File name:

17edb24576d9cb6b918e5350ee23b247.exe

Full analysis: https://app.any.run/tasks/69e8ea17-238a-47cf-aaf3-c54c194da173
Verdict: Malicious activity
Threats:

The Arechclient2 malware is a sophisticated .NET-based Remote Access Trojan (RAT) that collects sensitive information, such as browser credentials, from infected computers. It employs various stealth techniques, including Base64 encoding to obscure its code and the ability to pause activities to evade automated security tools. The malware also can adjust Windows Defender settings and uses code injection to manipulate legitimate processes.

Analysis date: December 02, 2023, 16:35:24
OS: Windows 7 Professional Service Pack 1 (build: 7601, 64 bit)
Tags:
hijackloader
loader
arechclient2
backdoor
Indicators:
MIME: application/x-dosexec
File info: PE32 executable (GUI) Intel 80386, for MS Windows
MD5:

17EDB24576D9CB6B918E5350EE23B247

SHA1:

E760F6EB130E71F73DC14CB7A3A16B25B8725087

SHA256:

46CD0D5190FCAD0DDF1FB2FD3A90004A95EFA1924DF70BD56DF8AFA685402458

SSDEEP:

98304:QQVDUIwLkheg+reasw6tAcDgEW1sAxmPuFyUONiwF53IIK4Sc6YhOHkIJF2Nlt2v:RSreasIand

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Drops the executable file immediately after the start

      • 17edb24576d9cb6b918e5350ee23b247.exe (PID: 2604)
    • ARECHCLIENT2 has been detected (SURICATA)

      • MSBuild.exe (PID: 1208)
    • Connects to the CnC server

      • MSBuild.exe (PID: 1208)
    • HIJACKLOADER has been detected (YARA)

      • cmd.exe (PID: 2796)
    • Actions looks like stealing of personal data

      • MSBuild.exe (PID: 1208)
  • SUSPICIOUS

    • Reads the Internet Settings

      • 17edb24576d9cb6b918e5350ee23b247.exe (PID: 2604)
    • Reads security settings of Internet Explorer

      • 17edb24576d9cb6b918e5350ee23b247.exe (PID: 2604)
    • Checks Windows Trust Settings

      • 17edb24576d9cb6b918e5350ee23b247.exe (PID: 2604)
    • Reads settings of System Certificates

      • 17edb24576d9cb6b918e5350ee23b247.exe (PID: 2604)
    • Starts CMD.EXE for commands execution

      • vlc.exe (PID: 2924)
    • Connects to unusual port

      • MSBuild.exe (PID: 1208)
    • Searches for installed software

      • MSBuild.exe (PID: 1208)
    • Reads browser cookies

      • MSBuild.exe (PID: 1208)
  • INFO

    • Checks supported languages

      • 17edb24576d9cb6b918e5350ee23b247.exe (PID: 2604)
      • vlc.exe (PID: 2924)
      • MSBuild.exe (PID: 1208)
    • Checks proxy server information

      • 17edb24576d9cb6b918e5350ee23b247.exe (PID: 2604)
    • Creates files or folders in the user directory

      • 17edb24576d9cb6b918e5350ee23b247.exe (PID: 2604)
    • Reads the computer name

      • 17edb24576d9cb6b918e5350ee23b247.exe (PID: 2604)
      • vlc.exe (PID: 2924)
      • MSBuild.exe (PID: 1208)
    • Reads the machine GUID from the registry

      • 17edb24576d9cb6b918e5350ee23b247.exe (PID: 2604)
      • MSBuild.exe (PID: 1208)
    • Manual execution by a user

      • vlc.exe (PID: 2924)
    • Create files in a temporary directory

      • vlc.exe (PID: 2924)
      • MSBuild.exe (PID: 1208)
    • Reads Environment values

      • MSBuild.exe (PID: 1208)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.exe | Win32 Executable MS Visual C++ (generic) (42.2)
.exe | Win64 Executable (generic) (37.3)
.dll | Win32 Dynamic Link Library (generic) (8.8)
.exe | Win32 Executable (generic) (6)
.exe | Generic Win/DOS Executable (2.7)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2013:03:05 17:24:26+01:00
ImageFileCharacteristics: No relocs, Executable, 32-bit
PEType: PE32
LinkerVersion: 8
CodeSize: 704512
InitializedDataSize: 4505600
UninitializedDataSize: -
EntryPoint: 0x83be9
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 4.0.0.0
ProductVersionNumber: 4.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Windows 32-bit
ObjectFileType: Dynamic link library
FileSubtype: -
LanguageCode: English (U.S.)
CharacterSet: Windows, Latin1
CompanyName: Netscape Communications Corporation
FileDescription: Netscape 32-bit JavaScript Module
FileVersion: 4
InternalName: JS3240
LegalCopyright: Copyright Netscape Communications. 1994-96
LegalTrademarks: Netscape, Mozilla
OriginalFileName: js3240.dll
ProductName: NETSCAPE
ProductVersion: 4
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
37
Monitored processes
4
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start 17edb24576d9cb6b918e5350ee23b247.exe vlc.exe no specs #HIJACKLOADER cmd.exe no specs #ARECHCLIENT2 msbuild.exe

Process information

PID
CMD
Path
Indicators
Parent process
1208C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
MSBuild.exe
Exit code:
0
Version:
4.8.3761.0 built by: NET48REL1
Modules
Images
c:\windows\syswow64\mshtml.dll
c:\windows\microsoft.net\framework\v4.0.30319\msbuild.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
2604"C:\Users\admin\AppData\Local\Temp\17edb24576d9cb6b918e5350ee23b247.exe" C:\Users\admin\AppData\Local\Temp\17edb24576d9cb6b918e5350ee23b247.exe
explorer.exe
User:
admin
Company:
Netscape Communications Corporation
Integrity Level:
MEDIUM
Description:
Netscape 32-bit JavaScript Module
Exit code:
0
Version:
4.0
Modules
Images
c:\users\admin\appdata\local\temp\17edb24576d9cb6b918e5350ee23b247.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\kernelbase.dll
2796C:\Windows\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exe
vlc.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\system32\kernel32.dll
c:\windows\syswow64\kernel32.dll
c:\windows\system32\user32.dll
c:\windows\syswow64\kernelbase.dll
2924C:\Users\admin\AppData\Roaming\PsiDemo\vlc.exeC:\Users\admin\AppData\Roaming\PsiDemo\vlc.exeexplorer.exe
User:
admin
Company:
VideoLAN
Integrity Level:
MEDIUM
Description:
VLC media player
Exit code:
1
Version:
3.0.20
Modules
Images
c:\users\admin\appdata\roaming\psidemo\vlc.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\users\admin\appdata\roaming\psidemo\libvlc.dll
c:\users\admin\appdata\roaming\psidemo\libvlccore.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
Total events
1 440
Read events
1 423
Write events
17
Delete events
0

Modification events

(PID) Process:(2604) 17edb24576d9cb6b918e5350ee23b247.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings
Operation:writeName:ProxyEnable
Value:
0
(PID) Process:(2604) 17edb24576d9cb6b918e5350ee23b247.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections
Operation:writeName:SavedLegacySettings
Value:
46000000C1000000010000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000
(PID) Process:(2604) 17edb24576d9cb6b918e5350ee23b247.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies
Operation:writeName:CachePrefix
Value:
Cookie:
(PID) Process:(2604) 17edb24576d9cb6b918e5350ee23b247.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History
Operation:writeName:CachePrefix
Value:
Visited:
(PID) Process:(2604) 17edb24576d9cb6b918e5350ee23b247.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:ProxyBypass
Value:
1
(PID) Process:(2604) 17edb24576d9cb6b918e5350ee23b247.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:IntranetName
Value:
1
(PID) Process:(2604) 17edb24576d9cb6b918e5350ee23b247.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
1
(PID) Process:(2604) 17edb24576d9cb6b918e5350ee23b247.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:AutoDetect
Value:
0
(PID) Process:(2604) 17edb24576d9cb6b918e5350ee23b247.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\15A\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
Executable files
3
Suspicious files
4
Text files
3
Unknown types
0

Dropped files

PID
Process
Filename
Type
2796cmd.exeC:\Users\admin\AppData\Local\Temp\wqmecddgbecnrn
MD5:
SHA256:
260417edb24576d9cb6b918e5350ee23b247.exeC:\Users\admin\AppData\Roaming\Canon_Inc_IC\ServiceLog\AutoUpdateService\Canon_ACT_SERVICELOG_tmp.txttext
MD5:ECAA88F7FA0BF610A5A26CF545DCD3AA
SHA256:F1945CD6C19E56B3C1C78943EF5EC18116907A4CA1EFC40A57D48AB1DB7ADFC5
1208MSBuild.exeC:\Users\admin\AppData\Local\Temp\tmpAC96.tmpbinary
MD5:F8260F59C1D4AEEEE9112752955D2DBA
SHA256:CF30136A5C367EE357204A80FEA426DD4609E49731E8494F1D686770BB9A64B7
260417edb24576d9cb6b918e5350ee23b247.exeC:\Users\admin\AppData\Roaming\PsiDemo\vlc.exeexecutable
MD5:3740507A1DC4FF4CB5C6E52652C10C20
SHA256:6A72CC8649A63B017844C4C1F3885A250D1A982FFE5F1E58B6F1432FE9198E62
260417edb24576d9cb6b918e5350ee23b247.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\K78MRVB5\wpa[1].csstext
MD5:9FF444EDE16923E0A817ECED59BCD359
SHA256:6077F6A450CE22F0E0AF09852083ED263192DBAB7E9A7357A255A79279492665
260417edb24576d9cb6b918e5350ee23b247.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.IE5\K78MRVB5\wpa[2].csstext
MD5:9FF444EDE16923E0A817ECED59BCD359
SHA256:6077F6A450CE22F0E0AF09852083ED263192DBAB7E9A7357A255A79279492665
1208MSBuild.exeC:\Users\admin\AppData\Local\Temp\tmpAD23.tmpbinary
MD5:A37C32F6C48659B21D268A25398F1A5A
SHA256:D4EEA4FD10B2D27CC0BCF17DD0B4A905E73C26721C51D03A809A33A1AF2CE3B2
260417edb24576d9cb6b918e5350ee23b247.exeC:\Users\admin\AppData\Roaming\PsiDemo\libvlccore.dllexecutable
MD5:C756410864A4CA9B3BA468C7EBDAF698
SHA256:856FC6E97C54B798EC1A0CB1363529E767DE9E1BCEDD43B1A8D02FEE79D467E4
260417edb24576d9cb6b918e5350ee23b247.exeC:\Users\admin\AppData\Roaming\PsiDemo\bacilli.rarbinary
MD5:FB333D10401F78D8435C46D2DFAFACF7
SHA256:5F4FE3BE05B418A586DA7D48FCAB55F4FFB6CB0E101F2A74FA78FE68D25FE39A
2924vlc.exeC:\Users\admin\AppData\Local\Temp\ded913dbbinary
MD5:EF87DC3998EDA58414C0E943B353949A
SHA256:696F192AFF1C771ADE358AD7BDFF41F2E2E5AAE17849F66EAC712FC12CE74213
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
7
DNS requests
1
Threats
1

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
224.0.0.252:5355
unknown
4
System
192.168.100.255:137
whitelisted
1956
svchost.exe
239.255.255.250:1900
whitelisted
4
System
192.168.100.255:138
whitelisted
324
svchost.exe
224.0.0.252:5355
unknown
2604
17edb24576d9cb6b918e5350ee23b247.exe
195.8.197.17:443
www.flitemedia.com
M247 Ltd
GB
unknown
1208
MSBuild.exe
62.84.98.67:15647
Contact Company, Ltd
RU
unknown

DNS requests

Domain
IP
Reputation
www.flitemedia.com
  • 195.8.197.17
unknown

Threats

PID
Process
Class
Message
1208
MSBuild.exe
Malware Command and Control Activity Detected
ET MALWARE Arechclient2 Backdoor CnC Init
No debug info