| File name: | 2025-07-06_3c56f2367b93cefe344c102d6202a8b6_elex_mafia |
| Full analysis: | https://app.any.run/tasks/0ee8e91c-3ad1-45ad-966d-baba911f7779 |
| Verdict: | Malicious activity |
| Analysis date: | July 06, 2025, 01:06:28 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections |
| MD5: | 3C56F2367B93CEFE344C102D6202A8B6 |
| SHA1: | E275173A47128DEFE560866D35668B859EB1E806 |
| SHA256: | 98434F1DBE15BB3AAD012A419303B6AF1933B7FCAC6150C70A8FAD07A85CCFD7 |
| SSDEEP: | 24576:GEY89WxCvL59vhehw3i1CGDWwGqb+6iz0Y1Fyzr:GEY89WxCvL53ehw3i1CGDWwGqb+6iz0z |
| .exe | | | DOS Executable Generic (100) |
|---|
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2003:11:11 14:39:16+00:00 |
| ImageFileCharacteristics: | Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 10 |
| CodeSize: | 140288 |
| InitializedDataSize: | 356352 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x113b6 |
| OSVersion: | 5.1 |
| ImageVersion: | - |
| SubsystemVersion: | 5.1 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 12.0.4518.1014 |
| ProductVersionNumber: | 12.0.4518.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Windows NT 32-bit |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Neutral |
| CharacterSet: | Windows, Latin1 |
| CompanyName: | Microsoft Corporation |
| FileDescription: | Microsoft Office Word |
| FileVersion: | 12.0.4518.1014 |
| InternalName: | WinWord |
| LegalCopyright: | © 2006 Microsoft Corporation. All rights reserved. |
| LegalTrademarks1: | Microsoft® is a registered trademark of Microsoft Corporation. |
| LegalTrademarks2: | Windows® is a registered trademark of Microsoft Corporation. |
| OriginalFileName: | WinWord.exe |
| ProductName: | 2007 Microsoft Office system |
| ProductVersion: | 12.0.4518.1014 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 304 | "C:\Users\admin\AppData\Local\Temp\6CE3.tmp" | C:\Users\admin\AppData\Local\Temp\6CE3.tmp | 6C85.tmp | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 Modules
| |||||||||||||||
| 304 | "C:\Users\admin\AppData\Local\Temp\9CBD.tmp" | C:\Users\admin\AppData\Local\Temp\9CBD.tmp | 9C5F.tmp | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 Modules
| |||||||||||||||
| 304 | "C:\Users\admin\AppData\Local\Temp\AD37.tmp" | C:\Users\admin\AppData\Local\Temp\AD37.tmp | ACDA.tmp | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 Modules
| |||||||||||||||
| 304 | "C:\Users\admin\AppData\Local\Temp\C062.tmp" | C:\Users\admin\AppData\Local\Temp\C062.tmp | C004.tmp | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 Modules
| |||||||||||||||
| 304 | "C:\Users\admin\AppData\Local\Temp\E6C6.tmp" | C:\Users\admin\AppData\Local\Temp\E6C6.tmp | — | E658.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 Modules
| |||||||||||||||
| 304 | "C:\Users\admin\AppData\Local\Temp\1299.tmp" | C:\Users\admin\AppData\Local\Temp\1299.tmp | — | 123B.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 Modules
| |||||||||||||||
| 316 | "C:\Users\admin\AppData\Local\Temp\B67E.tmp" | C:\Users\admin\AppData\Local\Temp\B67E.tmp | B611.tmp | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 Modules
| |||||||||||||||
| 316 | "C:\Users\admin\AppData\Local\Temp\C9C8.tmp" | C:\Users\admin\AppData\Local\Temp\C9C8.tmp | — | C95B.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 Modules
| |||||||||||||||
| 316 | "C:\Users\admin\AppData\Local\Temp\DD9E.tmp" | C:\Users\admin\AppData\Local\Temp\DD9E.tmp | — | DD31.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 Modules
| |||||||||||||||
| 316 | "C:\Users\admin\AppData\Local\Temp\923.tmp" | C:\Users\admin\AppData\Local\Temp\923.tmp | — | 8D5.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 Modules
| |||||||||||||||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3652 | 5DC0.tmp | C:\Users\admin\AppData\Local\Temp\5E1D.tmp | executable | |
MD5:6FF6D3791D097E7FB114F0C8539EAC65 | SHA256:CF3A3DCB497A2D1F0A877A2E5F459076FBF26E1BA6A54054F1B876889F21A89B | |||
| 1056 | 5F56.tmp | C:\Users\admin\AppData\Local\Temp\5FB4.tmp | executable | |
MD5:C9857E72B8F83D471469ED3EB132B4EF | SHA256:D787DA94785D3580C8454C66E75C4D75222C1991C199FDD865DB4325BA783461 | |||
| 6508 | 5E7B.tmp | C:\Users\admin\AppData\Local\Temp\5EE9.tmp | executable | |
MD5:5F11899876AE0FE7E8C965F038EF138B | SHA256:A22C66686F67A7E10449825CEE1EC906BD7EF3833655772883814487F8D500DB | |||
| 3936 | 6021.tmp | C:\Users\admin\AppData\Local\Temp\608E.tmp | executable | |
MD5:1039772E6EA68F785641E279173F1FB8 | SHA256:620FF5AC4C3F17D6EDB84F7C3429E3E398E2615A1CE6DE8F84601AE4B58B290D | |||
| 5104 | 5FB4.tmp | C:\Users\admin\AppData\Local\Temp\6021.tmp | executable | |
MD5:E63ADBCC1510C8777FA49F477554B7A5 | SHA256:D9BBB1C8F0F8B1FB242577ABE467F90F9D0D22B6517C17D2AA30B2DD6A2322CB | |||
| 4444 | 608E.tmp | C:\Users\admin\AppData\Local\Temp\60EC.tmp | executable | |
MD5:9F91CD9B60A293B4A5EBFDCEE2332E8C | SHA256:DAFAED646519DE31684FE019B390685A82D1081204F680755B2214CEB2242FC3 | |||
| 6524 | 5D52.tmp | C:\Users\admin\AppData\Local\Temp\5DC0.tmp | executable | |
MD5:E75E7ED2C49E584B13218B70AF5559EF | SHA256:786348DE8E8EEAFE0BED79EEEF7F9893117D4D39A5A8CB9355770BDA3967CAA0 | |||
| 4192 | 2025-07-06_3c56f2367b93cefe344c102d6202a8b6_elex_mafia.exe | C:\Users\admin\AppData\Local\Temp\5D52.tmp | executable | |
MD5:FE960C24F5F952F6A8B6E127596A8C4A | SHA256:128BCBD74695B0D1283759D76921D6E4CC26C4DC5C5352A920D9B7CD4D4E3410 | |||
| 5960 | 5EE9.tmp | C:\Users\admin\AppData\Local\Temp\5F56.tmp | executable | |
MD5:2D74C5D0772C6A8579FA9F5AE164B89C | SHA256:CEBD51D3233A54E94E0FFDBBDD3B8F7ECEB84B2BF0B767D4682283984AA490BE | |||
| 640 | 60EC.tmp | C:\Users\admin\AppData\Local\Temp\614A.tmp | executable | |
MD5:6C108A2A105E565FEBF06BED7E30CC9B | SHA256:76D38BE0441E0A9080EF42A2FAA69284EE2E35F8A7A92DE752E22E7D742A3641 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
1268 | svchost.exe | GET | 200 | 2.20.245.139:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
5944 | MoUsoCoreWorker.exe | GET | 200 | 2.20.245.139:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
6980 | RUXIMICS.exe | GET | 200 | 2.20.245.139:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
1268 | svchost.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
6980 | RUXIMICS.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
5944 | MoUsoCoreWorker.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
— | — | POST | 500 | 40.91.76.224:443 | https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail | unknown | xml | 512 b | whitelisted |
— | — | POST | 500 | 40.91.76.224:443 | https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail | unknown | xml | 512 b | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
1268 | svchost.exe | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
6980 | RUXIMICS.exe | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
5944 | MoUsoCoreWorker.exe | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
1268 | svchost.exe | 2.20.245.139:80 | crl.microsoft.com | Akamai International B.V. | SE | whitelisted |
5944 | MoUsoCoreWorker.exe | 2.20.245.139:80 | crl.microsoft.com | Akamai International B.V. | SE | whitelisted |
6980 | RUXIMICS.exe | 2.20.245.139:80 | crl.microsoft.com | Akamai International B.V. | SE | whitelisted |
1268 | svchost.exe | 95.101.149.131:80 | www.microsoft.com | Akamai International B.V. | NL | whitelisted |
6980 | RUXIMICS.exe | 95.101.149.131:80 | www.microsoft.com | Akamai International B.V. | NL | whitelisted |
Domain | IP | Reputation |
|---|---|---|
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
activation-v2.sls.microsoft.com |
| whitelisted |
self.events.data.microsoft.com |
| whitelisted |