| File name: | 2025-08-01_6a4b4ad09090ec77f0a2f4f40643f02a_elex_mafia_stealc_tofsee.exe |
| Full analysis: | https://app.any.run/tasks/a7f80574-bf7f-4f64-9de5-490a589b5142 |
| Verdict: | Malicious activity |
| Analysis date: | August 01, 2025, 04:49:56 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, 13 sections |
| MD5: | 6A4B4AD09090EC77F0A2F4F40643F02A |
| SHA1: | 5273F810167C85B04F5F6EF2457897F385D994F1 |
| SHA256: | 874C17996832F8E0A3AD5700BE83D0E5472EBA9A725A0670A3A17CF9583CC79F |
| SSDEEP: | 24576:8sYXjV70CjIG2D5V7VnEYpBgbzLQ0yzIlH4Hp:8sYXjVgCjIG2b7VnEYpBgbzLQ0yzIlH2 |
| .exe | | | Win64 Executable (generic) (64.6) |
|---|---|---|
| .dll | | | Win32 Dynamic Link Library (generic) (15.4) |
| .exe | | | Win32 Executable (generic) (10.5) |
| .exe | | | Generic Win/DOS Executable (4.6) |
| .exe | | | DOS Executable Generic (4.6) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2005:03:25 14:39:16+00:00 |
| ImageFileCharacteristics: | Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 10 |
| CodeSize: | 140288 |
| InitializedDataSize: | 356352 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x113b6 |
| OSVersion: | 5.1 |
| ImageVersion: | - |
| SubsystemVersion: | 5.1 |
| Subsystem: | Windows GUI |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 188 | "C:\Users\admin\AppData\Local\Temp\4879.tmp" | C:\Users\admin\AppData\Local\Temp\4879.tmp | 481B.tmp | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 Modules
| |||||||||||||||
| 188 | "C:\Users\admin\AppData\Local\Temp\6D27.tmp" | C:\Users\admin\AppData\Local\Temp\6D27.tmp | — | 6CCA.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 Modules
| |||||||||||||||
| 188 | "C:\Users\admin\AppData\Local\Temp\BF8.tmp" | C:\Users\admin\AppData\Local\Temp\BF8.tmp | — | B9A.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 Modules
| |||||||||||||||
| 188 | "C:\Users\admin\AppData\Local\Temp\22AC.tmp" | C:\Users\admin\AppData\Local\Temp\22AC.tmp | — | 224E.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 Modules
| |||||||||||||||
| 236 | "C:\Users\admin\AppData\Local\Temp\4404.tmp" | C:\Users\admin\AppData\Local\Temp\4404.tmp | 43A6.tmp | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 Modules
| |||||||||||||||
| 236 | "C:\Users\admin\AppData\Local\Temp\B368.tmp" | C:\Users\admin\AppData\Local\Temp\B368.tmp | — | B30A.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 Modules
| |||||||||||||||
| 304 | "C:\Users\admin\AppData\Local\Temp\69FB.tmp" | C:\Users\admin\AppData\Local\Temp\69FB.tmp | — | 697E.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 Modules
| |||||||||||||||
| 304 | "C:\Users\admin\AppData\Local\Temp\B75F.tmp" | C:\Users\admin\AppData\Local\Temp\B75F.tmp | — | B6F2.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 Modules
| |||||||||||||||
| 320 | "C:\Users\admin\AppData\Local\Temp\F306.tmp" | C:\Users\admin\AppData\Local\Temp\F306.tmp | F2A8.tmp | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 Modules
| |||||||||||||||
| 320 | "C:\Users\admin\AppData\Local\Temp\10F.tmp" | C:\Users\admin\AppData\Local\Temp\10F.tmp | B2.tmp | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 Modules
| |||||||||||||||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 4196 | DEF1.tmp | C:\Users\admin\AppData\Local\Temp\DF4F.tmp | executable | |
MD5:A74871E20AD3B3D74161F16636A666C2 | SHA256:853F94DD08EF71403316AAE0A87FB2EED0D43474E6F94410349FE9594B7411F5 | |||
| 2076 | DCAF.tmp | C:\Users\admin\AppData\Local\Temp\DD0D.tmp | executable | |
MD5:CDC7F5FFC1AC214C4D19887370D4B2F8 | SHA256:28339A4BB9CA11B3625C34F25AB5E70FB30132E42656B7EE6C7FF6BCAA1E05C1 | |||
| 2976 | DAF9.tmp | C:\Users\admin\AppData\Local\Temp\DB67.tmp | executable | |
MD5:45FFF47086CB57048F896A485A97BB48 | SHA256:8D6F095F1F0AD60E68D0A0179CA5F6E426686F323DDFFF56B6EF3B01573C3885 | |||
| 4944 | DC42.tmp | C:\Users\admin\AppData\Local\Temp\DCAF.tmp | executable | |
MD5:4C077C89C71A282E3BE0A593E2E141C7 | SHA256:B8AA97C24A45F1652B0CF6874E14C9AB02551C5461691E06ED8B5673D5BEF7A0 | |||
| 2388 | DD0D.tmp | C:\Users\admin\AppData\Local\Temp\DD6A.tmp | executable | |
MD5:D2C2661FA725C9B3A0E93490C1395A8C | SHA256:FED3D0D2ACE002892539941993D4C2BB07D01618E6F9168131E78437727AC6D1 | |||
| 5848 | DB67.tmp | C:\Users\admin\AppData\Local\Temp\DBD4.tmp | executable | |
MD5:6E064E750E631B516475C6DFE085AA1E | SHA256:29A63432A315EEE2CAE4750D6CD42DAFD55925699B7236C436EE2032D58ECFAD | |||
| 6808 | DBD4.tmp | C:\Users\admin\AppData\Local\Temp\DC42.tmp | executable | |
MD5:7A4185FABA66610177E0D07B9E47740F | SHA256:0AD88F67F80833CC228917A32C56E1BF97CCA9C71D37219B6FD8F3580D645BFF | |||
| 2536 | DF4F.tmp | C:\Users\admin\AppData\Local\Temp\DFBC.tmp | executable | |
MD5:ECCCD523B4AF5DD72A3DA7F2C7D3B99C | SHA256:776FF8ECD1FEDBDF355FAC92A311C532D3B03BA7C3353E6772C4C840F64DD427 | |||
| 2064 | DE36.tmp | C:\Users\admin\AppData\Local\Temp\DE93.tmp | executable | |
MD5:D65422BD4E3B64FBCAF6910529127625 | SHA256:34B1AC95C05B82221EEC13744887E1D133A5EA1C227A2855B3053600DF687FE4 | |||
| 4060 | DE93.tmp | C:\Users\admin\AppData\Local\Temp\DEF1.tmp | executable | |
MD5:828E4D08F70609E4B330B25E2F926BF5 | SHA256:83842DB8ACD8AC4769050106E1AF5D3F5CAF6A47F8CD2F0F0C8CC1C75282B78E | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
5944 | MoUsoCoreWorker.exe | GET | 200 | 23.216.77.28:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
1268 | svchost.exe | GET | 200 | 23.216.77.28:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
6936 | RUXIMICS.exe | GET | 200 | 23.216.77.28:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
5944 | MoUsoCoreWorker.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
— | — | POST | 200 | 40.126.32.72:443 | https://login.live.com/RST2.srf | unknown | xml | 1.24 Kb | whitelisted |
— | — | POST | 400 | 20.190.160.3:443 | https://login.live.com/ppsecure/deviceaddcredential.srf | unknown | — | — | whitelisted |
— | — | POST | 400 | 20.190.160.17:443 | https://login.live.com/ppsecure/deviceaddcredential.srf | unknown | text | 203 b | whitelisted |
— | — | POST | 400 | 20.190.160.131:443 | https://login.live.com/ppsecure/deviceaddcredential.srf | unknown | text | 203 b | whitelisted |
— | — | POST | 400 | 20.190.160.67:443 | https://login.live.com/ppsecure/deviceaddcredential.srf | unknown | text | 203 b | whitelisted |
— | — | POST | 400 | 40.126.32.72:443 | https://login.live.com/ppsecure/deviceaddcredential.srf | unknown | text | 203 b | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
5944 | MoUsoCoreWorker.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
1268 | svchost.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
6936 | RUXIMICS.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
5944 | MoUsoCoreWorker.exe | 23.216.77.28:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
1268 | svchost.exe | 23.216.77.28:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
6936 | RUXIMICS.exe | 23.216.77.28:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
5944 | MoUsoCoreWorker.exe | 184.30.21.171:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
1268 | svchost.exe | 184.30.21.171:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
login.live.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
self.events.data.microsoft.com |
| whitelisted |
activation-v2.sls.microsoft.com |
| whitelisted |
x1.c.lencr.org |
| whitelisted |