File name: | 2025-07-05_1a4e690f150794ce15fc4c8b6214d280_elex_mafia_stealc_tofsee |
Full analysis: | https://app.any.run/tasks/7b214e50-077b-4dc5-85c1-d68f03dbcbf2 |
Verdict: | Malicious activity |
Analysis date: | July 05, 2025, 23:26:36 |
OS: | Windows 10 Professional (build: 19044, 64 bit) |
Indicators: | |
MIME: | application/vnd.microsoft.portable-executable |
File info: | PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections |
MD5: | 1A4E690F150794CE15FC4C8B6214D280 |
SHA1: | 0F16D22E30CAE7B7DAED198BE71728D2B44CD8A3 |
SHA256: | F19DC277C20DC5E41460B7B88D5CCAA00C9F9B07A83001E98C18BDC266A331BF |
SSDEEP: | 24576:emsYXjV7ICDlSSe770Pko5ThBaQIhkffZSyz:lsYXjVECDlSSe77cko5ThBaQIhkffZSU |
.exe | | | DOS Executable Generic (100) |
---|
MachineType: | Intel 386 or later, and compatibles |
---|---|
TimeStamp: | 2003:11:11 14:39:16+00:00 |
ImageFileCharacteristics: | Executable, 32-bit |
PEType: | PE32 |
LinkerVersion: | 10 |
CodeSize: | 140288 |
InitializedDataSize: | 356352 |
UninitializedDataSize: | - |
EntryPoint: | 0x113b6 |
OSVersion: | 5.1 |
ImageVersion: | - |
SubsystemVersion: | 5.1 |
Subsystem: | Windows GUI |
FileVersionNumber: | 12.0.4518.1014 |
ProductVersionNumber: | 12.0.4518.0 |
FileFlagsMask: | 0x003f |
FileFlags: | (none) |
FileOS: | Windows NT 32-bit |
ObjectFileType: | Executable application |
FileSubtype: | - |
LanguageCode: | Neutral |
CharacterSet: | Windows, Latin1 |
CompanyName: | Microsoft Corporation |
FileDescription: | Microsoft Office Word |
FileVersion: | 12.0.4518.1014 |
InternalName: | WinWord |
LegalCopyright: | © 2006 Microsoft Corporation. All rights reserved. |
LegalTrademarks1: | Microsoft® is a registered trademark of Microsoft Corporation. |
LegalTrademarks2: | Windows® is a registered trademark of Microsoft Corporation. |
OriginalFileName: | WinWord.exe |
ProductName: | 2007 Microsoft Office system |
ProductVersion: | 12.0.4518.1014 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
32 | "C:\Users\admin\AppData\Local\Temp\638C.tmp" | C:\Users\admin\AppData\Local\Temp\638C.tmp | 632E.tmp | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 Modules
| |||||||||||||||
32 | "C:\Users\admin\AppData\Local\Temp\9124.tmp" | C:\Users\admin\AppData\Local\Temp\9124.tmp | 90C6.tmp | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 Modules
| |||||||||||||||
32 | "C:\Users\admin\AppData\Local\Temp\6C03.tmp" | C:\Users\admin\AppData\Local\Temp\6C03.tmp | — | 6B96.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 Modules
| |||||||||||||||
32 | "C:\Users\admin\AppData\Local\Temp\96BD.tmp" | C:\Users\admin\AppData\Local\Temp\96BD.tmp | — | 966F.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 Modules
| |||||||||||||||
304 | "C:\Users\admin\AppData\Local\Temp\93C4.tmp" | C:\Users\admin\AppData\Local\Temp\93C4.tmp | 9366.tmp | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 Modules
| |||||||||||||||
304 | "C:\Users\admin\AppData\Local\Temp\C1AA.tmp" | C:\Users\admin\AppData\Local\Temp\C1AA.tmp | C14C.tmp | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 Modules
| |||||||||||||||
304 | "C:\Users\admin\AppData\Local\Temp\D33E.tmp" | C:\Users\admin\AppData\Local\Temp\D33E.tmp | — | D2D0.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 Modules
| |||||||||||||||
304 | "C:\Users\admin\AppData\Local\Temp\E60A.tmp" | C:\Users\admin\AppData\Local\Temp\E60A.tmp | — | E59D.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 Modules
| |||||||||||||||
316 | "C:\Users\admin\AppData\Local\Temp\8107.tmp" | C:\Users\admin\AppData\Local\Temp\8107.tmp | 80B9.tmp | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 Modules
| |||||||||||||||
316 | "C:\Users\admin\AppData\Local\Temp\A373.tmp" | C:\Users\admin\AppData\Local\Temp\A373.tmp | A325.tmp | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 Modules
|
PID | Process | Filename | Type | |
---|---|---|---|---|
1080 | 606F.tmp | C:\Users\admin\AppData\Local\Temp\60DD.tmp | executable | |
MD5:B65160D78BF807E68E6B1A3A36D57404 | SHA256:4150461ED0BD52EC1D500F1CF11D59597F8C185E5B55359C8AAF02AD914D093E | |||
1208 | 5FB4.tmp | C:\Users\admin\AppData\Local\Temp\6011.tmp | executable | |
MD5:9736A745F6D0F8A775353A8941D51202 | SHA256:A77A8FC3E94B7C64E456B6E83519A038B13CB2841972BB58F2950B74BE67EA11 | |||
6124 | 5F27.tmp | C:\Users\admin\AppData\Local\Temp\5FB4.tmp | executable | |
MD5:5E98A006CCB9F78B289E73B126E01CE0 | SHA256:CACD4573D70A52D50AA35266A2040DF2FC0DF08060E94D9DA0671E4FAD07454E | |||
2708 | 2025-07-05_1a4e690f150794ce15fc4c8b6214d280_elex_mafia_stealc_tofsee.exe | C:\Users\admin\AppData\Local\Temp\5F27.tmp | executable | |
MD5:FD5C0A1DE5A998395420098001CBA217 | SHA256:2ACF3F6807B49B48A9067C70FB75E3C3A069C4AA77B74EFC3AF76096CE50214E | |||
3872 | 6011.tmp | C:\Users\admin\AppData\Local\Temp\606F.tmp | executable | |
MD5:0FD89E529029307FD0136D12A19F084A | SHA256:BE8F6C33FF4702020CEF758A2D3EC5F75F8267E8806488CB3EC11F9F06B94C5D | |||
4764 | 61B7.tmp | C:\Users\admin\AppData\Local\Temp\6225.tmp | executable | |
MD5:FE62756EFB1E8C7A0145B2E76B09EB47 | SHA256:8D4FC776035F8B6673016ABAF70618208F131829BADB52A66F60032CC042531D | |||
32 | 638C.tmp | C:\Users\admin\AppData\Local\Temp\6419.tmp | executable | |
MD5:2508560CD6909868A32DF8AEECDD63DF | SHA256:D81DBEF8FC13EA49F5859210D8086434267833558AC0E7802111866F3F917DC2 | |||
3288 | 614A.tmp | C:\Users\admin\AppData\Local\Temp\61B7.tmp | executable | |
MD5:F09B86DB0775C5BE367547CD76FD13D9 | SHA256:9F3679C350C515F41528FC9D3DD05DE6D31550E52BD91B460B5422EDE2EC2FBA | |||
4664 | 62D1.tmp | C:\Users\admin\AppData\Local\Temp\632E.tmp | executable | |
MD5:21F7290B3D990979FE0F8C793AF70149 | SHA256:27605169764233F3F5B7CB1B21559843FB155176A1207F3A40791798DEB39564 | |||
1044 | 6419.tmp | C:\Users\admin\AppData\Local\Temp\6486.tmp | executable | |
MD5:C335D624FC13974B4220FCDB062BDCD4 | SHA256:1D00995524D40F5B17259B731B48C6139D9EA70B90DC2B29291E9C33D0EB7830 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
5944 | MoUsoCoreWorker.exe | GET | 200 | 23.53.40.176:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
1204 | SIHClient.exe | GET | 200 | 23.32.238.107:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut_2010-06-23.crl | unknown | — | — | whitelisted |
1204 | SIHClient.exe | GET | 200 | 23.32.238.107:80 | http://crl.microsoft.com/pki/crl/products/MicTimStaPCA_2010-07-01.crl | unknown | — | — | whitelisted |
1204 | SIHClient.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
— | — | GET | 200 | 52.165.164.15:443 | https://fe3cr.delivery.mp.microsoft.com/clientwebservice/ping | unknown | — | — | — |
1204 | SIHClient.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Signing%20CA%202.1.crl | unknown | — | — | whitelisted |
1204 | SIHClient.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20Update%20Signing%20CA%202.2.crl | unknown | — | — | whitelisted |
1204 | SIHClient.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Signing%20CA%202.2.crl | unknown | — | — | whitelisted |
1268 | svchost.exe | GET | 200 | 23.53.40.176:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
3980 | RUXIMICS.exe | GET | 200 | 23.53.40.176:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
1268 | svchost.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
5944 | MoUsoCoreWorker.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
3980 | RUXIMICS.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
5944 | MoUsoCoreWorker.exe | 23.53.40.176:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
1268 | svchost.exe | 23.53.40.176:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
3980 | RUXIMICS.exe | 23.53.40.176:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
5944 | MoUsoCoreWorker.exe | 184.30.21.171:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
1268 | svchost.exe | 184.30.21.171:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
Domain | IP | Reputation |
---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
login.live.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
nexusrules.officeapps.live.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
activation-v2.sls.microsoft.com |
| whitelisted |