| File name: | 2025-06-21_88450d30cba1d5aada0093322282268d_elex_mafia |
| Full analysis: | https://app.any.run/tasks/f693bf5a-2d3c-40e0-9bc4-c6374252cd50 |
| Verdict: | Malicious activity |
| Analysis date: | June 21, 2025, 03:17:20 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections |
| MD5: | 88450D30CBA1D5AADA0093322282268D |
| SHA1: | 32BA83595AA659038676EC15DF6FB8F3F72EA47D |
| SHA256: | 32C33C0A627A0276287F2C448A639E37B255DE637C06443FC0A08D729E92420D |
| SSDEEP: | 24576:cbY7DncCt+aaccwGIIur43baDDAtbpu3ClryzY:cbY7DncCt+aa3wGIIur43baDDAtNu3C5 |
| .exe | | | Win32 Executable MS Visual C++ (generic) (42.2) |
|---|---|---|
| .exe | | | Win64 Executable (generic) (37.3) |
| .dll | | | Win32 Dynamic Link Library (generic) (8.8) |
| .exe | | | Win32 Executable (generic) (6) |
| .exe | | | Generic Win/DOS Executable (2.7) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2003:11:11 14:39:16+00:00 |
| ImageFileCharacteristics: | Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 10 |
| CodeSize: | 140288 |
| InitializedDataSize: | 356352 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x113b6 |
| OSVersion: | 5.1 |
| ImageVersion: | - |
| SubsystemVersion: | 5.1 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 12.0.4518.1014 |
| ProductVersionNumber: | 12.0.4518.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Windows NT 32-bit |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Neutral |
| CharacterSet: | Windows, Latin1 |
| CompanyName: | Microsoft Corporation |
| FileDescription: | Microsoft Office Word |
| FileVersion: | 12.0.4518.1014 |
| InternalName: | WinWord |
| LegalCopyright: | © 2006 Microsoft Corporation. All rights reserved. |
| LegalTrademarks1: | Microsoft® is a registered trademark of Microsoft Corporation. |
| LegalTrademarks2: | Windows® is a registered trademark of Microsoft Corporation. |
| OriginalFileName: | WinWord.exe |
| ProductName: | 2007 Microsoft Office system |
| ProductVersion: | 12.0.4518.1014 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 188 | "C:\Users\admin\AppData\Local\Temp\BE79.tmp" | C:\Users\admin\AppData\Local\Temp\BE79.tmp | — | BE0B.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 | |||||||||||||||
| 236 | "C:\Users\admin\AppData\Local\Temp\6EF6.tmp" | C:\Users\admin\AppData\Local\Temp\6EF6.tmp | 6E89.tmp | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 Modules
| |||||||||||||||
| 236 | "C:\Users\admin\AppData\Local\Temp\216D.tmp" | C:\Users\admin\AppData\Local\Temp\216D.tmp | — | 2110.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 Modules
| |||||||||||||||
| 320 | "C:\Users\admin\AppData\Local\Temp\7AC.tmp" | C:\Users\admin\AppData\Local\Temp\7AC.tmp | — | 73E.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 Modules
| |||||||||||||||
| 320 | "C:\Users\admin\AppData\Local\Temp\6BC5.tmp" | C:\Users\admin\AppData\Local\Temp\6BC5.tmp | — | 6B57.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 Modules
| |||||||||||||||
| 320 | "C:\Users\admin\AppData\Local\Temp\82F6.tmp" | C:\Users\admin\AppData\Local\Temp\82F6.tmp | — | 8289.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 Modules
| |||||||||||||||
| 420 | "C:\Users\admin\AppData\Local\Temp\5196.tmp" | C:\Users\admin\AppData\Local\Temp\5196.tmp | — | 5138.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 Modules
| |||||||||||||||
| 424 | "C:\Users\admin\AppData\Local\Temp\D07F.tmp" | C:\Users\admin\AppData\Local\Temp\D07F.tmp | D021.tmp | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 Modules
| |||||||||||||||
| 424 | "C:\Users\admin\AppData\Local\Temp\2D9.tmp" | C:\Users\admin\AppData\Local\Temp\2D9.tmp | — | 27C.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 Modules
| |||||||||||||||
| 424 | "C:\Users\admin\AppData\Local\Temp\AC96.tmp" | C:\Users\admin\AppData\Local\Temp\AC96.tmp | — | AC29.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 Modules
| |||||||||||||||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 1700 | 6BBA.tmp | C:\Users\admin\AppData\Local\Temp\6C27.tmp | executable | |
MD5:6AFAD07B3097EF3C6FF49E7332328636 | SHA256:8D68D0B2D77A64C87809B95A264355ADABD6CD1F3BD26679D73FD7E80534D287 | |||
| 2780 | 6A04.tmp | C:\Users\admin\AppData\Local\Temp\6A72.tmp | executable | |
MD5:E52DA1DFB34F7406D2BD3FB61F2CE605 | SHA256:79B5C847E8EB5A91BFA862B31FA972B5DD6391B62C0DDCE5FF704D55F421B3C0 | |||
| 5080 | 6C85.tmp | C:\Users\admin\AppData\Local\Temp\6CE3.tmp | executable | |
MD5:A545F3C42FFF57C89249AABE9639E8CD | SHA256:F0EAAD19D132D251A9CE9797A08631496F2B8F39517E6B506DD5098CEAA7F56D | |||
| 3788 | 6DAE.tmp | C:\Users\admin\AppData\Local\Temp\6E0C.tmp | executable | |
MD5:5C7A45BB4EDE66D5C933DAFF8DAB3919 | SHA256:7FDE58330F013B88350DD52159C73A2689243EDB84F01052778749D7A772A4FB | |||
| 2148 | 6ACF.tmp | C:\Users\admin\AppData\Local\Temp\6B5C.tmp | executable | |
MD5:227ADE44BFB85ED85CFDE59CA7DC357B | SHA256:6830C2397C1EFBEDE2E4E95D6207C76FA754018CA86212F6C783616D7BC10D9C | |||
| 5400 | 6E0C.tmp | C:\Users\admin\AppData\Local\Temp\6E89.tmp | executable | |
MD5:A958C568447F945AB73CA0B7A9300F9A | SHA256:C75F2B9A5EF222C894142AB10DCFB8E9639CD1EA6F14F45BB67C70BD62C37833 | |||
| 1136 | 6CE3.tmp | C:\Users\admin\AppData\Local\Temp\6D50.tmp | executable | |
MD5:5586EBA9D73B661EB6999176D8BFF532 | SHA256:005CCCD8A3FAEE9A3245A6D566C7700AA205CE1A3B69C1AB91921BBAE88BC59F | |||
| 6748 | 6C27.tmp | C:\Users\admin\AppData\Local\Temp\6C85.tmp | executable | |
MD5:D043795C7A3469F3C819C584F2977C91 | SHA256:82BCEAEBFA3803AB141F4A05FAFE57298079DD27A31F1083E9992906B5A83E09 | |||
| 5644 | 6987.tmp | C:\Users\admin\AppData\Local\Temp\6A04.tmp | executable | |
MD5:9102A458560C103BEAC28D2DBA71518F | SHA256:83ECEC2E9392A189628C424D407A9346AE584A845E6340CE958757052A250C4E | |||
| 1068 | 2025-06-21_88450d30cba1d5aada0093322282268d_elex_mafia.exe | C:\Users\admin\AppData\Local\Temp\6987.tmp | executable | |
MD5:C6F119A41687150315363F9332E4AF76 | SHA256:6D6EF79A951F87350A4B62A44E52938A423F23133C4BF0D542EA0CE7C77EB60B | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
5944 | MoUsoCoreWorker.exe | GET | 200 | 184.25.50.10:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
1268 | svchost.exe | GET | 200 | 184.25.50.10:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
1268 | svchost.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
6012 | RUXIMICS.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
5944 | MoUsoCoreWorker.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
— | — | POST | 500 | 40.91.76.224:443 | https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail | unknown | xml | 512 b | whitelisted |
— | — | POST | 500 | 40.91.76.224:443 | https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail | unknown | xml | 512 b | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
1268 | svchost.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
5944 | MoUsoCoreWorker.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
6012 | RUXIMICS.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
1268 | svchost.exe | 184.25.50.10:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
5944 | MoUsoCoreWorker.exe | 184.25.50.10:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
1268 | svchost.exe | 95.101.149.131:80 | www.microsoft.com | Akamai International B.V. | NL | whitelisted |
6012 | RUXIMICS.exe | 95.101.149.131:80 | www.microsoft.com | Akamai International B.V. | NL | whitelisted |
5944 | MoUsoCoreWorker.exe | 95.101.149.131:80 | www.microsoft.com | Akamai International B.V. | NL | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
activation-v2.sls.microsoft.com |
| whitelisted |
self.events.data.microsoft.com |
| whitelisted |