File name:

7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.exe

Full analysis: https://app.any.run/tasks/791132a4-a45b-41bb-a84c-b97e854fbcb7
Verdict: Malicious activity
Threats:

The Arechclient2 malware is a sophisticated .NET-based Remote Access Trojan (RAT) that collects sensitive information, such as browser credentials, from infected computers. It employs various stealth techniques, including Base64 encoding to obscure its code and the ability to pause activities to evade automated security tools. The malware also can adjust Windows Defender settings and uses code injection to manipulate legitimate processes.

Analysis date: January 13, 2025, 18:12:27
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
autoit
arechclient2
backdoor
stealer
xor-url
generic
rat
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32 executable (GUI) Intel 80386, for MS Windows, 11 sections
MD5:

9324C48EADF64B3C9C3BE1724808D47D

SHA1:

B6F35CD27E57B39D9F25A86DD980FE44FD7576AF

SHA256:

7C9DE4E346A8EFE69569337C623CBDE71ABF0E9E4E8C83E9A45A20181E0F3951

SSDEEP:

98304:Arq3BdwzqDtKbVWDPp4cAURVr/A1Hle9UvJL9GDturqbPdfcAa/1XiFds+oP3jSs:Y2deqO6Oh1T

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Executing a file with an untrusted certificate

      • 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.exe (PID: 3952)
      • 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.exe (PID: 936)
    • Antivirus name has been found in the command line (generic signature)

      • cmd.exe (PID: 5036)
      • tasklist.exe (PID: 3544)
      • tasklist.exe (PID: 5548)
      • find.exe (PID: 4544)
      • cmd.exe (PID: 6072)
      • find.exe (PID: 6012)
      • find.exe (PID: 4244)
      • cmd.exe (PID: 3640)
      • tasklist.exe (PID: 3420)
      • cmd.exe (PID: 5460)
      • cmd.exe (PID: 716)
      • find.exe (PID: 128)
      • tasklist.exe (PID: 4120)
      • tasklist.exe (PID: 3080)
      • find.exe (PID: 2672)
    • Starts CMD.EXE for self-deleting

      • electronics.exe (PID: 3988)
    • ARECHCLIENT2 has been detected (SURICATA)

      • MSBuild.exe (PID: 2972)
    • Connects to the CnC server

      • MSBuild.exe (PID: 2972)
    • Actions looks like stealing of personal data

      • MSBuild.exe (PID: 2972)
    • ARECHCLIENT2 has been detected (YARA)

      • MSBuild.exe (PID: 2972)
    • XORed URL has been found (YARA)

      • MSBuild.exe (PID: 2972)
    • Changes the autorun value in the registry

      • electronics.exe (PID: 5256)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.exe (PID: 3952)
      • 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmp (PID: 3700)
      • 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.exe (PID: 936)
      • 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmp (PID: 3696)
      • electronics.exe (PID: 5256)
    • Reads the Windows owner or organization settings

      • 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmp (PID: 3700)
      • 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmp (PID: 3696)
    • Reads security settings of Internet Explorer

      • 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmp (PID: 3700)
    • Process drops legitimate windows executable

      • 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmp (PID: 3696)
    • Starts CMD.EXE for commands execution

      • 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmp (PID: 3696)
      • electronics.exe (PID: 3988)
    • Get information on the list of running processes

      • cmd.exe (PID: 5036)
      • cmd.exe (PID: 2084)
      • 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmp (PID: 3696)
      • cmd.exe (PID: 6072)
      • cmd.exe (PID: 3640)
      • cmd.exe (PID: 5460)
      • cmd.exe (PID: 716)
    • Starts the AutoIt3 executable file

      • 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmp (PID: 3696)
      • cmd.exe (PID: 3560)
    • Hides command output

      • cmd.exe (PID: 3560)
    • Runs PING.EXE to delay simulation

      • cmd.exe (PID: 3560)
    • The executable file from the user directory is run by the CMD process

      • electronics.exe (PID: 5256)
    • Contacting a server suspected of hosting an CnC

      • MSBuild.exe (PID: 2972)
    • Connects to unusual port

      • MSBuild.exe (PID: 2972)
  • INFO

    • Create files in a temporary directory

      • 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.exe (PID: 3952)
      • 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmp (PID: 3700)
      • 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.exe (PID: 936)
      • 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmp (PID: 3696)
      • MSBuild.exe (PID: 2972)
    • Checks supported languages

      • 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.exe (PID: 3952)
      • 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmp (PID: 3700)
      • 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.exe (PID: 936)
      • 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmp (PID: 3696)
      • electronics.exe (PID: 3988)
      • electronics.exe (PID: 5256)
      • MSBuild.exe (PID: 2972)
    • Reads the computer name

      • 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmp (PID: 3700)
      • 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmp (PID: 3696)
      • MSBuild.exe (PID: 2972)
    • Process checks computer location settings

      • 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmp (PID: 3700)
      • electronics.exe (PID: 3988)
    • The sample compiled with english language support

      • 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmp (PID: 3696)
      • electronics.exe (PID: 5256)
    • Creates files in the program directory

      • electronics.exe (PID: 3988)
    • Reads mouse settings

      • electronics.exe (PID: 3988)
    • Reads the machine GUID from the registry

      • electronics.exe (PID: 3988)
      • MSBuild.exe (PID: 2972)
    • Disables trace logs

      • MSBuild.exe (PID: 2972)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

xor-url

(PID) Process(2972) MSBuild.exe
Decrypted-URLs (3)http://dl.google.com/chrome/install/375.126/chrome_installer.exe
https://github.com
https://pastebin.com/raw/eB8bmiVA
No Malware configuration.

TRiD

.exe | Inno Setup installer (53.5)
.exe | InstallShield setup (21)
.exe | Win32 EXE PECompact compressed (generic) (20.2)
.exe | Win32 Executable (generic) (2.1)
.exe | Win16/32 Executable Delphi generic (1)

EXIF

EXE

MachineType: Intel 386 or later, and compatibles
TimeStamp: 2024:07:12 07:26:53+00:00
ImageFileCharacteristics: Executable, 32-bit
PEType: PE32
LinkerVersion: 2.25
CodeSize: 685056
InitializedDataSize: 159744
UninitializedDataSize: -
EntryPoint: 0xa83bc
OSVersion: 6.1
ImageVersion: -
SubsystemVersion: 6.1
Subsystem: Windows GUI
FileVersionNumber: 2.5.0.0
ProductVersionNumber: 2.5.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: This installation was built with Inno Setup.
CompanyName: Bada Technology Co., Ltd
FileDescription: Macrorit Partition Extender
FileVersion: 2.5.0.0
LegalCopyright: Copyright © 2013-2024 Macrorit.
OriginalFileName: Partition.exe
ProductName: Dokan Library 1.4.1.1000 Bundle
ProductVersion: 2.5.0.0
No data.
screenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
151
Monitored processes
34
Malicious processes
8
Suspicious processes
3

Behavior graph

Click at the process to see the details
start 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.exe 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmp 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.exe 7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmp cmd.exe no specs conhost.exe no specs tasklist.exe no specs find.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs find.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs find.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs find.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs find.exe no specs cmd.exe no specs conhost.exe no specs tasklist.exe no specs find.exe no specs electronics.exe no specs cmd.exe no specs conhost.exe no specs ping.exe no specs electronics.exe #ARECHCLIENT2 msbuild.exe

Process information

PID
CMD
Path
Indicators
Parent process
128\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
128find /I "sophoshealth.exe"C:\Windows\System32\find.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Find String (grep) Utility
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\find.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ulib.dll
c:\windows\system32\fsutilext.dll
716"cmd.exe" /C tasklist /FI "IMAGENAME eq sophoshealth.exe" /FO CSV /NH | find /I "sophoshealth.exe"C:\Windows\System32\cmd.exe7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
936"C:\Users\admin\Desktop\7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.exe" /VERYSILENTC:\Users\admin\Desktop\7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.exe
7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmp
User:
admin
Company:
Bada Technology Co., Ltd
Integrity Level:
MEDIUM
Description:
Macrorit Partition Extender
Exit code:
0
Version:
2.5.0.0
Modules
Images
c:\users\admin\desktop\7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\comctl32.dll
2084"cmd.exe" /C tasklist /FI "IMAGENAME eq opssvc.exe" /FO CSV /NH | find /I "opssvc.exe"C:\Windows\System32\cmd.exe7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmp
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sechost.dll
2324\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
2672find /I "nswscsvc.exe"C:\Windows\System32\find.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Find String (grep) Utility
Exit code:
1
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\find.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\ulib.dll
c:\windows\system32\fsutilext.dll
2828tasklist /FI "IMAGENAME eq opssvc.exe" /FO CSV /NH C:\Windows\System32\tasklist.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Lists the current running tasks
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\tasklist.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
2972C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
electronics.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
MSBuild.exe
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\msbuild.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
xor-url
(PID) Process(2972) MSBuild.exe
Decrypted-URLs (3)http://dl.google.com/chrome/install/375.126/chrome_installer.exe
https://github.com
https://pastebin.com/raw/eB8bmiVA
3080tasklist /FI "IMAGENAME eq nswscsvc.exe" /FO CSV /NH C:\Windows\System32\tasklist.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Lists the current running tasks
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\tasklist.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
Total events
4 085
Read events
4 070
Write events
15
Delete events
0

Modification events

(PID) Process:(5256) electronics.exeKey:HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\RunOnce
Operation:writeName:afhfcca
Value:
"C:\ddffhkh\AutoIt3.exe" C:\ddffhkh\afhfcca.a3x
(PID) Process:(2972) MSBuild.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(2972) MSBuild.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(2972) MSBuild.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(2972) MSBuild.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(2972) MSBuild.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(2972) MSBuild.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(2972) MSBuild.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(2972) MSBuild.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(2972) MSBuild.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS
Operation:writeName:EnableAutoFileTracing
Value:
0
Executable files
15
Suspicious files
10
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
9367c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.exeC:\Users\admin\AppData\Local\Temp\is-T373L.tmp\7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmpexecutable
MD5:60AEEEDA4D416077AAA5C9B21E336C5A
SHA256:C4DF89C1EE343740C7A54A9AFBB28C47F3CEF86AD53C505553C680BC8C58B569
37007c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmpC:\Users\admin\AppData\Local\Temp\is-CCU1U.tmp\_isetup\_setup64.tmpexecutable
MD5:E4211D6D009757C078A9FAC7FF4F03D4
SHA256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95
36967c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmpC:\Users\admin\AppData\Local\Temp\is-A6K37.tmp\_isetup\_setup64.tmpexecutable
MD5:E4211D6D009757C078A9FAC7FF4F03D4
SHA256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95
36967c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmpC:\Users\admin\AppData\Local\Temp\is-A6K37.tmp\is-6HB52.tmpexecutable
MD5:496340653F8343B6536E8846375EE9F3
SHA256:7DEE0A72281177B1885F0C3BAE31E7BECE126414A9ADA8715803973853BAFFE9
39527c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.exeC:\Users\admin\AppData\Local\Temp\is-77AD2.tmp\7c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmpexecutable
MD5:60AEEEDA4D416077AAA5C9B21E336C5A
SHA256:C4DF89C1EE343740C7A54A9AFBB28C47F3CEF86AD53C505553C680BC8C58B569
36967c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmpC:\Users\admin\AppData\Roaming\Partition\electronics.exeexecutable
MD5:3F58A517F1F4796225137E7659AD2ADB
SHA256:1DA298CAB4D537B0B7B5DABF09BFF6A212B9E45731E0CC772F99026005FB9E48
36967c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmpC:\Users\admin\AppData\Roaming\Partition\is-CCPK6.tmpbinary
MD5:105B3C4033A1A5B36B0D897D64D2DBC5
SHA256:6871177291918FADB13BB2092C134EC849CA0FBB79289959DDFCC0857872936D
36967c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmpC:\Users\admin\AppData\Roaming\Partition\is-9TQQU.tmpexecutable
MD5:3F58A517F1F4796225137E7659AD2ADB
SHA256:1DA298CAB4D537B0B7B5DABF09BFF6A212B9E45731E0CC772F99026005FB9E48
36967c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmpC:\Users\admin\AppData\Roaming\Partition\expulsionist.emlbinary
MD5:105B3C4033A1A5B36B0D897D64D2DBC5
SHA256:6871177291918FADB13BB2092C134EC849CA0FBB79289959DDFCC0857872936D
36967c9de4e346a8efe69569337c623cbde71abf0e9e4e8c83e9a45a20181e0f3951.tmpC:\Users\admin\AppData\Roaming\Partition\expulsionist.rtfbinary
MD5:0577137E38BB6AC64D302158D97E3309
SHA256:70BB7249D401B402C5E2A095FFC8832B36A3318F66218189AE49D072DAEE7208
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
5
TCP/UDP connections
23
DNS requests
5
Threats
4

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
900
svchost.exe
GET
200
23.32.238.112:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
900
svchost.exe
GET
200
23.52.120.96:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
4712
MoUsoCoreWorker.exe
GET
200
23.32.238.112:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
2972
MSBuild.exe
GET
200
45.141.87.50:9000
http://45.141.87.50:9000/wbinjget?q=EF680CC9EFE0A8BCEC05D07897760CE8
unknown
malicious
4712
MoUsoCoreWorker.exe
GET
200
23.52.120.96:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
900
svchost.exe
51.124.78.146:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4
System
192.168.100.255:137
whitelisted
2.23.227.215:443
Ooredoo Q.S.C.
QA
unknown
51.124.78.146:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4712
MoUsoCoreWorker.exe
51.124.78.146:443
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
900
svchost.exe
23.32.238.112:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4712
MoUsoCoreWorker.exe
23.32.238.112:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
900
svchost.exe
23.52.120.96:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
4712
MoUsoCoreWorker.exe
23.52.120.96:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 142.250.186.174
whitelisted
crl.microsoft.com
  • 23.32.238.112
  • 23.32.238.107
whitelisted
www.microsoft.com
  • 23.52.120.96
whitelisted
settings-win.data.microsoft.com
  • 20.73.194.208
whitelisted
self.events.data.microsoft.com
  • 20.189.173.6
whitelisted

Threats

PID
Process
Class
Message
2972
MSBuild.exe
A Network Trojan was detected
ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity
2972
MSBuild.exe
Misc Attack
ET DROP Spamhaus DROP Listed Traffic Inbound group 5
2972
MSBuild.exe
Malware Command and Control Activity Detected
ET MALWARE Arechclient2 Backdoor/SecTopRAT CnC Init
2972
MSBuild.exe
A Network Trojan was detected
ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET)
No debug info