File name:

SLAGGGLX.msi

Full analysis: https://app.any.run/tasks/4f78cf3a-6368-4997-8104-96523634bbc1
Verdict: Malicious activity
Threats:

The Arechclient2 malware is a sophisticated .NET-based Remote Access Trojan (RAT) that collects sensitive information, such as browser credentials, from infected computers. It employs various stealth techniques, including Base64 encoding to obscure its code and the ability to pause activities to evade automated security tools. The malware also can adjust Windows Defender settings and uses code injection to manipulate legitimate processes.

Analysis date: April 07, 2025, 12:23:45
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
generated-doc
auto
generic
stealer
xor-url
arechclient2
rat
backdoor
Indicators:
MIME: application/x-msi
File info: Composite Document File V2 Document, Little Endian, Os: Windows, Version 6.2, MSI Installer, Number of Characters: 0, Last Saved By: InstallShield, Number of Words: 0, Title: Installation Database, Comments: Contact: Your local administrator, Keywords: Installer,MSI,Database, Subject: Blank Project Template, Author: InstallShield, Security: 1, Number of Pages: 200, Name of Creating Application: InstallShield 2021 - Premier Edition with Virtualization Pack 27, Last Saved Time/Date: Tue Mar 4 17:47:31 2025, Create Time/Date: Tue Mar 4 17:47:31 2025, Last Printed: Tue Mar 4 17:47:31 2025, Revision Number: {37699457-8E5C-4E0E-8371-E73B1258678D}, Code page: 1252, Template: Intel;1033
MD5:

E1B11AB17B672DC15339A4EEA17D3BE7

SHA1:

7DD1111C168F544929CAF7E1BA8B2D790AA5CE77

SHA256:

7A79C311F24811999C14CEF556DA34F933DFD82B1A568B064034634941314369

SSDEEP:

98304:Y4ntEaeydvJVS5HB0dJV0c+Z0Sk6GWyW3/QXm7NR01qVKDdga/++dhImYbEhuGsK:cdC

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • GENERIC has been found (auto)

      • msiexec.exe (PID: 7872)
      • SplashWin.exe (PID: 2152)
    • Executing a file with an untrusted certificate

      • ISBEW64.exe (PID: 7976)
      • ISBEW64.exe (PID: 8020)
      • ISBEW64.exe (PID: 8056)
      • ISBEW64.exe (PID: 8096)
      • ISBEW64.exe (PID: 8156)
      • ISBEW64.exe (PID: 6272)
      • ISBEW64.exe (PID: 744)
      • ISBEW64.exe (PID: 2136)
      • ISBEW64.exe (PID: 7512)
      • ISBEW64.exe (PID: 7300)
    • ARECHCLIENT2 has been detected (YARA)

      • MSBuild.exe (PID: 7652)
    • XORed URL has been found (YARA)

      • MSBuild.exe (PID: 7652)
    • Actions looks like stealing of personal data

      • MSBuild.exe (PID: 7652)
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • msiexec.exe (PID: 7872)
      • SplashWin.exe (PID: 2152)
    • The process drops C-runtime libraries

      • msiexec.exe (PID: 7872)
      • SplashWin.exe (PID: 2152)
    • Starts CMD.EXE for commands execution

      • SplashWin.exe (PID: 812)
    • Executable content was dropped or overwritten

      • SplashWin.exe (PID: 2152)
    • Starts itself from another location

      • SplashWin.exe (PID: 2152)
    • Connects to unusual port

      • MSBuild.exe (PID: 7652)
  • INFO

    • Reads the computer name

      • msiexec.exe (PID: 7828)
      • msiexec.exe (PID: 7872)
      • ISBEW64.exe (PID: 7976)
      • ISBEW64.exe (PID: 8020)
      • ISBEW64.exe (PID: 8056)
      • ISBEW64.exe (PID: 8096)
      • ISBEW64.exe (PID: 8156)
      • ISBEW64.exe (PID: 6272)
      • ISBEW64.exe (PID: 744)
      • ISBEW64.exe (PID: 2136)
      • SplashWin.exe (PID: 2152)
      • MSBuild.exe (PID: 7652)
      • SplashWin.exe (PID: 812)
      • ISBEW64.exe (PID: 7512)
      • ISBEW64.exe (PID: 7300)
    • An automatically generated document

      • msiexec.exe (PID: 7776)
    • Checks supported languages

      • msiexec.exe (PID: 7872)
      • msiexec.exe (PID: 7828)
      • ISBEW64.exe (PID: 7976)
      • ISBEW64.exe (PID: 8020)
      • ISBEW64.exe (PID: 8056)
      • ISBEW64.exe (PID: 8096)
      • ISBEW64.exe (PID: 6272)
      • ISBEW64.exe (PID: 8156)
      • ISBEW64.exe (PID: 744)
      • ISBEW64.exe (PID: 2136)
      • ISBEW64.exe (PID: 7300)
      • SplashWin.exe (PID: 2152)
      • SplashWin.exe (PID: 812)
      • ISBEW64.exe (PID: 7512)
      • MSBuild.exe (PID: 7652)
    • Executable content was dropped or overwritten

      • msiexec.exe (PID: 7776)
      • msiexec.exe (PID: 7872)
    • The sample compiled with english language support

      • msiexec.exe (PID: 7872)
      • msiexec.exe (PID: 7776)
      • SplashWin.exe (PID: 2152)
    • Create files in a temporary directory

      • msiexec.exe (PID: 7872)
      • SplashWin.exe (PID: 812)
    • Creates files or folders in the user directory

      • SplashWin.exe (PID: 2152)
    • Checks proxy server information

      • slui.exe (PID: 1244)
    • Reads the machine GUID from the registry

      • MSBuild.exe (PID: 7652)
    • Reads the software policy settings

      • slui.exe (PID: 1244)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

xor-url

(PID) Process(7652) MSBuild.exe
Decrypted-URLs (3)http://dl.google.com/chrome/install/375.126/chrome_installer.exeB
https://github.com
https://pastebin.com/raw/UPxYyFp8
No Malware configuration.

TRiD

.mst | Windows SDK Setup Transform Script (60.2)
.msi | Microsoft Installer (100)

EXIF

FlashPix

Characters: -
LastModifiedBy: InstallShield
Words: -
Title: Installation Database
Comments: Contact: Your local administrator
Keywords: Installer,MSI,Database
Subject: Blank Project Template
Author: InstallShield
Security: Password protected
Pages: 200
Software: InstallShield? 2021 - Premier Edition with Virtualization Pack 27
ModifyDate: 2025:03:04 17:47:31
CreateDate: 2025:03:04 17:47:31
LastPrinted: 2025:03:04 17:47:31
RevisionNumber: {37699457-8E5C-4E0E-8371-E73B1258678D}
CodePage: Windows Latin 1 (Western European)
Template: Intel;1033
No data.
screenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
147
Monitored processes
19
Malicious processes
6
Suspicious processes
10

Behavior graph

Click at the process to see the details
start msiexec.exe msiexec.exe no specs #GENERIC msiexec.exe isbew64.exe no specs isbew64.exe no specs isbew64.exe no specs isbew64.exe no specs isbew64.exe no specs isbew64.exe no specs isbew64.exe no specs isbew64.exe no specs isbew64.exe no specs isbew64.exe no specs #GENERIC splashwin.exe splashwin.exe no specs cmd.exe no specs conhost.exe no specs #XOR-URL msbuild.exe slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
744C:\Users\admin\AppData\Local\Temp\{F1611B99-BF50-4F2B-BB7E-720F113622F3}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{2FD58BF4-E5AD-4997-8C7A-BB7E514D5FE2}C:\Users\admin\AppData\Local\Temp\{F1611B99-BF50-4F2B-BB7E-720F113622F3}\ISBEW64.exemsiexec.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\{f1611b99-bf50-4f2b-bb7e-720f113622f3}\isbew64.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
812C:\Users\admin\AppData\Roaming\Protectchrome_beta\SplashWin.exeC:\Users\admin\AppData\Roaming\Protectchrome_beta\SplashWin.exeSplashWin.exe
User:
admin
Company:
AOMEI International Network Limited
Integrity Level:
MEDIUM
Description:
Splash Window
Exit code:
1
Version:
4.0.0.0
Modules
Images
c:\users\admin\appdata\roaming\protectchrome_beta\splashwin.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
1244C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
2136C:\Users\admin\AppData\Local\Temp\{F1611B99-BF50-4F2B-BB7E-720F113622F3}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{A74EA3C2-EE01-43E6-A0CD-4833885BA221}C:\Users\admin\AppData\Local\Temp\{F1611B99-BF50-4F2B-BB7E-720F113622F3}\ISBEW64.exemsiexec.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\{f1611b99-bf50-4f2b-bb7e-720f113622f3}\isbew64.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
2152C:\Users\admin\AppData\Local\Temp\{863FABF4-DA7E-4BC5-89EA-A2CAC9E6821B}\SplashWin.exe C:\Users\admin\AppData\Local\Temp\{863FABF4-DA7E-4BC5-89EA-A2CAC9E6821B}\SplashWin.exe
msiexec.exe
User:
admin
Company:
AOMEI International Network Limited
Integrity Level:
MEDIUM
Description:
Splash Window
Exit code:
0
Version:
4.0.0.0
Modules
Images
c:\users\admin\appdata\local\temp\{863fabf4-da7e-4bc5-89ea-a2cac9e6821b}\splashwin.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\user32.dll
4688C:\WINDOWS\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exeSplashWin.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\msvcrt.dll
c:\windows\syswow64\combase.dll
5056\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
6272C:\Users\admin\AppData\Local\Temp\{F1611B99-BF50-4F2B-BB7E-720F113622F3}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{3400DE79-A8AD-4926-9110-98F3D9AB5B27}C:\Users\admin\AppData\Local\Temp\{F1611B99-BF50-4F2B-BB7E-720F113622F3}\ISBEW64.exemsiexec.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\{f1611b99-bf50-4f2b-bb7e-720f113622f3}\isbew64.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
7300C:\Users\admin\AppData\Local\Temp\{F1611B99-BF50-4F2B-BB7E-720F113622F3}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{E41CBDEC-B621-4EED-856F-2B76C40B0FAF}C:\Users\admin\AppData\Local\Temp\{F1611B99-BF50-4F2B-BB7E-720F113622F3}\ISBEW64.exemsiexec.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\{f1611b99-bf50-4f2b-bb7e-720f113622f3}\isbew64.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
7512C:\Users\admin\AppData\Local\Temp\{F1611B99-BF50-4F2B-BB7E-720F113622F3}\ISBEW64.exe {EFB7539B-24F3-46B6-AF6E-3B021B51EFEF}:{E5F285DA-8E3D-4A00-A91B-73911F6B7CE0}C:\Users\admin\AppData\Local\Temp\{F1611B99-BF50-4F2B-BB7E-720F113622F3}\ISBEW64.exemsiexec.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\appdata\local\temp\{f1611b99-bf50-4f2b-bb7e-720f113622f3}\isbew64.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
Total events
5 224
Read events
5 224
Write events
0
Delete events
0

Modification events

No data
Executable files
14
Suspicious files
7
Text files
1
Unknown types
0

Dropped files

PID
Process
Filename
Type
7872msiexec.exeC:\Users\admin\AppData\Local\Temp\{863FABF4-DA7E-4BC5-89EA-A2CAC9E6821B}\msvcp140.dllexecutable
MD5:E9F00DD8746712610706CBEFFD8DF0BD
SHA256:4CB882621A3D1C6283570447F842801B396DB1B3DCD2E01C2F7002EFD66A0A97
7872msiexec.exeC:\Users\admin\AppData\Local\Temp\{863FABF4-DA7E-4BC5-89EA-A2CAC9E6821B}\diorama.jsonbinary
MD5:61947293ABC79F5E003AC42D9B7489F4
SHA256:57414BDA77D468F6573672AAA7B1B68E38AE511AB5BE187C227232A054C257BB
7872msiexec.exeC:\Users\admin\AppData\Local\Temp\{863FABF4-DA7E-4BC5-89EA-A2CAC9E6821B}\DuiLib_u.dllexecutable
MD5:83495E5DB2654BCEC3948EE486424599
SHA256:C1443C6CEA1D5FD8C3064D00F12C87FAE4B6670FB62D28F1969FB25C6DEDF6A6
4688cmd.exeC:\Users\admin\AppData\Local\Temp\ijbfjwbyh
MD5:
SHA256:
7872msiexec.exeC:\Users\admin\AppData\Local\Temp\{863FABF4-DA7E-4BC5-89EA-A2CAC9E6821B}\SplashWin.exeexecutable
MD5:4D20B83562EEC3660E45027AD56FB444
SHA256:C5E650B331FA5292872FDAEDE3A75C8167A0F1280CE0CD3D58B880D23854BDB1
7872msiexec.exeC:\Users\admin\AppData\Local\Temp\{863FABF4-DA7E-4BC5-89EA-A2CAC9E6821B}\vcruntime140.dllexecutable
MD5:A554E4F1ADDC0C2C4EBB93D66B790796
SHA256:E610CDAC0A37147919032D0D723B967276C217FF06EA402F098696AB4112512A
7872msiexec.exeC:\Users\admin\AppData\Local\Temp\{F1611B99-BF50-4F2B-BB7E-720F113622F3}\setup.inxbinary
MD5:03628D8AF0094F0B6573CDCFCDDBE971
SHA256:8EA0A646E6036DA1612E5D6BB7F841D473BBD212D4F417BC8646D697EFBA5A87
2152SplashWin.exeC:\Users\admin\AppData\Roaming\Protectchrome_beta\msvcp140.dllexecutable
MD5:E9F00DD8746712610706CBEFFD8DF0BD
SHA256:4CB882621A3D1C6283570447F842801B396DB1B3DCD2E01C2F7002EFD66A0A97
7872msiexec.exeC:\Users\admin\AppData\Local\Temp\{F1611B99-BF50-4F2B-BB7E-720F113622F3}\_isres_0x0409.dllexecutable
MD5:7DE024BC275F9CDEAF66A865E6FD8E58
SHA256:BD32468EE7E8885323F22EABBFF9763A0F6FFEF3CC151E0BD0481DF5888F4152
2152SplashWin.exeC:\Users\admin\AppData\Roaming\Protectchrome_beta\SplashWin.exeexecutable
MD5:4D20B83562EEC3660E45027AD56FB444
SHA256:C5E650B331FA5292872FDAEDE3A75C8167A0F1280CE0CD3D58B880D23854BDB1
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
3
TCP/UDP connections
20
DNS requests
6
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2104
svchost.exe
GET
200
23.216.77.29:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
POST
500
20.83.72.98:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
unknown
xml
512 b
whitelisted
POST
500
20.83.72.98:443
https://activation-v2.sls.microsoft.com/SLActivateProduct/SLActivateProduct.asmx?configextension=Retail
unknown
xml
512 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
2104
svchost.exe
23.216.77.29:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
5496
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2112
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
2104
svchost.exe
40.127.240.158:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3812
svchost.exe
239.255.255.250:1900
whitelisted
7652
MSBuild.exe
92.255.85.23:15847
Chang Way Technologies Co. Limited
HK
malicious
7456
slui.exe
40.91.76.224:443
activation-v2.sls.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 40.127.240.158
whitelisted
google.com
  • 142.250.185.206
whitelisted
crl.microsoft.com
  • 23.216.77.29
  • 23.216.77.37
  • 23.216.77.30
  • 23.216.77.19
  • 23.216.77.25
  • 23.216.77.39
  • 23.216.77.41
  • 23.216.77.13
  • 23.216.77.21
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted

Threats

PID
Process
Class
Message
7652
MSBuild.exe
Misc Attack
ET DROP Spamhaus DROP Listed Traffic Inbound group 13
No debug info