| File name: | 2025-06-21_0a77724df2c87512ed71cd668293a2ff_elex_mafia_stealc_tofsee |
| Full analysis: | https://app.any.run/tasks/3f1234cd-8129-45a7-a6d1-73b9dd591a98 |
| Verdict: | Malicious activity |
| Analysis date: | June 21, 2025, 11:54:48 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, 6 sections |
| MD5: | 0A77724DF2C87512ED71CD668293A2FF |
| SHA1: | FB8F9797388B9354DC998165FB098B5DFBBDA12C |
| SHA256: | E32F013DB2AEDBB5E5DA4E2112ED0FF903AFD3B38E41B729728758093EC11EFC |
| SSDEEP: | 24576:msYXjV7ICD2biIw6VlGF3AXQDlYzcjxpG5A/ZfyzSCvq5TJLCvY90D8/LVBlVk7k:msYXjVECD2biIw6VlGF3AXQDlYEx85Ap |
| .exe | | | Win32 Executable MS Visual C++ (generic) (42.2) |
|---|---|---|
| .exe | | | Win64 Executable (generic) (37.3) |
| .dll | | | Win32 Dynamic Link Library (generic) (8.8) |
| .exe | | | Win32 Executable (generic) (6) |
| .exe | | | Generic Win/DOS Executable (2.7) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 1999:10:03 14:39:16+00:00 |
| ImageFileCharacteristics: | Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 10 |
| CodeSize: | 140288 |
| InitializedDataSize: | 356352 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x113b6 |
| OSVersion: | 5.1 |
| ImageVersion: | - |
| SubsystemVersion: | 5.1 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 12.0.4518.1014 |
| ProductVersionNumber: | 12.0.4518.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Windows NT 32-bit |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Neutral |
| CharacterSet: | Windows, Latin1 |
| CompanyName: | Microsoft Corporation |
| FileDescription: | Microsoft Office Word |
| FileVersion: | 12.0.4518.1014 |
| InternalName: | WinWord |
| LegalCopyright: | © 2006 Microsoft Corporation. All rights reserved. |
| LegalTrademarks1: | Microsoft® is a registered trademark of Microsoft Corporation. |
| LegalTrademarks2: | Windows® is a registered trademark of Microsoft Corporation. |
| OriginalFileName: | WinWord.exe |
| ProductName: | 2007 Microsoft Office system |
| ProductVersion: | 12.0.4518.1014 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 32 | "C:\Users\admin\AppData\Local\Temp\9A47.tmp" | C:\Users\admin\AppData\Local\Temp\9A47.tmp | — | 99E9.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 Modules
| |||||||||||||||
| 188 | "C:\Users\admin\AppData\Local\Temp\A1B9.tmp" | C:\Users\admin\AppData\Local\Temp\A1B9.tmp | — | A14C.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 Modules
| |||||||||||||||
| 236 | "C:\Users\admin\AppData\Local\Temp\7AAE.tmp" | C:\Users\admin\AppData\Local\Temp\7AAE.tmp | 7A50.tmp | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 Modules
| |||||||||||||||
| 316 | "C:\Users\admin\AppData\Local\Temp\1C8B.tmp" | C:\Users\admin\AppData\Local\Temp\1C8B.tmp | — | 1C0E.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 Modules
| |||||||||||||||
| 316 | "C:\Users\admin\AppData\Local\Temp\85D5.tmp" | C:\Users\admin\AppData\Local\Temp\85D5.tmp | — | 8586.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 Modules
| |||||||||||||||
| 320 | "C:\Users\admin\AppData\Local\Temp\733C.tmp" | C:\Users\admin\AppData\Local\Temp\733C.tmp | 72CE.tmp | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 Modules
| |||||||||||||||
| 320 | "C:\Users\admin\AppData\Local\Temp\1008.tmp" | C:\Users\admin\AppData\Local\Temp\1008.tmp | — | F9B.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 Modules
| |||||||||||||||
| 320 | "C:\Users\admin\AppData\Local\Temp\3841.tmp" | C:\Users\admin\AppData\Local\Temp\3841.tmp | — | 37D4.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 Modules
| |||||||||||||||
| 320 | "C:\Users\admin\AppData\Local\Temp\6116.tmp" | C:\Users\admin\AppData\Local\Temp\6116.tmp | — | 60B9.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 Modules
| |||||||||||||||
| 320 | "C:\Users\admin\AppData\Local\Temp\9006.tmp" | C:\Users\admin\AppData\Local\Temp\9006.tmp | — | 8F99.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 Modules
| |||||||||||||||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 7048 | 6BC9.tmp | C:\Users\admin\AppData\Local\Temp\6C46.tmp | executable | |
MD5:1E293CC608E62CEC88A19CA1AE109D7A | SHA256:E88DB938877AA823C9C9EA9B26C31B5D773171DEC1797BC9DE3C3EFC05E33BF7 | |||
| 3100 | 6AFE.tmp | C:\Users\admin\AppData\Local\Temp\6B6C.tmp | executable | |
MD5:DF15B2A2C3DD4B1019C236EE70667825 | SHA256:4E125BF51E9AB536496DDB8E91182F627730C50E090BFA998D6387912F013608 | |||
| 1688 | 6C46.tmp | C:\Users\admin\AppData\Local\Temp\6CA4.tmp | executable | |
MD5:CDBC0A046EE51D833AD7C1D35B487CAD | SHA256:6BB585F957EFA3EE8762CE8435E62F56A8D6BA156F572AF9A3C7FD641985E493 | |||
| 1216 | 6D12.tmp | C:\Users\admin\AppData\Local\Temp\6D9E.tmp | executable | |
MD5:093380C28C1060DC45ECBCA9471EEC36 | SHA256:20C0B02E3DDB5048904665ED6D7193CF2847EF3921C59EC4B0EE6C4540B56A16 | |||
| 6656 | 6B6C.tmp | C:\Users\admin\AppData\Local\Temp\6BC9.tmp | executable | |
MD5:5AA643F12AD7D048ED24C4C2875504B3 | SHA256:60E256A649C83A65B0911F29922D1A2643398A0906A5D1D813A9895B7E26401F | |||
| 2976 | 6987.tmp | C:\Users\admin\AppData\Local\Temp\69F5.tmp | executable | |
MD5:2E72B953805CC5B6843F0D537A13835A | SHA256:6C090A7D555CF51A1EFB1E5EF9180B1E7DAB3C919BD9DFD535E69D204CEDAB8E | |||
| 1644 | 6CA4.tmp | C:\Users\admin\AppData\Local\Temp\6D12.tmp | executable | |
MD5:A25AE1093000492BE2B425184C97E53A | SHA256:1AC70C4CFEC9CBFE29EABE2017EC1DA9E61DD42C31C288642DDF1051548822C1 | |||
| 6940 | 7000.tmp | C:\Users\admin\AppData\Local\Temp\7109.tmp | executable | |
MD5:5584B4B669ABC9C1B250D45FDF5DC256 | SHA256:B24C179223FA08EAE847C380BF22B0D7416552FAA2026B1FF1161A08A5CC10D7 | |||
| 1332 | 6E1B.tmp | C:\Users\admin\AppData\Local\Temp\6EA8.tmp | executable | |
MD5:A71A0031E4AB3460C4D1951EFBC10DDD | SHA256:D4047356B01E6131199B6E284632474E810CBAD34C448C21715C85CAD25D5EF7 | |||
| 4664 | 6EA8.tmp | C:\Users\admin\AppData\Local\Temp\6F44.tmp | executable | |
MD5:EDCB79863791E8492A42B6D2116A59F2 | SHA256:B229C9E77104C9AE67C715D6EAEE7BF8C37B5A7FE209D7F3D57B617691570A59 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
5944 | MoUsoCoreWorker.exe | GET | 200 | 184.24.77.37:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
1812 | RUXIMICS.exe | GET | 200 | 184.24.77.37:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
5944 | MoUsoCoreWorker.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
1268 | svchost.exe | GET | 200 | 184.24.77.37:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
1268 | svchost.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
1812 | RUXIMICS.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
— | — | POST | 500 | 40.91.76.224:443 | https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail | unknown | xml | 512 b | whitelisted |
— | — | POST | 500 | 40.91.76.224:443 | https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail | unknown | xml | 512 b | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
5944 | MoUsoCoreWorker.exe | 51.104.136.2:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
1812 | RUXIMICS.exe | 51.104.136.2:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
1268 | svchost.exe | 51.104.136.2:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
5944 | MoUsoCoreWorker.exe | 184.24.77.37:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
1268 | svchost.exe | 184.24.77.37:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
1812 | RUXIMICS.exe | 184.24.77.37:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
5944 | MoUsoCoreWorker.exe | 95.101.149.131:80 | www.microsoft.com | Akamai International B.V. | NL | whitelisted |
1268 | svchost.exe | 95.101.149.131:80 | www.microsoft.com | Akamai International B.V. | NL | whitelisted |
Domain | IP | Reputation |
|---|---|---|
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
activation-v2.sls.microsoft.com |
| whitelisted |
self.events.data.microsoft.com |
| whitelisted |