| File name: | 25cfd6e6a9544990093566d5ea9d7205a60599bfda8c0f4d59fca31e58a7640b |
| Full analysis: | https://app.any.run/tasks/25ab645b-d141-4dca-816e-47ffef8ceed8 |
| Verdict: | Malicious activity |
| Threats: | The Arechclient2 malware is a sophisticated .NET-based Remote Access Trojan (RAT) that collects sensitive information, such as browser credentials, from infected computers. It employs various stealth techniques, including Base64 encoding to obscure its code and the ability to pause activities to evade automated security tools. The malware also can adjust Windows Defender settings and uses code injection to manipulate legitimate processes. |
| Analysis date: | April 25, 2025, 16:13:03 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, 6 sections |
| MD5: | 6A2B1D09F72B5B1C0AE2547041BAAFB4 |
| SHA1: | 646EAA9FF2313F6B6FBED9A4CF001ECBB54DD62E |
| SHA256: | 25CFD6E6A9544990093566D5EA9D7205A60599BFDA8C0F4D59FCA31E58A7640B |
| SSDEEP: | 98304:03BZ4VsmgXiClymg6sqtxu1J9bL4BqfMzEt6Y79KhRKKtsYAjr8iEQf4KnCYahLv:I |
| .exe | | | Win32 Executable MS Visual C++ (generic) (42.2) |
|---|---|---|
| .exe | | | Win64 Executable (generic) (37.3) |
| .dll | | | Win32 Dynamic Link Library (generic) (8.8) |
| .exe | | | Win32 Executable (generic) (6) |
| .exe | | | Generic Win/DOS Executable (2.7) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2012:02:24 19:20:04+00:00 |
| ImageFileCharacteristics: | Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 10 |
| CodeSize: | 29696 |
| InitializedDataSize: | 620544 |
| UninitializedDataSize: | 16896 |
| EntryPoint: | 0x38af |
| OSVersion: | 5 |
| ImageVersion: | 6 |
| SubsystemVersion: | 5 |
| Subsystem: | Windows GUI |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 668 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 896 | C:\WINDOWS\system32\SppExtComObj.exe -Embedding | C:\Windows\System32\SppExtComObj.Exe | — | svchost.exe | |||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: KMS Connection Broker Exit code: 0 Version: 10.0.19041.3996 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1128 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | UCPDMgr.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1276 | "C:\Users\admin\AppData\Local\Temp\25cfd6e6a9544990093566d5ea9d7205a60599bfda8c0f4d59fca31e58a7640b.exe" | C:\Users\admin\AppData\Local\Temp\25cfd6e6a9544990093566d5ea9d7205a60599bfda8c0f4d59fca31e58a7640b.exe | — | explorer.exe | |||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 1676 | "C:\Windows\System32\cmd.exe" /c copy Signup Signup.cmd && Signup.cmd | C:\Windows\SysWOW64\cmd.exe | 25cfd6e6a9544990093566d5ea9d7205a60599bfda8c0f4d59fca31e58a7640b.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 1 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2084 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | UCPDMgr.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2268 | "C:\WINDOWS\system32\UCPDMgr.exe" | C:\Windows\System32\UCPDMgr.exe | — | svchost.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: User Choice Protection Manager Exit code: 0 Version: 1.0.0.414301 Modules
| |||||||||||||||
| 2284 | findstr /I "wrsa opssvc" | C:\Windows\SysWOW64\findstr.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Find String (QGREP) Utility Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2288 | "C:\WINDOWS\system32\UCPDMgr.exe" | C:\Windows\System32\UCPDMgr.exe | — | svchost.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: User Choice Protection Manager Exit code: 0 Version: 1.0.0.414301 Modules
| |||||||||||||||
| 2504 | cmd /k echo [InternetShortcut] > "C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HealthPulse.url" & echo URL="C:\Users\admin\AppData\Local\WellnessPulse Solutions\HealthPulse.js" >> "C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\HealthPulse.url" & exit | C:\Windows\SysWOW64\cmd.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (4620) RegAsm.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32 |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
| (PID) Process: | (4620) RegAsm.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32 |
| Operation: | write | Name: | EnableAutoFileTracing |
Value: 0 | |||
| (PID) Process: | (4620) RegAsm.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32 |
| Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
| (PID) Process: | (4620) RegAsm.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32 |
| Operation: | write | Name: | FileTracingMask |
Value: | |||
| (PID) Process: | (4620) RegAsm.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32 |
| Operation: | write | Name: | ConsoleTracingMask |
Value: | |||
| (PID) Process: | (4620) RegAsm.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32 |
| Operation: | write | Name: | MaxFileSize |
Value: 1048576 | |||
| (PID) Process: | (4620) RegAsm.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASAPI32 |
| Operation: | write | Name: | FileDirectory |
Value: %windir%\tracing | |||
| (PID) Process: | (4620) RegAsm.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
| (PID) Process: | (4620) RegAsm.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS |
| Operation: | write | Name: | EnableAutoFileTracing |
Value: 0 | |||
| (PID) Process: | (4620) RegAsm.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RegAsm_RASMANCS |
| Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 1276 | 25cfd6e6a9544990093566d5ea9d7205a60599bfda8c0f4d59fca31e58a7640b.exe | C:\Users\admin\AppData\Local\Temp\Brain | binary | |
MD5:E00ED59F1A2F7375BCF0F5110BDA7978 | SHA256:E4B7B20BD65BDD086D23C96A805102C6C4851ED54A7856FEB755140C3CBAE196 | |||
| 1276 | 25cfd6e6a9544990093566d5ea9d7205a60599bfda8c0f4d59fca31e58a7640b.exe | C:\Users\admin\AppData\Local\Temp\Inventory | binary | |
MD5:3901643915A8A6C0F6A7446294C9D636 | SHA256:4496F4E8AE6BA3496267A86DA17DB5D35E6D911FE1697D0D6864D7EF564236C9 | |||
| 1276 | 25cfd6e6a9544990093566d5ea9d7205a60599bfda8c0f4d59fca31e58a7640b.exe | C:\Users\admin\AppData\Local\Temp\Memories | binary | |
MD5:2782C415CBC4318AEE91356FA12384D2 | SHA256:4BE11AEB3451EAC721AE915E57035AB3DFF718FFB618FF582A2E0B9FB20FA60D | |||
| 1276 | 25cfd6e6a9544990093566d5ea9d7205a60599bfda8c0f4d59fca31e58a7640b.exe | C:\Users\admin\AppData\Local\Temp\Rwanda | binary | |
MD5:ADB83BA926267F14F2E3138624397C49 | SHA256:446910A22E3B6048B3D03C8259EE8974D0E488B6D5BC5830AA7A8B29FC38B518 | |||
| 1276 | 25cfd6e6a9544990093566d5ea9d7205a60599bfda8c0f4d59fca31e58a7640b.exe | C:\Users\admin\AppData\Local\Temp\Restricted | binary | |
MD5:92D5E494D6269E376F03BE7CB07B802B | SHA256:AB1415CCC7CDF2EF69B688624D85976B4043542CE809DF9AFC8F535DE79CE221 | |||
| 1276 | 25cfd6e6a9544990093566d5ea9d7205a60599bfda8c0f4d59fca31e58a7640b.exe | C:\Users\admin\AppData\Local\Temp\Herald | binary | |
MD5:9E741FB6466BA51C5A8A1232D206B762 | SHA256:C81B026A504C5F9BC9627A6E5F8B7FB9BE20F02C94E32B20043325A9D51F4127 | |||
| 1276 | 25cfd6e6a9544990093566d5ea9d7205a60599bfda8c0f4d59fca31e58a7640b.exe | C:\Users\admin\AppData\Local\Temp\Advertiser | binary | |
MD5:67F27D8BCDAAAD824A7462AE16D852A7 | SHA256:7E463D5AF12370CFE559A01B1459EEE2545122F7204DEAE3A0D75F20E73F1D9D | |||
| 1276 | 25cfd6e6a9544990093566d5ea9d7205a60599bfda8c0f4d59fca31e58a7640b.exe | C:\Users\admin\AppData\Local\Temp\Reprints | binary | |
MD5:354D1E554BC5D9CCA25DAB9DA3407BB6 | SHA256:800B8D5418CC03A2918DAA4D4C73AF9364CE2DBE5DC64CF91EA99474D5ED8AD7 | |||
| 1276 | 25cfd6e6a9544990093566d5ea9d7205a60599bfda8c0f4d59fca31e58a7640b.exe | C:\Users\admin\AppData\Local\Temp\Silver | binary | |
MD5:88E0E870B99F5E5407B7D30D5530A749 | SHA256:2F0BC9DAC15396BAAD502CB0844573E51DB6D2BFAF2325F0166C04578A7DACD0 | |||
| 1276 | 25cfd6e6a9544990093566d5ea9d7205a60599bfda8c0f4d59fca31e58a7640b.exe | C:\Users\admin\AppData\Local\Temp\Cheats | binary | |
MD5:58DC7A0F3D9E1BE3FD7A7A9AE2CB15DE | SHA256:878D463A9A0458F3459533ABC4A225AC6BBA5371730BC76AA92421AB71B96E18 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2104 | svchost.exe | GET | 200 | 2.19.11.120:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
6544 | svchost.exe | GET | 200 | 184.30.131.245:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
2104 | svchost.exe | GET | 200 | 23.219.150.101:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
5360 | SIHClient.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
5360 | SIHClient.exe | GET | 200 | 184.30.21.171:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
— | — | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
2104 | svchost.exe | 2.19.11.120:80 | crl.microsoft.com | Elisa Oyj | NL | whitelisted |
2104 | svchost.exe | 23.219.150.101:80 | www.microsoft.com | AKAMAI-AS | CL | whitelisted |
— | — | 20.73.194.208:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
3216 | svchost.exe | 172.211.123.249:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | FR | whitelisted |
6544 | svchost.exe | 20.190.160.20:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
6544 | svchost.exe | 184.30.131.245:80 | ocsp.digicert.com | AKAMAI-AS | US | whitelisted |
2104 | svchost.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
uqDlTiUCyILSysyGbCWyxVsirR.uqDlTiUCyILSysyGbCWyxVsirR |
| unknown |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
2196 | svchost.exe | Not Suspicious Traffic | INFO [ANY.RUN] Online Pastebin Text Storage |