File name:

sectoprat.exe.infected

Full analysis: https://app.any.run/tasks/5067bf68-dcbc-4ebe-98d0-57155373af63
Verdict: Malicious activity
Threats:

The Arechclient2 malware is a sophisticated .NET-based Remote Access Trojan (RAT) that collects sensitive information, such as browser credentials, from infected computers. It employs various stealth techniques, including Base64 encoding to obscure its code and the ability to pause activities to evade automated security tools. The malware also can adjust Windows Defender settings and uses code injection to manipulate legitimate processes.

Analysis date: March 13, 2026, 05:04:26
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
arechclient2
rat
stealer
backdoor
xor-url
generic
Indicators:
MIME: application/vnd.microsoft.portable-executable
File info: PE32+ executable (GUI) x86-64 Mono/.Net assembly, for MS Windows, 2 sections
MD5:

AC796A1AE6DE611CBE79FE3716E1FCF7

SHA1:

63E43CF5468B023D5CE4359A3A18F535E4B15232

SHA256:

CE1756B7EC82894F5911FAED96C4423715A24F994808DDA705F4C7202C7AA4C3

SSDEEP:

24576:FAKBXtKmg1pdpGeuufAajnwD91ttZfgxuRhDQ1GNGB8ZLmppZh60GMC+HzBXk8ih:FAKBdKhyDm7A

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • XORed URL has been found (YARA)

      • sectoprat.exe.infected.exe (PID: 8352)
    • ARECHCLIENT2 has been detected (YARA)

      • sectoprat.exe.infected.exe (PID: 8352)
    • Actions looks like stealing of personal data

      • sectoprat.exe.infected.exe (PID: 8352)
    • ARECHCLIENT2 has been detected (SURICATA)

      • sectoprat.exe.infected.exe (PID: 8352)
  • SUSPICIOUS

    • Browser sandbox disabling

      • chrome.exe (PID: 8416)
      • chrome.exe (PID: 5716)
      • chrome.exe (PID: 5708)
      • chrome.exe (PID: 3440)
      • chrome.exe (PID: 1524)
      • chrome.exe (PID: 6392)
      • chrome.exe (PID: 8024)
      • chrome.exe (PID: 7320)
      • msedge.exe (PID: 3700)
      • msedge.exe (PID: 1324)
      • chrome.exe (PID: 1976)
      • msedge.exe (PID: 3212)
      • msedge.exe (PID: 7588)
      • msedge.exe (PID: 3152)
      • chrome.exe (PID: 7580)
      • msedge.exe (PID: 7988)
      • msedge.exe (PID: 8520)
    • Browser launch with unusual user-data-dir

      • sectoprat.exe.infected.exe (PID: 8352)
      • chrome.exe (PID: 3440)
      • msedge.exe (PID: 1324)
      • msedge.exe (PID: 3700)
      • chrome.exe (PID: 3988)
    • Possible stealing from crypto wallets

      • sectoprat.exe.infected.exe (PID: 8352)
    • Searches for installed software

      • sectoprat.exe.infected.exe (PID: 8352)
  • INFO

    • Reads the computer name

      • sectoprat.exe.infected.exe (PID: 8352)
    • Reads Environment values

      • sectoprat.exe.infected.exe (PID: 8352)
    • Reads the machine GUID from the registry

      • sectoprat.exe.infected.exe (PID: 8352)
    • Reads product name

      • sectoprat.exe.infected.exe (PID: 8352)
    • Checks supported languages

      • sectoprat.exe.infected.exe (PID: 8352)
    • Application launched itself

      • chrome.exe (PID: 3440)
      • msedge.exe (PID: 3700)
      • msedge.exe (PID: 1324)
      • chrome.exe (PID: 8508)
      • chrome.exe (PID: 3988)
    • Disables trace logs

      • sectoprat.exe.infected.exe (PID: 8352)
    • Create files in a temporary directory

      • sectoprat.exe.infected.exe (PID: 8352)
    • Manual execution by a user

      • chrome.exe (PID: 3988)
      • chrome.exe (PID: 8508)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report

xor-url

(PID) Process(8352) sectoprat.exe.infected.exe
Decrypted-URLs (14)http://dl.google.com/chrome/install/375.126/chrome_installer.exe]
https://bsc-dataseed1.binance.org/
https://bsc-dataseed1.defibit.io/
https://bsc-dataseed1.ninicoin.io/O
https://bsc-dataseed2.binance.org/0
https://bsc-dataseed2.defibit.io/
https://bsc-dataseed2.ninicoin.io/
https://bsc-dataseed3.binance.org/
https://bsc-dataseed3.defibit.io/
https://bsc-dataseed3.ninicoin.io/
https://bsc-dataseed4.binance.org/A
https://bsc-dataseed4.defibit.io/k
https://bsc-dataseed4.ninicoin.io/
https://github.com
No Malware configuration.

TRiD

.exe | Win64 Executable (generic) (87.2)
.exe | Generic Win/DOS Executable (6.3)
.exe | DOS Executable Generic (6.3)

EXIF

EXE

MachineType: AMD AMD64
TimeStamp: 2025:11:08 12:51:19+00:00
ImageFileCharacteristics: Executable, Large address aware
PEType: PE32+
LinkerVersion: 8
CodeSize: 866816
InitializedDataSize: 1536
UninitializedDataSize: -
EntryPoint: 0x0000
OSVersion: 4
ImageVersion: -
SubsystemVersion: 4
Subsystem: Windows GUI
FileVersionNumber: 1.0.0.0
ProductVersionNumber: 1.0.0.0
FileFlagsMask: 0x003f
FileFlags: (none)
FileOS: Win32
ObjectFileType: Executable application
FileSubtype: -
LanguageCode: Neutral
CharacterSet: Unicode
Comments: -
CompanyName: -
FileDescription: -
FileVersion: 1.0.0.0
InternalName: dfgfghfghfghfghfgh.exe
LegalCopyright: -
LegalTrademarks: -
OriginalFileName: dfgfghfghfghfghfgh.exe
ProductName: -
ProductVersion: 1.0.0.0
AssemblyVersion: 1.0.0.0
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
194
Monitored processes
47
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start #ARECHCLIENT2 sectoprat.exe.infected.exe updater.exe no specs updater.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs msedge.exe no specs msedge.exe msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs msedge.exe no specs slui.exe chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs Elevatable Shortcut no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs chrome.exe no specs svchost.exe

Process information

PID
CMD
Path
Indicators
Parent process
1316C:\WINDOWS\system32\DllHost.exe /Processid:{FF9E6131-A8C1-4188-AA03-82E9F10A05A8}C:\Windows\System32\dllhost.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
COM Surrogate
Exit code:
0
Version:
10.0.19041.3636 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\dllhost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\kernel.appcore.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\bcryptprimitives.dll
1324"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --no-sandbox --allow-no-sandbox-job --disable-gpu --mute-audio --disable-audio --user-data-dir="C:\Users\admin\AppData\Local\Temp\beccvztn.ejw" --edge-skip-compat-layer-relaunchC:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe
msedge.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Edge
Exit code:
0
Version:
133.0.3065.92
Modules
Images
c:\program files (x86)\microsoft\edge\application\msedge.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files (x86)\microsoft\edge\application\133.0.3065.92\msedge_elf.dll
c:\windows\system32\oleaut32.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\rpcrt4.dll
1524"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --user-data-dir="C:\Users\admin\AppData\Local\Temp\nl4ag00p.24v" --enable-dinosaur-easter-egg-alt-images --no-sandbox --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=3 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3092,i,4106658183813185900,11083200596371967014,262144 --variations-seed-version --mojo-platform-channel-handle=3104 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
133.0.6943.127
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
1692"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=chrome.mojom.ProcessorMetrics --lang=en-US --service-sandbox-type=none --disable-quic --string-annotations --field-trial-handle=5012,i,11133749153924039376,5933472774517039350,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version=20251218-201203.402000 --mojo-platform-channel-handle=5008 /prefetch:8C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
133.0.6943.127
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
1932"C:\Program Files (x86)\Google\GoogleUpdater\134.0.6985.0\updater.exe" --crash-handler --system "--database=C:\Program Files (x86)\Google\GoogleUpdater\134.0.6985.0\Crashpad" --url=https://clients2.google.com/cr/report --annotation=prod=Update4 --annotation=ver=134.0.6985.0 "--attachment=C:\Program Files (x86)\Google\GoogleUpdater\updater.log" --initial-client-data=0x2a0,0x2a4,0x2a8,0xd8,0x2ac,0x139c460,0x139c46c,0x139c478C:\Program Files (x86)\Google\GoogleUpdater\134.0.6985.0\updater.exeupdater.exe
User:
SYSTEM
Company:
Google LLC
Integrity Level:
SYSTEM
Description:
Google Updater
Exit code:
0
Version:
134.0.6985.0
Modules
Images
c:\program files (x86)\google\googleupdater\134.0.6985.0\updater.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\advapi32.dll
c:\windows\syswow64\msvcrt.dll
1976"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --user-data-dir="C:\Users\admin\AppData\Local\Temp\nl4ag00p.24v" --extension-process --enable-dinosaur-easter-egg-alt-images --no-sandbox --disable-gpu-compositing --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=3 --enable-main-frame-before-activation --renderer-client-id=10 --field-trial-handle=3204,i,4106658183813185900,11083200596371967014,262144 --variations-seed-version --mojo-platform-channel-handle=3316 /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
MEDIUM
Description:
Google Chrome
Exit code:
0
Version:
133.0.6943.127
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\apphelp.dll
c:\windows\system32\aclayers.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
2260"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --extension-process --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=3 --enable-main-frame-before-activation --renderer-client-id=7 --field-trial-handle=3912,i,11133749153924039376,5933472774517039350,262144 --disable-features=OptimizationGuideModelDownloading,OptimizationHints,OptimizationHintsFetching,OptimizationTargetPrediction --variations-seed-version=20251218-201203.402000 --mojo-platform-channel-handle=3884 /prefetch:2C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
133.0.6943.127
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\133.0.6943.127\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
2292C:\WINDOWS\system32\svchost.exe -k NetworkService -p -s DnscacheC:\Windows\System32\svchost.exe
services.exe
User:
NETWORK SERVICE
Company:
Microsoft Corporation
Integrity Level:
SYSTEM
Description:
Host Process for Windows Services
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\svchost.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\combase.dll
c:\windows\system32\kernel.appcore.dll
2392"C:\Program Files (x86)\Google\GoogleUpdater\134.0.6985.0\updater.exe" --wake --systemC:\Program Files (x86)\Google\GoogleUpdater\134.0.6985.0\updater.exesvchost.exe
User:
SYSTEM
Company:
Google LLC
Integrity Level:
SYSTEM
Description:
Google Updater
Exit code:
0
Version:
134.0.6985.0
Modules
Images
c:\program files (x86)\google\googleupdater\134.0.6985.0\updater.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\advapi32.dll
c:\windows\syswow64\msvcrt.dll
2416"C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --string-annotations --enable-dinosaur-easter-egg-alt-images --video-capture-use-gpu-memory-buffer --lang=en-US --device-scale-factor=1 --num-raster-threads=3 --enable-main-frame-before-activation --renderer-client-id=5 --field-trial-handle=3256,i,5094381015632864263,5205672452873616800,262144 --disable-features="OptimizationGuideModelDownloading,OptimizationHints --user-data-dir=C:\Users\admin\AppData\Local\Temp\nl4ag00p.24v,OptimizationHintsFetching,OptimizationTargetPrediction" --variations-seed-version=20260312-170006.655000-production --mojo-platform-channel-handle=3280 /prefetch:1C:\Program Files\Google\Chrome\Application\chrome.exechrome.exe
User:
admin
Company:
Google LLC
Integrity Level:
LOW
Description:
Google Chrome
Exit code:
0
Version:
133.0.6943.127
Modules
Images
c:\program files\google\chrome\application\chrome.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\google\chrome\application\133.0.6943.127\chrome_elf.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\bcryptprimitives.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
Total events
6 367
Read events
6 353
Write events
14
Delete events
0

Modification events

(PID) Process:(8352) sectoprat.exe.infected.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sectoprat_RASAPI32
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(8352) sectoprat.exe.infected.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sectoprat_RASAPI32
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(8352) sectoprat.exe.infected.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sectoprat_RASAPI32
Operation:writeName:EnableConsoleTracing
Value:
0
(PID) Process:(8352) sectoprat.exe.infected.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sectoprat_RASAPI32
Operation:writeName:FileTracingMask
Value:
(PID) Process:(8352) sectoprat.exe.infected.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sectoprat_RASAPI32
Operation:writeName:ConsoleTracingMask
Value:
(PID) Process:(8352) sectoprat.exe.infected.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sectoprat_RASAPI32
Operation:writeName:MaxFileSize
Value:
1048576
(PID) Process:(8352) sectoprat.exe.infected.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sectoprat_RASAPI32
Operation:writeName:FileDirectory
Value:
%windir%\tracing
(PID) Process:(8352) sectoprat.exe.infected.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sectoprat_RASMANCS
Operation:writeName:EnableFileTracing
Value:
0
(PID) Process:(8352) sectoprat.exe.infected.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sectoprat_RASMANCS
Operation:writeName:EnableAutoFileTracing
Value:
0
(PID) Process:(8352) sectoprat.exe.infected.exeKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Tracing\sectoprat_RASMANCS
Operation:writeName:EnableConsoleTracing
Value:
0
Executable files
0
Suspicious files
121
Text files
150
Unknown types
0

Dropped files

PID
Process
Filename
Type
3440chrome.exeC:\Users\admin\AppData\Local\Temp\nl4ag00p.24v\First Run
MD5:
SHA256:
1932updater.exeC:\Program Files (x86)\Google\GoogleUpdater\updater.logtext
MD5:DF26A024102F1FF6D471052AC82C6B5C
SHA256:BA3FF5932C82A563D8D683F2AE5FEFC53B335C6D9654B8486A163E896CCB6CC7
3440chrome.exeC:\Users\admin\AppData\Local\Temp\nl4ag00p.24v\Variationstext
MD5:961E3604F228B0D10541EBF921500C86
SHA256:F7B24F2EB3D5EB0550527490395D2F61C3D2FE74BB9CB345197DAD81B58B5FED
3440chrome.exeC:\Users\admin\AppData\Local\Temp\nl4ag00p.24v\Default\15e7259e-3909-4c4a-b4c0-01daa2cd1c40.tmpbinary
MD5:5058F1AF8388633F609CADB75A75DC9D
SHA256:
3440chrome.exeC:\Users\admin\AppData\Local\Temp\nl4ag00p.24v\Last Versiontext
MD5:D18CE7F480944AE4E61A969D8C1E5003
SHA256:E0CB362A73D69BAD940A018881701B5F2A8527C13C3F5ACBBEA43B8820DFC199
3440chrome.exeC:\Users\admin\AppData\Local\Temp\nl4ag00p.24v\Default\Site Characteristics Database\000001.dbtmptext
MD5:46295CAC801E5D4857D09837238A6394
SHA256:0F1BAD70C7BD1E0A69562853EC529355462FCD0423263A3D39D6D0D70B780443
3440chrome.exeC:\Users\admin\AppData\Local\Temp\nl4ag00p.24v\Default\Code Cache\js\index-dir\the-real-indexbinary
MD5:F9DD4E28122A117159579D921DFE6F60
SHA256:973669EF9F0FEA750585DBFE2057736E6325B4A6B339259F3A970191983715AE
3440chrome.exeC:\Users\admin\AppData\Local\Temp\nl4ag00p.24v\e8d1c5c2-a4ad-46c7-aa2d-433f150ea15b.tmptext
MD5:8C9738FC949E10996FCC16ABA006B2A8
SHA256:1D408338CD8CEF74D7CC7CDE0359C641D9056B4DD4B8918B8E71890D94F8D0DE
3440chrome.exeC:\Users\admin\AppData\Local\Temp\nl4ag00p.24v\segmentation_platform\ukm_db-journalbinary
MD5:DD10FD59532213CE969AAB4AE566CBE0
SHA256:A250BA7C3112DA0A283A8C122DD692B3490099FBC5055C9CF78D055656B1D072
3440chrome.exeC:\Users\admin\AppData\Local\Temp\nl4ag00p.24v\Crashpad\settings.datbinary
MD5:D479A08499A2B53C6E3AE9F93B1B1210
SHA256:E35A3AF3FD2D09532CE39A382CA2C40D9D9F17647B9E2CA6999BCFB013EC31D1
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
73
TCP/UDP connections
59
DNS requests
55
Threats
5

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
6768
MoUsoCoreWorker.exe
GET
304
20.73.194.208:443
https://settings-win.data.microsoft.com/settings/v3.0/OneSettings/Client?OSVersionFull=10.0.19045.4046.amd64fre.vb_release.191206-1406&LocalDeviceID=s%3ABAD99146-31D3-4EC6-A1A4-BE76F32BA5D4&FlightRing=Retail&AttrDataVer=186&OSUILocale=en-US&OSSkuId=48&App=WOSC&AppVer=&IsFlightingEnabled=0&TelemetryLevel=1&DeviceFamily=Windows.Desktop
US
whitelisted
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAjTxtAB8my1oj8MfWpz%2F7Y%3D
US
binary
312 b
whitelisted
356
svchost.exe
POST
200
20.190.160.2:443
https://login.live.com/RST2.srf
US
xml
1.24 Kb
whitelisted
GET
200
204.79.197.203:80
http://oneocsp.microsoft.com/ocsp/MFQwUjBQME4wTDAJBgUrDgMCGgUABBQ3L3%2F%2Fa6ADK8NraY2GXzVaYrHG4AQUb6t%2B2v%2BXQ3LsO2d33oJhNYhHQoUCEzMAAAAGb6JMMcOVb6sAAAAAAAY%3D
US
binary
958 b
whitelisted
356
svchost.exe
POST
400
20.190.160.2:443
https://login.live.com/ppsecure/deviceaddcredential.srf
US
text
203 b
whitelisted
8700
svchost.exe
GET
304
20.73.194.208:443
https://settings-win.data.microsoft.com/settings/v3.0/WSD/UpdateHealthTools?os=Windows&osVer=10.0.19041.1.amd64fre.vb_release.191206-&sku=48&deviceClass=Windows.Desktop&locale=en-US&deviceId=s:BAD99146-31D3-4EC6-A1A4-BE76F32BA5D4&sampleId=s:95271487&appVer=10.0.19041.3626&FlightRing=Retail&TelemetryLevel=1&HidOverGattReg=C%3A%5CWINDOWS%5CSystem32%5CDriverStore%5CFileRepository%5Chidbthle.inf_amd64_9610b4821fdf82a5%5CMicrosoft.Bluetooth.Profiles.HidOverGatt.dll&AppVer=&ProcessorIdentifier=AMD64%20Family%2023%20Model%201%20Stepping%202&OEMModel=DELL&UpdateOfferedDays=4294967295&ProcessorManufacturer=AuthenticAMD&InstallDate=1661339444&OEMModelBaseBoard=&BranchReadinessLevel=CB&OEMSubModel=J5CR&IsCloudDomainJoined=0&DeferFeatureUpdatePeriodInDays=30&IsDeviceRetailDemo=0&FlightingBranchName=&OSUILocale=en-US&DeviceFamily=Windows.Desktop&WuClientVer=10.0.19041.3996&UninstallActive=1&IsFlightingEnabled=0&OSSkuId=48&ProcessorClockSpeed=3094&TotalPhysicalRAM=6144&SecureBootCapable=0&App=SedimentPack&ProcessorCores=6&CurrentBranch=vb_release&InstallLanguage=en-US&DeferQualityUpdatePeriodInDays=0&OEMName_Uncleaned=DELL&TPMVersion=0&PrimaryDiskTotalCapacity=262144&InstallationType=Client&AttrDataVer=186&ProcessorModel=AMD%20Ryzen%205%203500%206-Core%20Processor&IsEdgeWithChromiumInstalled=1&OSVersion=10.0.19045.4046&IsMDMEnrolled=0&ActivationChannel=Retail&FirmwareVersion=A.40&TrendInstalledKey=1&OSArchitecture=AMD64&DefaultUserRegion=244&UpdateManagementGroup=2
US
whitelisted
7684
SIHClient.exe
GET
304
74.178.240.61:443
https://slscr.update.microsoft.com/SLS/%7B522D76A4-93E1-47F8-B8CE-07C937AD1A1E%7D/x64/10.0.19045.4046/0?CH=686&L=en-US&P=&PT=0x30&WUA=10.0.19041.3996&MK=DELL&MD=DELL
US
whitelisted
356
svchost.exe
POST
400
20.190.160.2:443
https://login.live.com/ppsecure/deviceaddcredential.srf
US
text
203 b
whitelisted
356
svchost.exe
POST
400
20.190.160.2:443
https://login.live.com/ppsecure/deviceaddcredential.srf
US
text
203 b
whitelisted
7684
SIHClient.exe
GET
200
74.178.240.51:443
https://fe3cr.delivery.mp.microsoft.com/clientwebservice/ping
US
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
8700
svchost.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
4
System
192.168.100.255:137
Not routed
whitelisted
5900
RUXIMICS.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
6768
MoUsoCoreWorker.exe
4.231.128.59:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
92.123.104.61:443
www.bing.com
AKAMAI-ASN1
NL
whitelisted
2.17.190.73:80
ocsp.digicert.com
AKAMAI-AS
US
whitelisted
204.79.197.203:80
oneocsp.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
172.211.123.250:443
client.wns.windows.com
MICROSOFT-CORP-MSN-AS-BLOCK
US
whitelisted
4
System
192.168.100.255:138
Not routed
whitelisted
8352
sectoprat.exe.infected.exe
36.255.98.59:443
-Reserved AS-
RO
unknown

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 4.231.128.59
  • 20.73.194.208
whitelisted
www.bing.com
  • 92.123.104.61
  • 92.123.104.38
  • 92.123.104.59
  • 92.123.104.34
  • 92.123.104.17
  • 92.123.104.33
  • 92.123.104.32
  • 92.123.104.19
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
oneocsp.microsoft.com
  • 204.79.197.203
whitelisted
google.com
  • 142.251.127.101
  • 142.251.127.102
  • 142.251.127.139
  • 142.251.127.100
  • 142.251.127.138
  • 142.251.127.113
whitelisted
client.wns.windows.com
  • 172.211.123.250
whitelisted
login.live.com
  • 20.190.160.2
  • 20.190.160.3
  • 40.126.32.72
  • 20.190.160.66
  • 20.190.160.64
  • 20.190.160.131
  • 20.190.160.4
  • 40.126.32.76
whitelisted
crl.microsoft.com
  • 2.16.164.120
  • 2.16.164.49
whitelisted
www.microsoft.com
  • 23.52.181.212
whitelisted
bsc-dataseed1.binance.org
  • 34.250.234.83
  • 176.34.216.27
  • 54.75.67.51
malicious

Threats

PID
Process
Class
Message
8700
svchost.exe
Unknown Traffic
ET USER_AGENTS Microsoft Dr Watson User-Agent (MSDW)
2292
svchost.exe
Misc activity
ET TA_ABUSED_SERVICES DNS Query to Commonly Actor Abused Online Service (bsc-dataseed1 .binance .org)
8352
sectoprat.exe.infected.exe
Misc activity
ET TA_ABUSED_SERVICES Observed Commonly Actor Abused Online Service Domain (bsc-dataseed1 .binance .org in TLS SNI)
8352
sectoprat.exe.infected.exe
A Network Trojan was detected
ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET)
8352
sectoprat.exe.infected.exe
A Network Trojan was detected
ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M3 (GET)
Process
Message
chrome.exe
RecursiveDirectoryCreate( C:\Users\admin\AppData\Local\Temp\nl4ag00p.24v directory exists )
msedge.exe
RecursiveDirectoryCreate( C:\Users\admin\AppData\Local\Temp\beccvztn.ejw directory exists )