Connects to unusual port

      • AppLaunch.exe (PID: 3780)
  • INFO

    • Checks supported languages

      • ab5kb68.exe (PID: 2276)
      • wextract.mui.exe (PID: 1884)
      • yf9eZ65.exe (PID: 3448)
      • 1mU08Oq9.exe (PID: 1980)
      • 2wc0184.exe (PID: 3016)
      • AppLaunch.exe (PID: 3212)
      • AppLaunch.exe (PID: 3720)
      • AppLaunch.exe (PID: 3780)
      • 3Wd84Mm.exe (PID: 2292)
      • 4gS687pq.exe (PID: 3104)
      • wmpnscfg.exe (PID: 3464)
    • Create files in a temporary directory

      • wextract.mui.exe (PID: 1884)
      • ab5kb68.exe (PID: 2276)
      • yf9eZ65.exe (PID: 3448)
    • Reads the computer name

      • AppLaunch.exe (PID: 3212)
      • AppLaunch.exe (PID: 3720)
      • AppLaunch.exe (PID: 3780)
      • wmpnscfg.exe (PID: 3464)
    • Checks proxy server information

      • AppLaunch.exe (PID: 3720)
    • Reads the machine GUID from the registry

      • AppLaunch.exe (PID: 3720)
      • AppLaunch.exe (PID: 3780)
      • wmpnscfg.exe (PID: 3464)
    • Manual execution by a user

      • wmpnscfg.exe (PID: 3464)
    • Reads product name

      • AppLaunch.exe (PID: 3780)
    • Reads Environment values

      • AppLaunch.exe (PID: 3780)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2022:05:25 00:49:06+02:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 14.13
CodeSize: 25600
InitializedDataSize: 1060352
UninitializedDataSize: -
EntryPoint: 0x6a60
OSVersion: 10
ImageVersion: 10
SubsystemVersion: 6
Subsystem: Windows GUI
FileVersionNumber: 11.0.17763.1
ProductVersionNumber: 11.0.17763.1
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows NT 32-bit
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Unicode
CompanyName: Microsoft Corporation
FileDescription: Win32 Cabinet Self-Extractor
FileVersion: 11.00.17763.1 (WinBuild.160101.0800)
InternalName: Wextract
LegalCopyright: © Microsoft Corporation. All rights reserved.
OriginalFileName: WEXTRACT.EXE .MUI
ProductName: Internet Explorer
ProductVersion: 11.00.17763.1
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
48
Monitored processes
11
Malicious processes
7
Suspicious processes
2

Behavior graph

Click at the process to see the details
drop and start drop and start start drop and start drop and start drop and start drop and start wextract.mui.exe no specs ab5kb68.exe no specs yf9ez65.exe no specs 1mu08oq9.exe no specs applaunch.exe no specs 2wc0184.exe no specs #STEALC applaunch.exe 3wd84mm.exe no specs 4gs687pq.exe no specs #REDLINE applaunch.exe wmpnscfg.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1884"C:\Users\admin\AppData\Local\Temp\wextract.mui.exe" C:\Users\admin\AppData\Local\Temp\wextract.mui.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Win32 Cabinet Self-Extractor
Exit code:
0
Version:
11.00.17763.1 (WinBuild.160101.0800)
Modules
Images
c:\users\admin\appdata\local\temp\wextract.mui.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
1980C:\Users\admin\AppData\Local\Temp\IXP002.TMP\1mU08Oq9.exeC:\Users\admin\AppData\Local\Temp\IXP002.TMP\1mU08Oq9.exeyf9eZ65.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\ixp002.tmp\1mu08oq9.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\ntdll.dll
c:\windows\system32\user32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\apphelp.dll
2276C:\Users\admin\AppData\Local\Temp\IXP000.TMP\ab5kb68.exeC:\Users\admin\AppData\Local\Temp\IXP000.TMP\ab5kb68.exewextract.mui.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Win32 Cabinet Self-Extractor
Exit code:
0
Version:
11.00.17763.1 (WinBuild.160101.0800)
Modules
Images
c:\users\admin\appdata\local\temp\ixp000.tmp\ab5kb68.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
2292C:\Users\admin\AppData\Local\Temp\IXP001.TMP\3Wd84Mm.exeC:\Users\admin\AppData\Local\Temp\IXP001.TMP\3Wd84Mm.exeab5kb68.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\windows\system32\ntdll.dll
c:\users\admin\appdata\local\temp\ixp001.tmp\3wd84mm.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\kernelbase.dll
c:\windows\apppatch\aclayers.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
3016C:\Users\admin\AppData\Local\Temp\IXP002.TMP\2wc0184.exeC:\Users\admin\AppData\Local\Temp\IXP002.TMP\2wc0184.exeyf9eZ65.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\ixp002.tmp\2wc0184.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\system32\usp10.dll
c:\windows\system32\lpk.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sspicli.dll
3104C:\Users\admin\AppData\Local\Temp\IXP000.TMP\4gS687pq.exeC:\Users\admin\AppData\Local\Temp\IXP000.TMP\4gS687pq.exewextract.mui.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\users\admin\appdata\local\temp\ixp000.tmp\4gs687pq.exe
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\apphelp.dll
3212"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe1mU08Oq9.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET ClickOnce Launch Utility
Exit code:
0
Version:
4.0.30319.34209 built by: FX452RTMGDR
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\applaunch.exe
c:\windows\system32\mscoree.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\ntdll.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\ole32.dll
3448C:\Users\admin\AppData\Local\Temp\IXP001.TMP\yf9eZ65.exeC:\Users\admin\AppData\Local\Temp\IXP001.TMP\yf9eZ65.exeab5kb68.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Win32 Cabinet Self-Extractor
Exit code:
0
Version:
11.00.17763.1 (WinBuild.160101.0800)
Modules
Images
c:\users\admin\appdata\local\temp\ixp001.tmp\yf9ez65.exe
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ntdll.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
3464"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\ole32.dll
3720"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\AppLaunch.exe
2wc0184.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET ClickOnce Launch Utility
Exit code:
1
Version:
4.0.30319.34209 built by: FX452RTMGDR
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\applaunch.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\apppatch\aclayers.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\rpcrt4.dll
Total events
1 487
Read events
1 480
Write events
4
Delete events
3

Modification events

(PID) Process:(3720) AppLaunch.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(3720) AppLaunch.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(3720) AppLaunch.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(3720) AppLaunch.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
4600000056010000090000000000000000000000000000000400000000000000C0E333BBEAB1D3010000000000000000000000000100000002000000C0A8016B000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(3464) wmpnscfg.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Player NSS\3.0\Events\{059EA17F-42D1-4E0C-AC17-463A082CDCE7}\{7D29722E-F22F-4EAE-9616-83D9A4FBA62A}
Operation:delete keyName:(default)
Value:
(PID) Process:(3464) wmpnscfg.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Player NSS\3.0\Events\{059EA17F-42D1-4E0C-AC17-463A082CDCE7}
Operation:delete keyName:(default)
Value:
(PID) Process:(3464) wmpnscfg.exeKey:HKEY_CURRENT_USER\Software\Microsoft\MediaPlayer\Health\{F9E98FBE-4DC6-44BC-BA90-42ED1E9A03D4}
Operation:delete keyName:(default)
Value:
Executable files
6
Suspicious files
0
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
3448yf9eZ65.exeC:\Users\admin\AppData\Local\Temp\IXP002.TMP\2wc0184.exeexecutable
MD5:8A2E85BCF4FD6537F1D16D30EDB2DA0D
SHA256:21AAB0D03D97FD6200234021C2D334ACBC3F70D323C159460780829072C858BE
1884wextract.mui.exeC:\Users\admin\AppData\Local\Temp\IXP000.TMP\ab5kb68.exeexecutable
MD5:E95F40E1B3EB0297E08D104E4E102009
SHA256:2B1A4F41B743F19D23D733A4B812EE17DEB8CC3CE74E5326E85BEB09FDE5DD52
2276ab5kb68.exeC:\Users\admin\AppData\Local\Temp\IXP001.TMP\yf9eZ65.exeexecutable
MD5:0C062C909DDC69F7B0F23538273C3D30
SHA256:D8D546DAA2EAEF2F2BA52CF373AC76CD7518C09D1B2B1F561BEBAF0600F438EE
2276ab5kb68.exeC:\Users\admin\AppData\Local\Temp\IXP001.TMP\3Wd84Mm.exeexecutable
MD5:7279B79ED43D9259396E5C31462BCC67
SHA256:A1A156EE7A4DC108D9DB43A43FE0ADB10CB75422C08404940B746BD0BAE7FCB3
1884wextract.mui.exeC:\Users\admin\AppData\Local\Temp\IXP000.TMP\4gS687pq.exeexecutable
MD5:3663D9E395E2D7FE0D3A189073605876
SHA256:DDF9A3045D58A2EBEEDC578EC8AAB760172941BB47F3F16362C51C64C56E3E3E
3448yf9eZ65.exeC:\Users\admin\AppData\Local\Temp\IXP002.TMP\1mU08Oq9.exeexecutable
MD5:B8C580963DB423A0A7D9255B9B5E209A
SHA256:17C915BCB9E3363CFB77C1F5C7DC1847E631B451537D79F8921A57A3A4E2A1A6
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
6
DNS requests
0
Threats
21

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
3720
AppLaunch.exe
POST
200
193.233.255.73:80
http://193.233.255.73/loghub/master
unknown
text
8 b
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
unknown
2656
svchost.exe
239.255.255.250:1900
unknown
4
System
192.168.100.255:137
unknown
3720
AppLaunch.exe
193.233.255.73:80
LLC Baxet
RU
unknown
1088
svchost.exe
224.0.0.252:5355
unknown
3780
AppLaunch.exe
77.91.124.86:19084
Foton Telecom CJSC
RU
unknown

DNS requests

No data

Threats

PID
Process
Class
Message
A Network Trojan was detected
ET MALWARE [ANY.RUN] Win32/Stealc Checkin (POST)
A Network Trojan was detected
STEALER [ANY.RUN] Win32/Stealc (Check-In)
Potentially Bad Traffic
ET HUNTING GENERIC SUSPICIOUS POST to Dotted Quad with Fake Browser 1
Potentially Bad Traffic
ET INFO Microsoft net.tcp Connection Initialization Activity
Potentially Bad Traffic
ET INFO Microsoft net.tcp Connection Initialization Activity
A Network Trojan was detected
ET MALWARE Redline Stealer TCP CnC Activity
A Network Trojan was detected
ET MALWARE [ANY.RUN] RedLine Stealer Related (MC-NMF Authorization)
A Network Trojan was detected
ET MALWARE Redline Stealer TCP CnC - Id1Response
A Network Trojan was detected
ET MALWARE Redline Stealer TCP CnC Activity
A Network Trojan was detected
ET MALWARE Redline Stealer TCP CnC Activity
No debug info