| File name: | 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.exe |
| Full analysis: | https://app.any.run/tasks/791132a4-a45b-41bb-a84c-b97e854fbcb7 |
| Verdict: | Malicious activity |
| Threats: | The Arechclient2 malware is a sophisticated .NET-based Remote Access Trojan (RAT) that collects sensitive information, such as browser credentials, from infected computers. It employs various stealth techniques, including Base64 encoding to obscure its code and the ability to pause activities to evade automated security tools. The malware also can adjust Windows Defender settings and uses code injection to manipulate legitimate processes. |
| Analysis date: | January 13, 2025, 18:12:27 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, 11 sections |
| MD5: | 9324C48EADF64B3C9C3BE1724808D47D |
| SHA1: | B6F35CD27E57B39D9F25A86DD980FE44FD7576AF |
| SHA256: | 7C9DE4E346A8EFE69569337C623CBDE71ABF0E9E4E8C83E9A45A20181E0F3951 |
| SSDEEP: | 98304:Arq3BdwzqDtKbVWDPp4cAURVr/A1Hle9UvJL9GDturqbPdfcAa/1XiFds+oP3jSs:Y2deqO6Oh1T |
| .exe | | | Inno Setup installer (53.5) |
|---|---|---|
| .exe | | | InstallShield setup (21) |
| .exe | | | Win32 EXE PECompact compressed (generic) (20.2) |
| .exe | | | Win32 Executable (generic) (2.1) |
| .exe | | | Win16/32 Executable Delphi generic (1) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2024:07:12 07:26:53+00:00 |
| ImageFileCharacteristics: | Executable, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 2.25 |
| CodeSize: | 685056 |
| InitializedDataSize: | 159744 |
| UninitializedDataSize: | - |
| EntryPoint: | 0xa83bc |
| OSVersion: | 6.1 |
| ImageVersion: | - |
| SubsystemVersion: | 6.1 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 2.5.0.0 |
| ProductVersionNumber: | 2.5.0.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Neutral |
| CharacterSet: | Unicode |
| Comments: | This installation was built with Inno Setup. |
| CompanyName: | Bada Technology Co., Ltd |
| FileDescription: | Macrorit Partition Extender |
| FileVersion: | 2.5.0.0 |
| LegalCopyright: | Copyright © 2013-2024 Macrorit. |
| OriginalFileName: | Partition.exe |
| ProductName: | Dokan Library 1.4.1.1000 Bundle |
| ProductVersion: | 2.5.0.0 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 128 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 128 | find /I "sophoshealth.exe" | C:\Windows\System32\find.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Find String (grep) Utility Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 716 | "cmd.exe" /C tasklist /FI "IMAGENAME eq sophoshealth.exe" /FO CSV /NH | find /I "sophoshealth.exe" | C:\Windows\System32\cmd.exe | — | 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 936 | "C:\Users\admin\Desktop\7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.exe" /VERYSILENT | C:\Users\admin\Desktop\7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.exe | 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmp | ||||||||||||
User: admin Company: Bada Technology Co., Ltd Integrity Level: MEDIUM Description: Macrorit Partition Extender Exit code: 0 Version: 2.5.0.0 Modules
| |||||||||||||||
| 2084 | "cmd.exe" /C tasklist /FI "IMAGENAME eq opssvc.exe" /FO CSV /NH | find /I "opssvc.exe" | C:\Windows\System32\cmd.exe | — | 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmp | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2324 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2672 | find /I "nswscsvc.exe" | C:\Windows\System32\find.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Find String (grep) Utility Exit code: 1 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2828 | tasklist /FI "IMAGENAME eq opssvc.exe" /FO CSV /NH | C:\Windows\System32\tasklist.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Lists the current running tasks Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2972 | C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | electronics.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: MSBuild.exe Version: 4.8.9037.0 built by: NET481REL1 Modules
xor-url(PID) Process(2972) MSBuild.exe Decrypted-URLs (3)http://dl.google.com/chrome/install/375.126/chrome_installer.exe https://github.com https://pastebin.com/raw/eB8bmiVA | |||||||||||||||
| 3080 | tasklist /FI "IMAGENAME eq nswscsvc.exe" /FO CSV /NH | C:\Windows\System32\tasklist.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Lists the current running tasks Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (5256) electronics.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce |
| Operation: | write | Name: | afhfcca |
Value: "C:\ddffhkh\AutoIt3.exe" C:\ddffhkh\afhfcca.a3x | |||
| (PID) Process: | (2972) MSBuild.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32 |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
| (PID) Process: | (2972) MSBuild.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32 |
| Operation: | write | Name: | EnableAutoFileTracing |
Value: 0 | |||
| (PID) Process: | (2972) MSBuild.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32 |
| Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
| (PID) Process: | (2972) MSBuild.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32 |
| Operation: | write | Name: | FileTracingMask |
Value: | |||
| (PID) Process: | (2972) MSBuild.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32 |
| Operation: | write | Name: | ConsoleTracingMask |
Value: | |||
| (PID) Process: | (2972) MSBuild.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32 |
| Operation: | write | Name: | MaxFileSize |
Value: 1048576 | |||
| (PID) Process: | (2972) MSBuild.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32 |
| Operation: | write | Name: | FileDirectory |
Value: %windir%\tracing | |||
| (PID) Process: | (2972) MSBuild.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
| (PID) Process: | (2972) MSBuild.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS |
| Operation: | write | Name: | EnableAutoFileTracing |
Value: 0 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 936 | 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.exe | C:\Users\admin\AppData\Local\Temp\is-T373L.tmp\7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmp | executable | |
MD5:60AEEEDA4D416077AAA5C9B21E336C5A | SHA256:C4DF89C1EE343740C7A54A9AFBB28C47F3CEF86AD53C505553C680BC8C58B569 | |||
| 3700 | 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmp | C:\Users\admin\AppData\Local\Temp\is-CCU1U.tmp\_isetup\_setup64.tmp | executable | |
MD5:E4211D6D009757C078A9FAC7FF4F03D4 | SHA256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95 | |||
| 3696 | 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmp | C:\Users\admin\AppData\Local\Temp\is-A6K37.tmp\_isetup\_setup64.tmp | executable | |
MD5:E4211D6D009757C078A9FAC7FF4F03D4 | SHA256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95 | |||
| 3696 | 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmp | C:\Users\admin\AppData\Local\Temp\is-A6K37.tmp\is-6HB52.tmp | executable | |
MD5:496340653F8343B6536E8846375EE9F3 | SHA256:7DEE0A72281177B1885F0C3BAE31E7BECE126414A9ADA8715803973853BAFFE9 | |||
| 3952 | 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.exe | C:\Users\admin\AppData\Local\Temp\is-77AD2.tmp\7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmp | executable | |
MD5:60AEEEDA4D416077AAA5C9B21E336C5A | SHA256:C4DF89C1EE343740C7A54A9AFBB28C47F3CEF86AD53C505553C680BC8C58B569 | |||
| 3696 | 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmp | C:\Users\admin\AppData\Roaming\Partition\electronics.exe | executable | |
MD5:3F58A517F1F4796225137E7659AD2ADB | SHA256:1DA298CAB4D537B0B7B5DABF09BFF6A212B9E45731E0CC772F99026005FB9E48 | |||
| 3696 | 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmp | C:\Users\admin\AppData\Roaming\Partition\is-CCPK6.tmp | binary | |
MD5:105B3C4033A1A5B36B0D897D64D2DBC5 | SHA256:6871177291918FADB13BB2092C134EC849CA0FBB79289959DDFCC0857872936D | |||
| 3696 | 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmp | C:\Users\admin\AppData\Roaming\Partition\is-9TQQU.tmp | executable | |
MD5:3F58A517F1F4796225137E7659AD2ADB | SHA256:1DA298CAB4D537B0B7B5DABF09BFF6A212B9E45731E0CC772F99026005FB9E48 | |||
| 3696 | 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmp | C:\Users\admin\AppData\Roaming\Partition\expulsionist.eml | binary | |
MD5:105B3C4033A1A5B36B0D897D64D2DBC5 | SHA256:6871177291918FADB13BB2092C134EC849CA0FBB79289959DDFCC0857872936D | |||
| 3696 | 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmp | C:\Users\admin\AppData\Roaming\Partition\expulsionist.rtf | binary | |
MD5:0577137E38BB6AC64D302158D97E3309 | SHA256:70BB7249D401B402C5E2A095FFC8832B36A3318F66218189AE49D072DAEE7208 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
900 | svchost.exe | GET | 200 | 23.32.238.112:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
900 | svchost.exe | GET | 200 | 23.52.120.96:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
4712 | MoUsoCoreWorker.exe | GET | 200 | 23.32.238.112:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
2972 | MSBuild.exe | GET | 200 | 45.141.87.50:9000 | http://45.141.87.50:9000/wbinjget?q=EF680CC9EFE0A8BCEC05D07897760CE8 | unknown | — | — | malicious |
4712 | MoUsoCoreWorker.exe | GET | 200 | 23.52.120.96:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
900 | svchost.exe | 51.124.78.146:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
— | — | 2.23.227.215:443 | — | Ooredoo Q.S.C. | QA | unknown |
— | — | 51.124.78.146:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4712 | MoUsoCoreWorker.exe | 51.124.78.146:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
900 | svchost.exe | 23.32.238.112:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
4712 | MoUsoCoreWorker.exe | 23.32.238.112:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
900 | svchost.exe | 23.52.120.96:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
4712 | MoUsoCoreWorker.exe | 23.52.120.96:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
Domain | IP | Reputation |
|---|---|---|
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
self.events.data.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
2972 | MSBuild.exe | A Network Trojan was detected | ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity |
2972 | MSBuild.exe | Misc Attack | ET DROP Spamhaus DROP Listed Traffic Inbound group 5 |
2972 | MSBuild.exe | Malware Command and Control Activity Detected | ET MALWARE Arechclient2 Backdoor/SecTopRAT CnC Init |
2972 | MSBuild.exe | A Network Trojan was detected | ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) |