| File name: | WEXTRACT.EXE .MUI |
| Full analysis: | https://app.any.run/tasks/00a8ad17-6ae1-4dd7-a2e0-f8524cd33b15 |
| Verdict: | Malicious activity |
| Analysis date: | March 16, 2025, 13:44:52 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32+ executable (GUI) x86-64, for MS Windows, 7 sections |
| MD5: | E08DFB47C3E3D12845983EA61C810F10 |
| SHA1: | 330204E74F47A7CE0A0C4AE1FF2B259EC3D2284D |
| SHA256: | 6FE37A5615B3C47E4C6F7EB7ECA0BDCAB9E05DB9A39A1B6EC83917EED7BB72BA |
| SSDEEP: | 393216:RYkeNu9+t8QSKwdvnibZ0YlhWsJ9sTvFWlDqr33D9DQh4Ce36Y:RYkWM+pTwdvny7HYoZIz9DcY |
| .exe | | | InstallShield setup (91.4) |
|---|---|---|
| .exe | | | Generic Win/DOS Executable (4.2) |
| .exe | | | DOS Executable Generic (4.2) |
| MachineType: | AMD AMD64 |
|---|---|
| TimeStamp: | 2064:11:15 23:53:33+00:00 |
| ImageFileCharacteristics: | Executable, Large address aware |
| PEType: | PE32+ |
| LinkerVersion: | 14.38 |
| CodeSize: | 40960 |
| InitializedDataSize: | 41406464 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x1140 |
| OSVersion: | 10 |
| ImageVersion: | 10 |
| SubsystemVersion: | 6 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 11.0.26100.1 |
| ProductVersionNumber: | 11.0.26100.1 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Windows NT 32-bit |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | English (U.S.) |
| CharacterSet: | Unicode |
| CompanyName: | Microsoft Corporation |
| FileDescription: | Win32 Cabinet Self-Extractor |
| FileVersion: | 11.00.26100.1 (WinBuild.160101.0800) |
| InternalName: | Wextract |
| LegalCopyright: | © Microsoft Corporation. All rights reserved. |
| OriginalFileName: | WEXTRACT.EXE .MUI |
| ProductName: | Internet Explorer |
| ProductVersion: | 11.00.26100.1 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 516 | C:\Users\admin\AppData\Local\Temp\IXP000.TMP\INSTAL~1.EXE | C:\Users\admin\AppData\Local\Temp\IXP000.TMP\INSTAL~1.EXE | WEXTRACT.EXE .MUI.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 736 | C:\WINDOWS\system32\cmd.exe /c "C:\Users\Public\setup.bat" | C:\Windows\System32\cmd.exe | — | INSTAL~1.EXE | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1040 | powershell -WindowStyle Hidden -Command "Add-MpPreference -ExclusionExtension '.bat'" | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | INSTAL~1.EXE | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows PowerShell Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1128 | "C:\Users\admin\AppData\Local\Temp\IXP000.TMP\INSTAL~1.EXE" C:\Users\admin\AppData\Local\Temp\IXP000.TMP\INSTAL~1.EXE | C:\Users\admin\AppData\Local\Temp\IXP000.TMP\INSTAL~1.EXE | INSTAL~1.EXE | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 2100 | "C:\Users\admin\AppData\Local\Temp\WEXTRACT.EXE .MUI.exe" | C:\Users\admin\AppData\Local\Temp\WEXTRACT.EXE .MUI.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Win32 Cabinet Self-Extractor Exit code: 0 Version: 11.00.26100.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2552 | powershell -WindowStyle Hidden -Command "Add-MpPreference -ExclusionExtension '.exe'" | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | INSTAL~1.EXE | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows PowerShell Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2984 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5244 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5728 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | powershell.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5756 | "C:\Users\admin\AppData\Local\Temp\IXP000.TMP\INSTAL~1.EXE" C:\Users\admin\AppData\Local\Temp\IXP000.TMP\INSTAL~1.EXE | C:\Users\admin\AppData\Local\Temp\IXP000.TMP\INSTAL~1.EXE | — | INSTAL~1.EXE | |||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2100 | WEXTRACT.EXE .MUI.exe | C:\Users\admin\AppData\Local\Temp\IXP000.TMP\INSTAL~1.EXE | — | |
MD5:— | SHA256:— | |||
| 2100 | WEXTRACT.EXE .MUI.exe | C:\Users\admin\AppData\Local\Temp\IXP000.TMP\API-MS~1.DLL | executable | |
MD5:07EBE4D5CEF3301CCF07430F4C3E32D8 | SHA256:8F8B79150E850ACC92FD6AAB614F6E3759BEA875134A62087D5DD65581E3001F | |||
| 2100 | WEXTRACT.EXE .MUI.exe | C:\Users\admin\AppData\Local\Temp\IXP000.TMP\API-MS~2.DLL | executable | |
MD5:557405C47613DE66B111D0E2B01F2FDB | SHA256:913EAAA7997A6AEE53574CFFB83F9C9C1700B1D8B46744A5E12D76A1E53376FD | |||
| 2100 | WEXTRACT.EXE .MUI.exe | C:\Users\admin\AppData\Local\Temp\IXP000.TMP\APDEA0~1.DLL | executable | |
MD5:5A72A803DF2B425D5AAFF21F0F064011 | SHA256:629E52BA4E2DCA91B10EF7729A1722888E01284EED7DDA6030D0A1EC46C94086 | |||
| 2100 | WEXTRACT.EXE .MUI.exe | C:\Users\admin\AppData\Local\Temp\IXP000.TMP\API-MS~4.DLL | executable | |
MD5:2DB5666D3600A4ABCE86BE0099C6B881 | SHA256:46079C0A1B660FC187AAFD760707F369D0B60D424D878C57685545A3FCE95819 | |||
| 516 | INSTAL~1.EXE | C:\Users\admin\AppData\Local\Temp\_MEI5162\PySide2\QtWidgets.pyd | executable | |
MD5:50062DFB592CF30CC5262793AA46AB67 | SHA256:A2C9C88FB848BEBACF6889579E274C70C2EEE86DD3F209D45E656D9248EFF529 | |||
| 516 | INSTAL~1.EXE | C:\Users\admin\AppData\Local\Temp\_MEI5162\PySide2\plugins\iconengines\qsvgicon.dll | executable | |
MD5:DB28C60163F824D0372C0122924349FF | SHA256:6948741C5975C3C6BD4DD0537D738E23FEDA834A2AF8B0E3E6C0BD1D92043B55 | |||
| 2100 | WEXTRACT.EXE .MUI.exe | C:\Users\admin\AppData\Local\Temp\IXP000.TMP\AP87F4~1.DLL | executable | |
MD5:0F7D418C05128246AFA335A1FB400CB9 | SHA256:5C9BC70586AD538B0DF1FCF5D6F1F3527450AE16935AA34BD7EB494B4F1B2DB9 | |||
| 2100 | WEXTRACT.EXE .MUI.exe | C:\Users\admin\AppData\Local\Temp\IXP000.TMP\API-MS~3.DLL | executable | |
MD5:624401F31A706B1AE2245EB19264DC7F | SHA256:58A8D69DF60ECBEE776CD9A74B2A32B14BF2B0BD92D527EC5F19502A0D3EB8E9 | |||
| 516 | INSTAL~1.EXE | C:\Users\admin\AppData\Local\Temp\_MEI5162\PySide2\plugins\imageformats\qico.dll | executable | |
MD5:EB432DBD5FC22B3665064058C2E2FD29 | SHA256:F472C9D9F651A044CE63659DC612632E2C7EFAEF35421E205931BBC21D68F54E | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
— | — | GET | 200 | 23.48.23.176:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
1228 | backgroundTaskHost.exe | GET | 200 | 2.17.190.73:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D | unknown | — | — | whitelisted |
— | — | GET | 200 | 2.17.190.73:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
2644 | SIHClient.exe | GET | 200 | 23.219.150.101:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
2644 | SIHClient.exe | GET | 200 | 23.219.150.101:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
— | — | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
— | — | 192.168.100.255:137 | — | — | — | whitelisted |
— | — | 23.48.23.176:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
— | — | 192.168.100.255:138 | — | — | — | whitelisted |
6544 | svchost.exe | 20.190.159.75:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 40.113.110.67:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
— | — | 2.17.190.73:80 | ocsp.digicert.com | AKAMAI-AS | DE | whitelisted |
3216 | svchost.exe | 40.113.110.67:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
1228 | backgroundTaskHost.exe | 20.223.35.26:443 | arc.msn.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
1228 | backgroundTaskHost.exe | 2.17.190.73:80 | ocsp.digicert.com | AKAMAI-AS | DE | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
login.live.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
arc.msn.com |
| whitelisted |
github.com |
| whitelisted |
raw.githubusercontent.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
2196 | svchost.exe | Not Suspicious Traffic | INFO [ANY.RUN] Attempting to access raw user content on GitHub |