| File name: | 17edb24576d9cb6b918e5350ee23b247.exe |
| Full analysis: | https://app.any.run/tasks/69e8ea17-238a-47cf-aaf3-c54c194da173 |
| Verdict: | Malicious activity |
| Threats: | The Arechclient2 malware is a sophisticated .NET-based Remote Access Trojan (RAT) that collects sensitive information, such as browser credentials, from infected computers. It employs various stealth techniques, including Base64 encoding to obscure its code and the ability to pause activities to evade automated security tools. The malware also can adjust Windows Defender settings and uses code injection to manipulate legitimate processes. |
| Analysis date: | December 02, 2023, 16:35:24 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
| MD5: | 17EDB24576D9CB6B918E5350EE23B247 |
| SHA1: | E760F6EB130E71F73DC14CB7A3A16B25B8725087 |
| SHA256: | 46CD0D5190FCAD0DDF1FB2FD3A90004A95EFA1924DF70BD56DF8AFA685402458 |
| SSDEEP: | 98304:QQVDUIwLkheg+reasw6tAcDgEW1sAxmPuFyUONiwF53IIK4Sc6YhOHkIJF2Nlt2v:RSreasIand |
| .exe | | | Win32 Executable MS Visual C++ (generic) (42.2) |
|---|---|---|
| .exe | | | Win64 Executable (generic) (37.3) |
| .dll | | | Win32 Dynamic Link Library (generic) (8.8) |
| .exe | | | Win32 Executable (generic) (6) |
| .exe | | | Generic Win/DOS Executable (2.7) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2013:03:05 17:24:26+01:00 |
| ImageFileCharacteristics: | No relocs, Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 8 |
| CodeSize: | 704512 |
| InitializedDataSize: | 4505600 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x83be9 |
| OSVersion: | 4 |
| ImageVersion: | - |
| SubsystemVersion: | 4 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 4.0.0.0 |
| ProductVersionNumber: | 4.0.0.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Windows 32-bit |
| ObjectFileType: | Dynamic link library |
| FileSubtype: | - |
| LanguageCode: | English (U.S.) |
| CharacterSet: | Windows, Latin1 |
| CompanyName: | Netscape Communications Corporation |
| FileDescription: | Netscape 32-bit JavaScript Module |
| FileVersion: | 4 |
| InternalName: | JS3240 |
| LegalCopyright: | Copyright Netscape Communications. 1994-96 |
| LegalTrademarks: | Netscape, Mozilla |
| OriginalFileName: | js3240.dll |
| ProductName: | NETSCAPE |
| ProductVersion: | 4 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1208 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | cmd.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: MSBuild.exe Exit code: 0 Version: 4.8.3761.0 built by: NET48REL1 Modules
| |||||||||||||||
| 2604 | "C:\Users\admin\AppData\Local\Temp\17edb24576d9cb6b918e5350ee23b247.exe" | C:\Users\admin\AppData\Local\Temp\17edb24576d9cb6b918e5350ee23b247.exe | explorer.exe | ||||||||||||
User: admin Company: Netscape Communications Corporation Integrity Level: MEDIUM Description: Netscape 32-bit JavaScript Module Exit code: 0 Version: 4.0 Modules
| |||||||||||||||
| 2796 | C:\Windows\SysWOW64\cmd.exe | C:\Windows\SysWOW64\cmd.exe | vlc.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 2924 | C:\Users\admin\AppData\Roaming\PsiDemo\vlc.exe | C:\Users\admin\AppData\Roaming\PsiDemo\vlc.exe | — | explorer.exe | |||||||||||
User: admin Company: VideoLAN Integrity Level: MEDIUM Description: VLC media player Exit code: 1 Version: 3.0.20 Modules
| |||||||||||||||
| (PID) Process: | (2604) 17edb24576d9cb6b918e5350ee23b247.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings |
| Operation: | write | Name: | ProxyEnable |
Value: 0 | |||
| (PID) Process: | (2604) 17edb24576d9cb6b918e5350ee23b247.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections |
| Operation: | write | Name: | SavedLegacySettings |
Value: 46000000C1000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000 | |||
| (PID) Process: | (2604) 17edb24576d9cb6b918e5350ee23b247.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (2604) 17edb24576d9cb6b918e5350ee23b247.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
| (PID) Process: | (2604) 17edb24576d9cb6b918e5350ee23b247.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (2604) 17edb24576d9cb6b918e5350ee23b247.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (2604) 17edb24576d9cb6b918e5350ee23b247.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (2604) 17edb24576d9cb6b918e5350ee23b247.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (2604) 17edb24576d9cb6b918e5350ee23b247.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\15A\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2796 | cmd.exe | C:\Users\admin\AppData\Local\Temp\wqmecddgbecnrn | — | |
MD5:— | SHA256:— | |||
| 2604 | 17edb24576d9cb6b918e5350ee23b247.exe | C:\Users\admin\AppData\Roaming\Canon_Inc_IC\ServiceLog\AutoUpdateService\Canon_ACT_SERVICELOG_tmp.txt | text | |
MD5:ECAA88F7FA0BF610A5A26CF545DCD3AA | SHA256:F1945CD6C19E56B3C1C78943EF5EC18116907A4CA1EFC40A57D48AB1DB7ADFC5 | |||
| 1208 | MSBuild.exe | C:\Users\admin\AppData\Local\Temp\tmpAC96.tmp | binary | |
MD5:F8260F59C1D4AEEEE9112752955D2DBA | SHA256:CF30136A5C367EE357204A80FEA426DD4609E49731E8494F1D686770BB9A64B7 | |||
| 2604 | 17edb24576d9cb6b918e5350ee23b247.exe | C:\Users\admin\AppData\Roaming\PsiDemo\vlc.exe | executable | |
MD5:3740507A1DC4FF4CB5C6E52652C10C20 | SHA256:6A72CC8649A63B017844C4C1F3885A250D1A982FFE5F1E58B6F1432FE9198E62 | |||
| 2604 | 17edb24576d9cb6b918e5350ee23b247.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\K78MRVB5\wpa[1].css | text | |
MD5:9FF444EDE16923E0A817ECED59BCD359 | SHA256:6077F6A450CE22F0E0AF09852083ED263192DBAB7E9A7357A255A79279492665 | |||
| 2604 | 17edb24576d9cb6b918e5350ee23b247.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\K78MRVB5\wpa[2].css | text | |
MD5:9FF444EDE16923E0A817ECED59BCD359 | SHA256:6077F6A450CE22F0E0AF09852083ED263192DBAB7E9A7357A255A79279492665 | |||
| 1208 | MSBuild.exe | C:\Users\admin\AppData\Local\Temp\tmpAD23.tmp | binary | |
MD5:A37C32F6C48659B21D268A25398F1A5A | SHA256:D4EEA4FD10B2D27CC0BCF17DD0B4A905E73C26721C51D03A809A33A1AF2CE3B2 | |||
| 2604 | 17edb24576d9cb6b918e5350ee23b247.exe | C:\Users\admin\AppData\Roaming\PsiDemo\libvlccore.dll | executable | |
MD5:C756410864A4CA9B3BA468C7EBDAF698 | SHA256:856FC6E97C54B798EC1A0CB1363529E767DE9E1BCEDD43B1A8D02FEE79D467E4 | |||
| 2604 | 17edb24576d9cb6b918e5350ee23b247.exe | C:\Users\admin\AppData\Roaming\PsiDemo\bacilli.rar | binary | |
MD5:FB333D10401F78D8435C46D2DFAFACF7 | SHA256:5F4FE3BE05B418A586DA7D48FCAB55F4FFB6CB0E101F2A74FA78FE68D25FE39A | |||
| 2924 | vlc.exe | C:\Users\admin\AppData\Local\Temp\ded913db | binary | |
MD5:EF87DC3998EDA58414C0E943B353949A | SHA256:696F192AFF1C771ADE358AD7BDFF41F2E2E5AAE17849F66EAC712FC12CE74213 | |||
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
— | — | 224.0.0.252:5355 | — | — | — | unknown |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
1956 | svchost.exe | 239.255.255.250:1900 | — | — | — | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
324 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
2604 | 17edb24576d9cb6b918e5350ee23b247.exe | 195.8.197.17:443 | www.flitemedia.com | M247 Ltd | GB | unknown |
1208 | MSBuild.exe | 62.84.98.67:15647 | — | Contact Company, Ltd | RU | unknown |
Domain | IP | Reputation |
|---|---|---|
www.flitemedia.com |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
1208 | MSBuild.exe | Malware Command and Control Activity Detected | ET MALWARE Arechclient2 Backdoor CnC Init |