File name:

box.zip

Full analysis: https://app.any.run/tasks/0f72dce6-27c6-4729-9712-f098dc354b6d
Verdict: Malicious activity
Threats:

The Arechclient2 malware is a sophisticated .NET-based Remote Access Trojan (RAT) that collects sensitive information, such as browser credentials, from infected computers. It employs various stealth techniques, including Base64 encoding to obscure its code and the ability to pause activities to evade automated security tools. The malware also can adjust Windows Defender settings and uses code injection to manipulate legitimate processes.

Analysis date: February 20, 2025, 00:35:25
OS: Windows 10 Professional (build: 19045, 64 bit)
Tags:
arch-exec
arch-doc
arechclient2
backdoor
stealer
xor-url
generic
rat
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=store
MD5:

78E4722D827D3AC1D739A6F2B0AC6120

SHA1:

849AEEAAFDA71301DE6A89C940493C7EC1276516

SHA256:

871F93042433B599C49BE3802B7A5694E2EC9F5BA42286661E643BD291E2597B

SSDEEP:

98304:JGviaSl/W8F/RMLtuEww7AXkt7EJSGHL+EEMp8eu8kY0DG9tbbpDDUl+bgHr/Z0T:d4QSXCRcvp6

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Generic archive extractor

      • WinRAR.exe (PID: 6444)
    • ARECHCLIENT2 has been detected (YARA)

      • MSBuild.exe (PID: 1412)
    • ARECHCLIENT2 has been detected (SURICATA)

      • MSBuild.exe (PID: 1412)
    • Actions looks like stealing of personal data

      • MSBuild.exe (PID: 1412)
    • XORed URL has been found (YARA)

      • MSBuild.exe (PID: 1412)
  • SUSPICIOUS

    • The process drops C-runtime libraries

      • radeonmx.exe (PID: 7068)
    • Process drops legitimate windows executable

      • radeonmx.exe (PID: 7068)
      • WinRAR.exe (PID: 6444)
    • Starts a Microsoft application from unusual location

      • radeonmx.exe (PID: 7068)
    • Starts CMD.EXE for commands execution

      • radeonmx.exe (PID: 7068)
    • Executable content was dropped or overwritten

      • radeonmx.exe (PID: 7068)
    • Connects to unusual port

      • MSBuild.exe (PID: 1412)
  • INFO

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 6444)
    • Reads security settings of Internet Explorer

      • notepad.exe (PID: 7148)
    • Create files in a temporary directory

      • radeonmx.exe (PID: 7068)
      • MSBuild.exe (PID: 1412)
    • Manual execution by a user

      • notepad.exe (PID: 7148)
      • radeonmx.exe (PID: 7068)
      • WinRAR.exe (PID: 3848)
      • WinRAR.exe (PID: 6324)
    • Checks supported languages

      • radeonmx.exe (PID: 7068)
      • MSBuild.exe (PID: 1412)
    • Reads the computer name

      • MSBuild.exe (PID: 1412)
      • radeonmx.exe (PID: 7068)
    • Reads the machine GUID from the registry

      • MSBuild.exe (PID: 1412)
    • The sample compiled with english language support

      • WinRAR.exe (PID: 6444)
      • radeonmx.exe (PID: 7068)
    • Disables trace logs

      • MSBuild.exe (PID: 1412)
    • Checks proxy server information

      • MSBuild.exe (PID: 1412)
    • Creates files or folders in the user directory

      • radeonmx.exe (PID: 7068)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

xor-url

(PID) Process(1412) MSBuild.exe
Decrypted-URLs (3)http://dl.google.com/chrome/install/375.126/chrome_installer.exeb
https://github.com
https://pastebin.com/raw/DWCCqGB0wKo+g
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: None
ZipModifyDate: 2025:02:19 18:30:18
ZipCRC: 0x00000000
ZipCompressedSize: -
ZipUncompressedSize: -
ZipFileName: Tiffany/
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
136
Monitored processes
9
Malicious processes
3
Suspicious processes
1

Behavior graph

Click at the process to see the details
start winrar.exe rundll32.exe no specs radeonmx.exe cmd.exe no specs conhost.exe no specs notepad.exe no specs #XOR-URL msbuild.exe winrar.exe no specs winrar.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
1412C:\WINDOWS\Microsoft.NET\Framework\v4.0.30319\MSBuild.exeC:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe
cmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
MSBuild.exe
Version:
4.8.9037.0 built by: NET481REL1
Modules
Images
c:\users\admin\appdata\local\temp\shvbg
c:\windows\syswow64\mshtml.dll
c:\windows\microsoft.net\framework\v4.0.30319\msbuild.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
xor-url
(PID) Process(1412) MSBuild.exe
Decrypted-URLs (3)http://dl.google.com/chrome/install/375.126/chrome_installer.exeb
https://github.com
https://pastebin.com/raw/DWCCqGB0wKo+g
3848"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\Tiffany\youve.zip"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
1
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
6324"C:\Program Files\WinRAR\WinRAR.exe" x -iext -ow -ver -- "C:\Users\admin\Desktop\Tiffany\cwm.7z" C:\Users\admin\Desktop\Tiffany\cwm\C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
1
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
6444"C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\Desktop\box.zipC:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
7016C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
7068"C:\Users\admin\Desktop\Tiffany\radeonmx.exe" C:\Users\admin\Desktop\Tiffany\radeonmx.exe
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft (R) Visual C++ Package Server
Exit code:
1
Version:
17.0.34202.158 built by: D17.7
Modules
Images
c:\users\admin\desktop\tiffany\radeonmx.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\ole32.dll
7088C:\WINDOWS\SysWOW64\cmd.exeC:\Windows\SysWOW64\cmd.exeradeonmx.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\syswow64\cmd.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
c:\windows\syswow64\msvcrt.dll
7096\??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1C:\Windows\System32\conhost.execmd.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Console Window Host
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\conhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\shcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
7148"C:\WINDOWS\system32\NOTEPAD.EXE" C:\Users\admin\Desktop\Tiffany\youve.txtC:\Windows\System32\notepad.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Notepad
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\notepad.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\user32.dll
Total events
4 354
Read events
4 311
Write events
43
Delete events
0

Modification events

(PID) Process:(6444) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(6444) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(6444) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(6444) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\box.zip
(PID) Process:(6444) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(6444) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(6444) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(6444) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(6444) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\MainWin
Operation:writeName:Placement
Value:
2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF3D0000002D000000FD03000016020000
(PID) Process:(6444) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\ArcColumnWidths
Operation:writeName:name
Value:
256
Executable files
9
Suspicious files
10
Text files
0
Unknown types
0

Dropped files

PID
Process
Filename
Type
7088cmd.exeC:\Users\admin\AppData\Local\Temp\shvbg
MD5:
SHA256:
7068radeonmx.exeC:\Users\admin\AppData\Roaming\nrqpower\concrt140.dllexecutable
MD5:F36DAE6EA00F102B60A5011AF0732123
SHA256:0A3894DD420ED6B4C7EBBDE463DBBDE69CDB032E290B1C86C21CCDAA4DA95526
6444WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6444.4400\Tiffany\concrt140.dllexecutable
MD5:F36DAE6EA00F102B60A5011AF0732123
SHA256:0A3894DD420ED6B4C7EBBDE463DBBDE69CDB032E290B1C86C21CCDAA4DA95526
6444WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6444.4400\Tiffany\radeonmx.exeexecutable
MD5:38901633C833CBA7F682472CED0DBE4B
SHA256:A5C5487194F761DAC90E178C9C1753C0F47B041F3168B5C23A587F33F69E5089
6444WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6444.4400\Tiffany\cpfe.dllexecutable
MD5:08879CDEBE058210D87D6AA49920E1D2
SHA256:FE26D56DD5F84D16844BEE03BD90A5A7FB00E743C64BCBAA705C2C2B1445A7FB
7068radeonmx.exeC:\Users\admin\AppData\Roaming\nrqpower\vcruntime140.dllexecutable
MD5:984C36E57E47581E267151ACA04E9580
SHA256:E0850AD7C2431F822359E129C85B708373759A1AAADB70B3740642EA44345A04
6444WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6444.4400\Tiffany\cwm.7zbinary
MD5:BE15CFC47C332BD4248BB38C6131953F
SHA256:DA4A6578EDCA41CB20B3D28083F7221B7E8581A0F3F50FBE7CE80166DD1823E2
6444WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa6444.4400\Tiffany\msvcp140.dllexecutable
MD5:CDAE969102E88F6704D853F9521EEDD2
SHA256:4AD3DE3443D7658F74C978E7EB04730E3D812BC592FEE47BE4E6348D1FB4814E
1412MSBuild.exeC:\Users\admin\AppData\Local\Temp\tmpF38E.tmpbinary
MD5:46D9FCA6032297F8AEE08D73418312BA
SHA256:865856FA4C33C4AEE52E15FBB370B6611468FE947E76E197F0E50D0AD62CB1B4
7068radeonmx.exeC:\Users\admin\AppData\Roaming\nrqpower\cpfe.dllexecutable
MD5:08879CDEBE058210D87D6AA49920E1D2
SHA256:FE26D56DD5F84D16844BEE03BD90A5A7FB00E743C64BCBAA705C2C2B1445A7FB
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
10
TCP/UDP connections
36
DNS requests
19
Threats
1

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
4712
MoUsoCoreWorker.exe
GET
200
23.53.40.178:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1412
MSBuild.exe
GET
200
92.255.85.36:9000
http://92.255.85.36:9000/wbinjget?q=EF680CC9EFE0A8BCEC05D07897760CE8
unknown
malicious
4712
MoUsoCoreWorker.exe
GET
200
23.52.120.96:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1684
svchost.exe
GET
200
23.52.120.96:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
1176
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
1684
svchost.exe
GET
200
23.53.40.178:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D
unknown
whitelisted
6196
SIHClient.exe
GET
200
23.52.120.96:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
6196
SIHClient.exe
GET
200
23.52.120.96:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
6688
backgroundTaskHost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
1920
RUXIMICS.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
4712
MoUsoCoreWorker.exe
23.53.40.178:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
1684
svchost.exe
23.53.40.178:80
crl.microsoft.com
Akamai International B.V.
DE
whitelisted
4712
MoUsoCoreWorker.exe
23.52.120.96:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
1684
svchost.exe
23.52.120.96:80
www.microsoft.com
AKAMAI-AS
DE
whitelisted
5064
SearchApp.exe
2.16.110.121:443
www.bing.com
Akamai International B.V.
DE
whitelisted
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
DE
whitelisted
4
System
192.168.100.255:138
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.124.78.146
  • 40.127.240.158
whitelisted
crl.microsoft.com
  • 23.53.40.178
  • 23.53.40.176
whitelisted
google.com
  • 142.250.185.110
whitelisted
www.microsoft.com
  • 23.52.120.96
whitelisted
www.bing.com
  • 2.16.110.121
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
login.live.com
  • 20.190.159.71
  • 40.126.31.73
  • 40.126.31.131
  • 20.190.159.68
  • 40.126.31.130
  • 40.126.31.67
  • 20.190.159.130
  • 20.190.159.64
whitelisted
go.microsoft.com
  • 23.213.166.81
whitelisted
arc.msn.com
  • 20.223.35.26
whitelisted
fd.api.iris.microsoft.com
  • 20.199.58.43
whitelisted

Threats

PID
Process
Class
Message
1412
MSBuild.exe
A Network Trojan was detected
ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET)
No debug info