File name:

s1clubcollection.zip

Full analysis: https://app.any.run/tasks/8a992cff-7bba-4564-a75c-51629a9a5055
Verdict: Malicious activity
Threats:

The Arechclient2 malware is a sophisticated .NET-based Remote Access Trojan (RAT) that collects sensitive information, such as browser credentials, from infected computers. It employs various stealth techniques, including Base64 encoding to obscure its code and the ability to pause activities to evade automated security tools. The malware also can adjust Windows Defender settings and uses code injection to manipulate legitimate processes.

Analysis date: May 15, 2025, 12:48:26
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arch-exec
hijackloader
loader
arechclient2
backdoor
rat
stealer
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=deflate
MD5:

4DC4FC008AF4796E51493F17661AF0F4

SHA1:

838B6A0AAB28A898ED221A583FDE490CD25C1C97

SHA256:

16684A3A1A97573B9A9A1B60B268AB08561F70240283E3E68BC37B19542A5B18

SSDEEP:

98304:bijKt3WkTKSqBdQbu409FQk8UP3ZMd8+PbXAd1rMYX/Hvvmy8cBnCAsJweQfYZaA:FgPaITlhPN+r

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • C-Alp16.exe (PID: 7488)
      • C-Alp16.exe (PID: 7576)
      • XPFix.exe (PID: 8048)
    • Actions looks like stealing of personal data

      • UltrAnalyzer.exe (PID: 7952)
    • ARECHCLIENT2 has been detected (SURICATA)

      • UltrAnalyzer.exe (PID: 7952)
    • HIJACKLOADER has been detected (YARA)

      • C-Alp16.exe (PID: 7576)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • WinRAR.exe (PID: 6388)
      • C-Alp16.exe (PID: 7488)
    • Starts a Microsoft application from unusual location

      • C-Alp16.exe (PID: 7488)
    • Executable content was dropped or overwritten

      • C-Alp16.exe (PID: 7488)
      • C-Alp16.exe (PID: 7576)
    • The process drops C-runtime libraries

      • C-Alp16.exe (PID: 7488)
    • Starts itself from another location

      • C-Alp16.exe (PID: 7488)
    • Connects to unusual port

      • UltrAnalyzer.exe (PID: 7952)
  • INFO

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 6388)
    • The sample compiled with english language support

      • WinRAR.exe (PID: 6388)
      • C-Alp16.exe (PID: 7488)
      • C-Alp16.exe (PID: 7576)
    • Manual execution by a user

      • C-Alp16.exe (PID: 7488)
      • UltrAnalyzer.exe (PID: 8184)
    • Creates files in the program directory

      • C-Alp16.exe (PID: 7488)
    • Checks supported languages

      • C-Alp16.exe (PID: 7488)
      • C-Alp16.exe (PID: 7576)
      • UltrAnalyzer.exe (PID: 7952)
      • XPFix.exe (PID: 8048)
    • Reads the computer name

      • C-Alp16.exe (PID: 7488)
      • C-Alp16.exe (PID: 7576)
      • UltrAnalyzer.exe (PID: 7952)
      • XPFix.exe (PID: 8048)
    • Creates files or folders in the user directory

      • C-Alp16.exe (PID: 7576)
    • The sample compiled with chinese language support

      • C-Alp16.exe (PID: 7576)
    • Create files in a temporary directory

      • C-Alp16.exe (PID: 7576)
    • Reads the machine GUID from the registry

      • UltrAnalyzer.exe (PID: 7952)
    • Disables trace logs

      • UltrAnalyzer.exe (PID: 7952)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: Deflated
ZipModifyDate: 2025:05:09 12:48:20
ZipCRC: 0x13f005bd
ZipCompressedSize: 865889
ZipUncompressedSize: 2131296
ZipFileName: s1clubcollection\C-Alp16.exe
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
139
Monitored processes
12
Malicious processes
3
Suspicious processes
2

Behavior graph

Click at the process to see the details
start winrar.exe sppextcomobj.exe no specs slui.exe no specs rundll32.exe no specs c-alp16.exe #HIJACKLOADER c-alp16.exe #ARECHCLIENT2 ultranalyzer.exe conhost.exe no specs xpfix.exe no specs openwith.exe no specs ultranalyzer.exe no specs conhost.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
3192"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
5244\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeUltrAnalyzer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6388"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\s1clubcollection.zipC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
6516C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
7428C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
7488"C:\Users\admin\Desktop\s1clubcollection\C-Alp16.exe" C:\Users\admin\Desktop\s1clubcollection\C-Alp16.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft OneNote
Exit code:
0
Version:
14.0.4763.1000
Modules
Images
c:\users\admin\desktop\s1clubcollection\c-alp16.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
7576C:\ProgramData\daemondownloadjhw_x64\C-Alp16.exeC:\ProgramData\daemondownloadjhw_x64\C-Alp16.exe
C-Alp16.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft OneNote
Exit code:
0
Version:
14.0.4763.1000
Modules
Images
c:\programdata\daemondownloadjhw_x64\c-alp16.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
7952C:\Users\admin\AppData\Local\Temp\UltrAnalyzer.exeC:\Users\admin\AppData\Local\Temp\UltrAnalyzer.exe
C-Alp16.exe
User:
admin
Company:
Copyright В© 2018 R-Tools Technology Inc.
Integrity Level:
MEDIUM
Description:
RdrVmpUninstall32
Version:
1.0.0.1
Modules
Images
c:\users\admin\appdata\local\temp\efb14fd.tmp
c:\users\admin\appdata\local\temp\ultranalyzer.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
7996\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.exeUltrAnalyzer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
8048"C:\Users\admin\AppData\Local\daemondownloadjhw_x64\XPFix.exe" "C:\Users\admin\AppData\Local\daemondownloadjhw_x64\XPFix.exe" /updateC:\Users\admin\AppData\Local\daemondownloadjhw_x64\XPFix.exeC-Alp16.exe
User:
admin
Company:
360.cn
Integrity Level:
MEDIUM
Description:
360安全卫士 安全防护中心模块
Exit code:
0
Version:
1, 0, 0, 1013
Modules
Images
c:\windows\syswow64\input.dll
c:\users\admin\appdata\local\daemondownloadjhw_x64\xpfix.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
Total events
3 228
Read events
3 206
Write events
22
Delete events
0

Modification events

(PID) Process:(6388) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(6388) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(6388) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(6388) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\s1clubcollection.zip
(PID) Process:(6388) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(6388) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(6388) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(6388) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(7952) UltrAnalyzer.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(7952) UltrAnalyzer.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
Executable files
12
Suspicious files
5
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
7576C-Alp16.exeC:\Users\admin\AppData\Local\Temp\EFB14FD.tmp
MD5:
SHA256:
6388WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6388.13253\s1clubcollection\msvcr90.dllexecutable
MD5:ECBBED2F44AFB22BA1F9EF8603C261B5
SHA256:75613E14C26C84A21763CD315BDB3129C997F1C28DFBC3932379970901A22820
6388WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6388.13253\s1clubcollection\Pratshib.vibinary
MD5:448C6C7ADEB8423F653F46D2F8E8230D
SHA256:F6874AA83C9B5B2037453CD92EE7DB0855C89DC3AD9830842A1846001D260AB9
6388WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6388.13253\s1clubcollection\Crookmutmoung.pgvktext
MD5:D41CD0F49D17AA1B9DC0A30FD78FD25A
SHA256:B3AE50EA4B2A9A919E2603A63870414FD79A471510A8E30B391C9B38BC4216AC
7488C-Alp16.exeC:\ProgramData\daemondownloadjhw_x64\msvcp90.dllexecutable
MD5:6D4E6FDB62660D81A6D7CD0144FA8FA4
SHA256:44BD1A3F75E63AC9BB3C8A5B9C0D38FA75E730295E1F9C5414C2C8A5975375B3
7488C-Alp16.exeC:\ProgramData\daemondownloadjhw_x64\msvcr90.dllexecutable
MD5:ECBBED2F44AFB22BA1F9EF8603C261B5
SHA256:75613E14C26C84A21763CD315BDB3129C997F1C28DFBC3932379970901A22820
7488C-Alp16.exeC:\ProgramData\daemondownloadjhw_x64\Crookmutmoung.pgvktext
MD5:D41CD0F49D17AA1B9DC0A30FD78FD25A
SHA256:B3AE50EA4B2A9A919E2603A63870414FD79A471510A8E30B391C9B38BC4216AC
7576C-Alp16.exeC:\Users\admin\AppData\Local\Temp\EEF6F2.tmpbinary
MD5:546EB03AF9FF11348E06E9BF0019FCC6
SHA256:6D8FBFFF5ADBFDFB3C2A9D58B66A29CD29E37A9925AD13FBF7D36BDD46E00581
7576C-Alp16.exeC:\Users\admin\AppData\Local\daemondownloadjhw_x64\XPFix.exeexecutable
MD5:810D42177538AD5CA18D4DD597C00658
SHA256:5EC174AF8A18A5516B8A6E11D8A27481D70DF14D1EDB67C48B5458FF44DF9146
6388WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6388.13253\s1clubcollection\ONMAIN.DLLexecutable
MD5:702E8EB832E3831CADF42B4D725AF23F
SHA256:5678AA39BF8E3CE94B8A9C47623AE0900794BA9950C02D23E251099A3811BAC7
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
8
TCP/UDP connections
24
DNS requests
12
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
23.32.238.112:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
184.30.21.171:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
GET
200
23.32.238.112:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
7952
UltrAnalyzer.exe
GET
200
45.61.165.177:9000
http://45.61.165.177:9000/wbinjget?q=EF680CC9EFE0A8BCEC05D07897760CE8
unknown
malicious
7824
SIHClient.exe
GET
200
23.3.109.244:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
7824
SIHClient.exe
GET
200
23.3.109.244:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
2104
svchost.exe
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
40.127.240.158:443
MICROSOFT-CORP-MSN-AS-BLOCK
IE
unknown
5496
MoUsoCoreWorker.exe
23.32.238.112:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
23.32.238.112:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5496
MoUsoCoreWorker.exe
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
184.30.21.171:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
6544
svchost.exe
40.126.31.129:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 172.217.16.206
whitelisted
crl.microsoft.com
  • 23.32.238.112
  • 23.32.238.107
whitelisted
www.microsoft.com
  • 184.30.21.171
  • 23.3.109.244
whitelisted
login.live.com
  • 40.126.31.129
  • 40.126.31.128
  • 40.126.31.130
  • 40.126.31.131
  • 20.190.159.73
  • 20.190.159.64
  • 40.126.31.2
  • 40.126.31.73
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
settings-win.data.microsoft.com
  • 4.231.128.59
whitelisted
slscr.update.microsoft.com
  • 20.109.210.53
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.3.187.198
whitelisted

Threats

PID
Process
Class
Message
7952
UltrAnalyzer.exe
A Network Trojan was detected
ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET)
7952
UltrAnalyzer.exe
A Network Trojan was detected
ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M3 (GET)
No debug info