| File name: | 2025-07-06_3c56f2367b93cefe344c102d6202a8b6_elex_mafia |
| Full analysis: | https://app.any.run/tasks/0ee8e91c-3ad1-45ad-966d-baba911f7779 |
| Verdict: | Malicious activity |
| Analysis date: | July 06, 2025, 01:06:28 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections |
| MD5: | 3C56F2367B93CEFE344C102D6202A8B6 |
| SHA1: | E275173A47128DEFE560866D35668B859EB1E806 |
| SHA256: | 98434F1DBE15BB3AAD012A419303B6AF1933B7FCAC6150C70A8FAD07A85CCFD7 |
| SSDEEP: | 24576:GEY89WxCvL59vhehw3i1CGDWwGqb+6iz0Y1Fyzr:GEY89WxCvL53ehw3i1CGDWwGqb+6iz0z |
| .exe | | | DOS Executable Generic (100) |
|---|
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2003:11:11 14:39:16+00:00 |
| ImageFileCharacteristics: | Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 10 |
| CodeSize: | 140288 |
| InitializedDataSize: | 356352 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x113b6 |
| OSVersion: | 5.1 |
| ImageVersion: | - |
| SubsystemVersion: | 5.1 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 12.0.4518.1014 |
| ProductVersionNumber: | 12.0.4518.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Windows NT 32-bit |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Neutral |
| CharacterSet: | Windows, Latin1 |
| CompanyName: | Microsoft Corporation |
| FileDescription: | Microsoft Office Word |
| FileVersion: | 12.0.4518.1014 |
| InternalName: | WinWord |
| LegalCopyright: | © 2006 Microsoft Corporation. All rights reserved. |
| LegalTrademarks1: | Microsoft® is a registered trademark of Microsoft Corporation. |
| LegalTrademarks2: | Windows® is a registered trademark of Microsoft Corporation. |
| OriginalFileName: | WinWord.exe |
| ProductName: | 2007 Microsoft Office system |
| ProductVersion: | 12.0.4518.1014 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 304 | "C:\Users\admin\AppData\Local\Temp\6CE3.tmp" | C:\Users\admin\AppData\Local\Temp\6CE3.tmp | 6C85.tmp | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 Modules
| |||||||||||||||
| 304 | "C:\Users\admin\AppData\Local\Temp\9CBD.tmp" | C:\Users\admin\AppData\Local\Temp\9CBD.tmp | 9C5F.tmp | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 Modules
| |||||||||||||||
| 304 | "C:\Users\admin\AppData\Local\Temp\AD37.tmp" | C:\Users\admin\AppData\Local\Temp\AD37.tmp | ACDA.tmp | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 Modules
| |||||||||||||||
| 304 | "C:\Users\admin\AppData\Local\Temp\C062.tmp" | C:\Users\admin\AppData\Local\Temp\C062.tmp | C004.tmp | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 Modules
| |||||||||||||||
| 304 | "C:\Users\admin\AppData\Local\Temp\E6C6.tmp" | C:\Users\admin\AppData\Local\Temp\E6C6.tmp | — | E658.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 Modules
| |||||||||||||||
| 304 | "C:\Users\admin\AppData\Local\Temp\1299.tmp" | C:\Users\admin\AppData\Local\Temp\1299.tmp | — | 123B.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 Modules
| |||||||||||||||
| 316 | "C:\Users\admin\AppData\Local\Temp\B67E.tmp" | C:\Users\admin\AppData\Local\Temp\B67E.tmp | B611.tmp | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 Modules
| |||||||||||||||
| 316 | "C:\Users\admin\AppData\Local\Temp\C9C8.tmp" | C:\Users\admin\AppData\Local\Temp\C9C8.tmp | — | C95B.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 Modules
| |||||||||||||||
| 316 | "C:\Users\admin\AppData\Local\Temp\DD9E.tmp" | C:\Users\admin\AppData\Local\Temp\DD9E.tmp | — | DD31.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 Modules
| |||||||||||||||
| 316 | "C:\Users\admin\AppData\Local\Temp\923.tmp" | C:\Users\admin\AppData\Local\Temp\923.tmp | — | 8D5.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 Modules
| |||||||||||||||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 4192 | 2025-07-06_3c56f2367b93cefe344c102d6202a8b6_elex_mafia.exe | C:\Users\admin\AppData\Local\Temp\5D52.tmp | executable | |
MD5:FE960C24F5F952F6A8B6E127596A8C4A | SHA256:128BCBD74695B0D1283759D76921D6E4CC26C4DC5C5352A920D9B7CD4D4E3410 | |||
| 6548 | 5E1D.tmp | C:\Users\admin\AppData\Local\Temp\5E7B.tmp | executable | |
MD5:70DF777097BC21208EA41AA3CE502296 | SHA256:5D9B2BC018F7674A4A57457F72608BF3119F26903AE37F5B2940A709E52AF940 | |||
| 3936 | 6021.tmp | C:\Users\admin\AppData\Local\Temp\608E.tmp | executable | |
MD5:1039772E6EA68F785641E279173F1FB8 | SHA256:620FF5AC4C3F17D6EDB84F7C3429E3E398E2615A1CE6DE8F84601AE4B58B290D | |||
| 5960 | 5EE9.tmp | C:\Users\admin\AppData\Local\Temp\5F56.tmp | executable | |
MD5:2D74C5D0772C6A8579FA9F5AE164B89C | SHA256:CEBD51D3233A54E94E0FFDBBDD3B8F7ECEB84B2BF0B767D4682283984AA490BE | |||
| 1056 | 5F56.tmp | C:\Users\admin\AppData\Local\Temp\5FB4.tmp | executable | |
MD5:C9857E72B8F83D471469ED3EB132B4EF | SHA256:D787DA94785D3580C8454C66E75C4D75222C1991C199FDD865DB4325BA783461 | |||
| 5104 | 5FB4.tmp | C:\Users\admin\AppData\Local\Temp\6021.tmp | executable | |
MD5:E63ADBCC1510C8777FA49F477554B7A5 | SHA256:D9BBB1C8F0F8B1FB242577ABE467F90F9D0D22B6517C17D2AA30B2DD6A2322CB | |||
| 1336 | 6476.tmp | C:\Users\admin\AppData\Local\Temp\64C5.tmp | executable | |
MD5:6DD906FC57150D820BE946B8B33CD4D2 | SHA256:90AAF623227C437C6A6F6C2E3A3CD7D0AE16F309AD3327A4FA30A6DD129486E8 | |||
| 2368 | 632E.tmp | C:\Users\admin\AppData\Local\Temp\63BB.tmp | executable | |
MD5:22D70731DC4E256FF6824CF0B400F4CB | SHA256:2F99D9DBEC2B8B452DEF0DBBE478D87CD9137175B331C6A9ADEFA321A7F321E3 | |||
| 3100 | 62D1.tmp | C:\Users\admin\AppData\Local\Temp\632E.tmp | executable | |
MD5:42077E30EAC47C2873B4E7EC4F9E6508 | SHA256:70A01669EE5BCA981C3AD9697E71CC76CE0BA24EED2CA0C387071CE5244D436D | |||
| 3648 | 61A8.tmp | C:\Users\admin\AppData\Local\Temp\6205.tmp | executable | |
MD5:E43561B2889FEE3915E92BA0A3DC4F34 | SHA256:5F99786A94A4C7ACCFE25811025D9847CE5B680CD524A7B73967740648889CD1 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
1268 | svchost.exe | GET | 200 | 2.20.245.139:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | SE | binary | 825 b | whitelisted |
6980 | RUXIMICS.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | NL | binary | 814 b | whitelisted |
6980 | RUXIMICS.exe | GET | 200 | 2.20.245.139:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | SE | binary | 825 b | whitelisted |
5944 | MoUsoCoreWorker.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | NL | binary | 814 b | whitelisted |
— | — | POST | 500 | 40.91.76.224:443 | https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail | US | xml | 512 b | whitelisted |
1268 | svchost.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | NL | binary | 814 b | whitelisted |
5944 | MoUsoCoreWorker.exe | GET | 200 | 2.20.245.139:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | SE | binary | 825 b | whitelisted |
— | — | POST | 500 | 40.91.76.224:443 | https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail | US | xml | 512 b | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
1268 | svchost.exe | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
6980 | RUXIMICS.exe | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
5944 | MoUsoCoreWorker.exe | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
1268 | svchost.exe | 2.20.245.139:80 | crl.microsoft.com | Akamai International B.V. | SE | whitelisted |
5944 | MoUsoCoreWorker.exe | 2.20.245.139:80 | crl.microsoft.com | Akamai International B.V. | SE | whitelisted |
6980 | RUXIMICS.exe | 2.20.245.139:80 | crl.microsoft.com | Akamai International B.V. | SE | whitelisted |
1268 | svchost.exe | 95.101.149.131:80 | www.microsoft.com | Akamai International B.V. | NL | whitelisted |
6980 | RUXIMICS.exe | 95.101.149.131:80 | www.microsoft.com | Akamai International B.V. | NL | whitelisted |
Domain | IP | Reputation |
|---|---|---|
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
activation-v2.sls.microsoft.com |
| whitelisted |
self.events.data.microsoft.com |
| whitelisted |