File name:

bestmoments.zip

Full analysis: https://app.any.run/tasks/5de6668b-7f12-41d9-8d9b-72870738d0e1
Verdict: Malicious activity
Threats:

The Arechclient2 malware is a sophisticated .NET-based Remote Access Trojan (RAT) that collects sensitive information, such as browser credentials, from infected computers. It employs various stealth techniques, including Base64 encoding to obscure its code and the ability to pause activities to evade automated security tools. The malware also can adjust Windows Defender settings and uses code injection to manipulate legitimate processes.

Analysis date: April 29, 2025, 16:02:28
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
python
rat
arechclient2
backdoor
hijackloader
loader
delphi
stealer
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=store
MD5:

8998E2C91F2F6CA503B0D88764B5A2A8

SHA1:

E6E7320AAB9C9DA8F283847379FD336FE6ECB408

SHA256:

29E29CB0091E183D99C786AAE809498506C8584D14B3F582AB79F5FE12851895

SSDEEP:

98304:NzqyLskNl1PukpDZQYFfgByoVNq12NO43ZItefnRTieb5SoKm7EB8ZdL5zBJGgkT:1Z0jV25uJ9u

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • MSService.exe (PID: 2088)
    • HIJACKLOADER has been detected (YARA)

      • Quantum-Validato.exe (PID: 4040)
    • Actions looks like stealing of personal data

      • MSService.exe (PID: 2088)
    • ARECHCLIENT2 has been detected (SURICATA)

      • MSService.exe (PID: 2088)
  • SUSPICIOUS

    • The process drops C-runtime libraries

      • WinRAR.exe (PID: 6640)
      • Quantum-Validato.exe (PID: 4920)
    • Process drops legitimate windows executable

      • WinRAR.exe (PID: 6640)
      • Quantum-Validato.exe (PID: 4920)
    • Reads security settings of Internet Explorer

      • WinRAR.exe (PID: 6640)
    • Executable content was dropped or overwritten

      • Quantum-Validato.exe (PID: 4920)
      • Quantum-Validato.exe (PID: 4040)
    • Starts itself from another location

      • Quantum-Validato.exe (PID: 4920)
    • Connects to unusual port

      • MSService.exe (PID: 2088)
  • INFO

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 6640)
    • Checks supported languages

      • Quantum-Validato.exe (PID: 4920)
      • Quantum-Validato.exe (PID: 4040)
      • MSService.exe (PID: 2088)
      • 360Tray.exe (PID: 2100)
    • The sample compiled with english language support

      • WinRAR.exe (PID: 6640)
      • Quantum-Validato.exe (PID: 4920)
      • Quantum-Validato.exe (PID: 4040)
    • Creates files in the program directory

      • Quantum-Validato.exe (PID: 4920)
    • Python executable

      • Quantum-Validato.exe (PID: 4920)
      • Quantum-Validato.exe (PID: 4040)
    • Reads the computer name

      • Quantum-Validato.exe (PID: 4920)
      • Quantum-Validato.exe (PID: 4040)
      • MSService.exe (PID: 2088)
      • 360Tray.exe (PID: 2100)
    • The sample compiled with chinese language support

      • Quantum-Validato.exe (PID: 4040)
    • Create files in a temporary directory

      • Quantum-Validato.exe (PID: 4040)
      • 360Tray.exe (PID: 2100)
    • Compiled with Borland Delphi (YARA)

      • Quantum-Validato.exe (PID: 4040)
    • Reads the machine GUID from the registry

      • MSService.exe (PID: 2088)
    • Disables trace logs

      • MSService.exe (PID: 2088)
    • Checks proxy server information

      • MSService.exe (PID: 2088)
    • Creates files or folders in the user directory

      • Quantum-Validato.exe (PID: 4040)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: None
ZipModifyDate: 2025:04:29 08:03:38
ZipCRC: 0x00000000
ZipCompressedSize: -
ZipUncompressedSize: -
ZipFileName: buzlighter/
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
135
Monitored processes
8
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe sppextcomobj.exe no specs slui.exe no specs quantum-validato.exe #HIJACKLOADER quantum-validato.exe #ARECHCLIENT2 msservice.exe rundll32.exe no specs 360tray.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
516C:\WINDOWS\system32\SppExtComObj.exe -EmbeddingC:\Windows\System32\SppExtComObj.Exesvchost.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
KMS Connection Broker
Version:
10.0.19041.3996 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\sppextcomobj.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\oleaut32.dll
2088C:\Users\admin\AppData\Local\Temp\MSService.exeC:\Users\admin\AppData\Local\Temp\MSService.exe
Quantum-Validato.exe
User:
admin
Company:
Greatis Software
Integrity Level:
MEDIUM
Description:
On-line Multi AV Tool
Version:
14.20.2022.927
Modules
Images
c:\users\admin\appdata\local\temp\ee1f6c7.tmp
c:\users\admin\appdata\local\temp\msservice.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
2100"C:\Users\admin\AppData\Roaming\Jh_ctrl\360Tray.exe" "C:\Users\admin\AppData\Roaming\Jh_ctrl\360Tray.exe" /onuiC:\Users\admin\AppData\Roaming\Jh_ctrl\360Tray.exeQuantum-Validato.exe
User:
admin
Company:
360.cn
Integrity Level:
MEDIUM
Description:
360安全卫士 安全防护中心模块
Exit code:
0
Version:
12, 0, 0, 1761
Modules
Images
c:\windows\syswow64\input.dll
c:\users\admin\appdata\roaming\jh_ctrl\360tray.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
4040C:\ProgramData\Jh_ctrl\Quantum-Validato.exeC:\ProgramData\Jh_ctrl\Quantum-Validato.exe
Quantum-Validato.exe
User:
admin
Company:
Python Software Foundation
Integrity Level:
MEDIUM
Description:
Python
Exit code:
0
Version:
3.11.3
Modules
Images
c:\programdata\jh_ctrl\quantum-validato.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\programdata\jh_ctrl\vcruntime140.dll
c:\programdata\jh_ctrl\python311.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
4920"C:\Users\admin\AppData\Local\Temp\Rar$EXa6640.37339\buzlighter\Quantum-Validato.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa6640.37339\buzlighter\Quantum-Validato.exe
WinRAR.exe
User:
admin
Company:
Python Software Foundation
Integrity Level:
MEDIUM
Description:
Python
Exit code:
0
Version:
3.11.3
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa6640.37339\buzlighter\quantum-validato.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\users\admin\appdata\local\temp\rar$exa6640.37339\buzlighter\vcruntime140.dll
c:\users\admin\appdata\local\temp\rar$exa6640.37339\buzlighter\python311.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\version.dll
5024"C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEventC:\Windows\System32\slui.exeSppExtComObj.Exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Windows Activation Client
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
6640"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\bestmoments.zipC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
7084C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
Total events
3 543
Read events
3 521
Write events
22
Delete events
0

Modification events

(PID) Process:(6640) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(6640) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(6640) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(6640) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\bestmoments.zip
(PID) Process:(6640) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(6640) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(6640) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(6640) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(2088) MSService.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(2088) MSService.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
Executable files
8
Suspicious files
7
Text files
0
Unknown types
1

Dropped files

PID
Process
Filename
Type
4040Quantum-Validato.exeC:\Users\admin\AppData\Local\Temp\EE1F6C7.tmp
MD5:
SHA256:
6640WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa6640.37339\buzlighter\python311.dllexecutable
MD5:044FD2D6856839B1AEE58E61F535E76B
SHA256:91F00E166CCDF6FE44A8A742628E2F8DDC5D41A7608A4842E38F5DD10EF478B6
6640WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa6640.37339\buzlighter\Krangcroongvies.vuabr
MD5:BDCF8E5CEA3E7E341295040E9FCD08CA
SHA256:8CC1ED809FC362C02D86908C7B5E68E29DE1FCC1814592CC6810FBA8181475D5
4920Quantum-Validato.exeC:\ProgramData\Jh_ctrl\python311.dllexecutable
MD5:044FD2D6856839B1AEE58E61F535E76B
SHA256:91F00E166CCDF6FE44A8A742628E2F8DDC5D41A7608A4842E38F5DD10EF478B6
6640WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa6640.37339\buzlighter\Quantum-Validato.exeexecutable
MD5:9F12BA143F629152084C17C9CB9DC148
SHA256:24385D352B83222DC5AB92FA57B6649854ECD74DE378E279D8AC20A0B3B16009
6640WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$EXa6640.37339\buzlighter\vcruntime140.dllexecutable
MD5:4585A96CC4EEF6AAFD5E27EA09147DC6
SHA256:A8F950B4357EC12CFCCDDC9094CCA56A3D5244B95E09EA6E9A746489F2D58736
2100360Tray.exeC:\Users\admin\AppData\Local\Temp\F3354E3.tmpbinary
MD5:F0601E53A553AD477BA58088FCB74CD7
SHA256:1963D2714AEC766244FD0C07E4E1E54772EA6CECFCE40BC468C96D087EE2961E
4040Quantum-Validato.exeC:\Users\admin\AppData\Local\Temp\MSService.exeexecutable
MD5:B056EC5433AA657C1990A349F395D1ED
SHA256:963213761EE719F8229E76D92CEB4E9E2EB70C573966E923C34C926612DB8DF7
4920Quantum-Validato.exeC:\ProgramData\Jh_ctrl\Krangcroongvies.vubinary
MD5:BDCF8E5CEA3E7E341295040E9FCD08CA
SHA256:8CC1ED809FC362C02D86908C7B5E68E29DE1FCC1814592CC6810FBA8181475D5
4920Quantum-Validato.exeC:\ProgramData\Jh_ctrl\Briecksoudchaib.uhpvbinary
MD5:613D00E892D97C3814F722E368517B68
SHA256:71C81AD78BE02601F5A22D54012E9B653E2A235C6CA381EC6206D93581AEC518
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
6
TCP/UDP connections
21
DNS requests
13
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
5496
MoUsoCoreWorker.exe
GET
200
2.19.11.120:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
5496
MoUsoCoreWorker.exe
GET
200
23.219.150.101:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
6544
svchost.exe
GET
200
2.23.77.188:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
2088
MSService.exe
GET
200
107.189.19.196:9000
http://107.189.19.196:9000/wbinjget?q=EF680CC9EFE0A8BCEC05D07897760CE8
unknown
unknown
5344
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
5344
SIHClient.exe
GET
200
23.35.229.160:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5496
MoUsoCoreWorker.exe
2.19.11.120:80
crl.microsoft.com
Elisa Oyj
NL
whitelisted
5496
MoUsoCoreWorker.exe
23.219.150.101:80
www.microsoft.com
AKAMAI-AS
CL
whitelisted
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
3216
svchost.exe
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
FR
whitelisted
6544
svchost.exe
40.126.31.129:443
login.live.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
6544
svchost.exe
2.23.77.188:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
2104
svchost.exe
20.73.194.208:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
5344
SIHClient.exe
52.149.20.212:443
slscr.update.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 20.73.194.208
whitelisted
crl.microsoft.com
  • 2.19.11.120
  • 2.19.11.105
whitelisted
www.microsoft.com
  • 23.219.150.101
  • 23.35.229.160
whitelisted
google.com
  • 142.250.185.110
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
login.live.com
  • 40.126.31.129
  • 20.190.159.131
  • 20.190.159.64
  • 40.126.31.3
  • 40.126.31.67
  • 20.190.159.23
  • 40.126.31.0
  • 20.190.159.2
whitelisted
ocsp.digicert.com
  • 2.23.77.188
whitelisted
slscr.update.microsoft.com
  • 52.149.20.212
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 20.3.187.198
whitelisted

Threats

PID
Process
Class
Message
2088
MSService.exe
A Network Trojan was detected
ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET)
2088
MSService.exe
A Network Trojan was detected
ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M3 (GET)
No debug info