| File name: | 2025-07-05_1a4e690f150794ce15fc4c8b6214d280_elex_mafia_stealc_tofsee |
| Full analysis: | https://app.any.run/tasks/7b214e50-077b-4dc5-85c1-d68f03dbcbf2 |
| Verdict: | Malicious activity |
| Analysis date: | July 05, 2025, 23:26:36 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, 5 sections |
| MD5: | 1A4E690F150794CE15FC4C8B6214D280 |
| SHA1: | 0F16D22E30CAE7B7DAED198BE71728D2B44CD8A3 |
| SHA256: | F19DC277C20DC5E41460B7B88D5CCAA00C9F9B07A83001E98C18BDC266A331BF |
| SSDEEP: | 24576:emsYXjV7ICDlSSe770Pko5ThBaQIhkffZSyz:lsYXjVECDlSSe77cko5ThBaQIhkffZSU |
| .exe | | | DOS Executable Generic (100) |
|---|
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2003:11:11 14:39:16+00:00 |
| ImageFileCharacteristics: | Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 10 |
| CodeSize: | 140288 |
| InitializedDataSize: | 356352 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x113b6 |
| OSVersion: | 5.1 |
| ImageVersion: | - |
| SubsystemVersion: | 5.1 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 12.0.4518.1014 |
| ProductVersionNumber: | 12.0.4518.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Windows NT 32-bit |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Neutral |
| CharacterSet: | Windows, Latin1 |
| CompanyName: | Microsoft Corporation |
| FileDescription: | Microsoft Office Word |
| FileVersion: | 12.0.4518.1014 |
| InternalName: | WinWord |
| LegalCopyright: | © 2006 Microsoft Corporation. All rights reserved. |
| LegalTrademarks1: | Microsoft® is a registered trademark of Microsoft Corporation. |
| LegalTrademarks2: | Windows® is a registered trademark of Microsoft Corporation. |
| OriginalFileName: | WinWord.exe |
| ProductName: | 2007 Microsoft Office system |
| ProductVersion: | 12.0.4518.1014 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 32 | "C:\Users\admin\AppData\Local\Temp\638C.tmp" | C:\Users\admin\AppData\Local\Temp\638C.tmp | 632E.tmp | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 Modules
| |||||||||||||||
| 32 | "C:\Users\admin\AppData\Local\Temp\9124.tmp" | C:\Users\admin\AppData\Local\Temp\9124.tmp | 90C6.tmp | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 Modules
| |||||||||||||||
| 32 | "C:\Users\admin\AppData\Local\Temp\6C03.tmp" | C:\Users\admin\AppData\Local\Temp\6C03.tmp | — | 6B96.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 Modules
| |||||||||||||||
| 32 | "C:\Users\admin\AppData\Local\Temp\96BD.tmp" | C:\Users\admin\AppData\Local\Temp\96BD.tmp | — | 966F.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 Modules
| |||||||||||||||
| 304 | "C:\Users\admin\AppData\Local\Temp\93C4.tmp" | C:\Users\admin\AppData\Local\Temp\93C4.tmp | 9366.tmp | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 Modules
| |||||||||||||||
| 304 | "C:\Users\admin\AppData\Local\Temp\C1AA.tmp" | C:\Users\admin\AppData\Local\Temp\C1AA.tmp | C14C.tmp | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 Modules
| |||||||||||||||
| 304 | "C:\Users\admin\AppData\Local\Temp\D33E.tmp" | C:\Users\admin\AppData\Local\Temp\D33E.tmp | — | D2D0.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 Modules
| |||||||||||||||
| 304 | "C:\Users\admin\AppData\Local\Temp\E60A.tmp" | C:\Users\admin\AppData\Local\Temp\E60A.tmp | — | E59D.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 Modules
| |||||||||||||||
| 316 | "C:\Users\admin\AppData\Local\Temp\8107.tmp" | C:\Users\admin\AppData\Local\Temp\8107.tmp | 80B9.tmp | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 Modules
| |||||||||||||||
| 316 | "C:\Users\admin\AppData\Local\Temp\A373.tmp" | C:\Users\admin\AppData\Local\Temp\A373.tmp | A325.tmp | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Office Word Exit code: 0 Version: 12.0.4518.1014 Modules
| |||||||||||||||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 864 | 6542.tmp | C:\Users\admin\AppData\Local\Temp\6590.tmp | executable | |
MD5:845B3F08FA6F12EC1EF1F3196039A4C6 | SHA256:F1C170B4EADAFFB158D08A5346141657668EA31FCDE46F10FF2D3E5CF4AE9006 | |||
| 6124 | 5F27.tmp | C:\Users\admin\AppData\Local\Temp\5FB4.tmp | executable | |
MD5:5E98A006CCB9F78B289E73B126E01CE0 | SHA256:CACD4573D70A52D50AA35266A2040DF2FC0DF08060E94D9DA0671E4FAD07454E | |||
| 3876 | 6486.tmp | C:\Users\admin\AppData\Local\Temp\64F3.tmp | executable | |
MD5:A808606F167ACB05EB17F2487D53AF38 | SHA256:9E61852F4F8EE2297068F73C6D1849131B171326473DEED9889D053A1197A0F5 | |||
| 3872 | 6011.tmp | C:\Users\admin\AppData\Local\Temp\606F.tmp | executable | |
MD5:0FD89E529029307FD0136D12A19F084A | SHA256:BE8F6C33FF4702020CEF758A2D3EC5F75F8267E8806488CB3EC11F9F06B94C5D | |||
| 1936 | 64F3.tmp | C:\Users\admin\AppData\Local\Temp\6542.tmp | executable | |
MD5:F1AF662EBD4464393DBB135CCBDE1FFA | SHA256:DF38E00C5FC9883DDFF0EA63C3F470113D82B2BCB8494E1BA601D5B500748FC9 | |||
| 1208 | 5FB4.tmp | C:\Users\admin\AppData\Local\Temp\6011.tmp | executable | |
MD5:9736A745F6D0F8A775353A8941D51202 | SHA256:A77A8FC3E94B7C64E456B6E83519A038B13CB2841972BB58F2950B74BE67EA11 | |||
| 1080 | 606F.tmp | C:\Users\admin\AppData\Local\Temp\60DD.tmp | executable | |
MD5:B65160D78BF807E68E6B1A3A36D57404 | SHA256:4150461ED0BD52EC1D500F1CF11D59597F8C185E5B55359C8AAF02AD914D093E | |||
| 7160 | 60DD.tmp | C:\Users\admin\AppData\Local\Temp\614A.tmp | executable | |
MD5:7FCF20E1AD7C091DBC08134FE08F7B93 | SHA256:0188F64980A4B71BF601161A424BEB9B844C8C4822E5E6D6BAFEFEE091ABAFAE | |||
| 2124 | 6282.tmp | C:\Users\admin\AppData\Local\Temp\62D1.tmp | executable | |
MD5:A7F585D4B6549B708BAD97717ECEEE30 | SHA256:E0AF76CC078C203D195F3FA395B6399505E42CD52FE36DBDBCCBB5071F747418 | |||
| 3288 | 614A.tmp | C:\Users\admin\AppData\Local\Temp\61B7.tmp | executable | |
MD5:F09B86DB0775C5BE367547CD76FD13D9 | SHA256:9F3679C350C515F41528FC9D3DD05DE6D31550E52BD91B460B5422EDE2EC2FBA | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
5944 | MoUsoCoreWorker.exe | GET | 200 | 23.53.40.176:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
1268 | svchost.exe | GET | 200 | 23.53.40.176:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
3980 | RUXIMICS.exe | GET | 200 | 23.53.40.176:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
5944 | MoUsoCoreWorker.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
1268 | svchost.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
3980 | RUXIMICS.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
— | — | POST | 200 | 20.190.159.68:443 | https://login.live.com/RST2.srf | unknown | xml | 1.24 Kb | whitelisted |
— | — | POST | 200 | 40.126.31.129:443 | https://login.live.com/ppsecure/deviceaddcredential.srf | unknown | text | 16.7 Kb | whitelisted |
— | — | POST | 200 | 40.126.31.129:443 | https://login.live.com/RST2.srf | unknown | xml | 11.1 Kb | whitelisted |
— | — | POST | 200 | 20.190.160.17:443 | https://login.live.com/RST2.srf | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
1268 | svchost.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
5944 | MoUsoCoreWorker.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
3980 | RUXIMICS.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
5944 | MoUsoCoreWorker.exe | 23.53.40.176:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
1268 | svchost.exe | 23.53.40.176:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
3980 | RUXIMICS.exe | 23.53.40.176:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
5944 | MoUsoCoreWorker.exe | 184.30.21.171:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
1268 | svchost.exe | 184.30.21.171:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
login.live.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
nexusrules.officeapps.live.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
activation-v2.sls.microsoft.com |
| whitelisted |