| File name: | 250513-l2lm6sskzh_pw_infected.zip |
| Full analysis: | https://app.any.run/tasks/89fba79b-8477-4a2d-8ff7-6a8285003d7c |
| Verdict: | Malicious activity |
| Threats: | The Arechclient2 malware is a sophisticated .NET-based Remote Access Trojan (RAT) that collects sensitive information, such as browser credentials, from infected computers. It employs various stealth techniques, including Base64 encoding to obscure its code and the ability to pause activities to evade automated security tools. The malware also can adjust Windows Defender settings and uses code injection to manipulate legitimate processes. |
| Analysis date: | May 15, 2025, 12:20:08 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/zip |
| File info: | Zip archive data, at least v2.0 to extract, compression method=AES Encrypted |
| MD5: | FABD3D11C63DB280AC7DB7D9F5D6EAC2 |
| SHA1: | 01D4042DAB7EB5BEB4367D809A7606DA83308AD0 |
| SHA256: | E065BFC0EC33EA2B35B3EC3D3A44A028EA73A9CC22A26CCC5049F306C00DB4EE |
| SSDEEP: | 98304:lpUWlZj7xGJOBVk09Xxtj5/pyXtKYk7+sJq+MCWXrWN3364bzttkezXQfqWbvG9S:QCeUdI6Y3b62CVcTXZFtECQ1+mps |
| .zip | | | ZIP compressed archive (100) |
|---|
| ZipRequiredVersion: | 20 |
|---|---|
| ZipBitFlag: | 0x0009 |
| ZipCompression: | Unknown (99) |
| ZipModifyDate: | 1980:00:00 00:00:00 |
| ZipCRC: | 0x00000000 |
| ZipCompressedSize: | 15696960 |
| ZipUncompressedSize: | 15692137 |
| ZipFileName: | MDE_File_Sample_a3ccc0114ae3ae2512ebd17a35ee4e4538664459.zip |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 1300 | "C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe" | C:\Windows\Microsoft.NET\Framework\v4.0.30319\InstallUtil.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: .NET Framework installation utility Version: 4.8.9037.0 built by: NET481REL1 Modules
xor-url(PID) Process(1300) InstallUtil.exe Decrypted-URLs (3)http://dl.google.com/chrome/install/375.126/chrome_installer.exev https://github.com https://pastebin.com/raw/mPEc4MgF | |||||||||||||||
| 5984 | "C:\Users\admin\AppData\Roaming\{FFD73791-AE24-408C-88A7-C794B2982BFF}\stickies.exe" | C:\Users\admin\AppData\Roaming\{FFD73791-AE24-408C-88A7-C794B2982BFF}\stickies.exe | — | a3ccc0114ae3ae2512ebd17a35ee4e4538664459.tmp | |||||||||||
User: admin Company: Zhorn Software Integrity Level: MEDIUM Description: Stickies 10.2a Exit code: 4294967295 Version: 10.2a Modules
| |||||||||||||||
| 7184 | "C:\Users\admin\AppData\Local\Temp\is-5K00B.tmp\a3ccc0114ae3ae2512ebd17a35ee4e4538664459.tmp" /SL5="$A02B2,15196242,721408,C:\Users\admin\Desktop\a3ccc0114ae3ae2512ebd17a35ee4e4538664459.exe" /VERYSILENT | C:\Users\admin\AppData\Local\Temp\is-5K00B.tmp\a3ccc0114ae3ae2512ebd17a35ee4e4538664459.tmp | a3ccc0114ae3ae2512ebd17a35ee4e4538664459.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Description: Setup/Uninstall Exit code: 0 Version: 51.1052.0.0 Modules
| |||||||||||||||
| 7200 | "C:\Users\admin\Desktop\a3ccc0114ae3ae2512ebd17a35ee4e4538664459.exe" /VERYSILENT | C:\Users\admin\Desktop\a3ccc0114ae3ae2512ebd17a35ee4e4538664459.exe | a3ccc0114ae3ae2512ebd17a35ee4e4538664459.tmp | ||||||||||||
User: admin Company: Zhorn Software Integrity Level: MEDIUM Description: Stickies 10.2a Exit code: 0 Version: 25.1.2.1 Modules
| |||||||||||||||
| 7212 | C:\WINDOWS\System32\slui.exe -Embedding | C:\Windows\System32\slui.exe | svchost.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Activation Client Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 7252 | "C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\250513-l2lm6sskzh_pw_infected.zip | C:\Program Files\WinRAR\WinRAR.exe | — | explorer.exe | |||||||||||
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Version: 5.91.0 Modules
| |||||||||||||||
| 7544 | "C:\Program Files\WinRAR\WinRAR.exe" C:\Users\admin\AppData\Local\Temp\Rar$DIb7252.44098\MDE_File_Sample_a3ccc0114ae3ae2512ebd17a35ee4e4538664459.zip | C:\Program Files\WinRAR\WinRAR.exe | WinRAR.exe | ||||||||||||
User: admin Company: Alexander Roshal Integrity Level: MEDIUM Description: WinRAR archiver Version: 5.91.0 Modules
| |||||||||||||||
| 8020 | C:\WINDOWS\system32\OpenWith.exe -Embedding | C:\Windows\System32\OpenWith.exe | — | svchost.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Pick an app Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 8140 | "C:\Users\admin\Desktop\a3ccc0114ae3ae2512ebd17a35ee4e4538664459.exe" | C:\Users\admin\Desktop\a3ccc0114ae3ae2512ebd17a35ee4e4538664459.exe | explorer.exe | ||||||||||||
User: admin Company: Zhorn Software Integrity Level: MEDIUM Description: Stickies 10.2a Exit code: 1 Version: 25.1.2.1 Modules
| |||||||||||||||
| 8160 | "C:\Users\admin\AppData\Local\Temp\is-9B066.tmp\a3ccc0114ae3ae2512ebd17a35ee4e4538664459.tmp" /SL5="$C02E8,15196242,721408,C:\Users\admin\Desktop\a3ccc0114ae3ae2512ebd17a35ee4e4538664459.exe" | C:\Users\admin\AppData\Local\Temp\is-9B066.tmp\a3ccc0114ae3ae2512ebd17a35ee4e4538664459.tmp | a3ccc0114ae3ae2512ebd17a35ee4e4538664459.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Description: Setup/Uninstall Exit code: 1 Version: 51.1052.0.0 Modules
| |||||||||||||||
| (PID) Process: | (7252) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 3 |
Value: C:\Users\admin\Desktop\preferences.zip | |||
| (PID) Process: | (7252) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 2 |
Value: C:\Users\admin\Desktop\chromium_ext.zip | |||
| (PID) Process: | (7252) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 1 |
Value: C:\Users\admin\Desktop\omni_23_10_2024_.zip | |||
| (PID) Process: | (7252) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 0 |
Value: C:\Users\admin\AppData\Local\Temp\250513-l2lm6sskzh_pw_infected.zip | |||
| (PID) Process: | (7252) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | name |
Value: 120 | |||
| (PID) Process: | (7252) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | size |
Value: 80 | |||
| (PID) Process: | (7252) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | type |
Value: 120 | |||
| (PID) Process: | (7252) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths |
| Operation: | write | Name: | mtime |
Value: 100 | |||
| (PID) Process: | (7252) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface |
| Operation: | write | Name: | ShowPassword |
Value: 0 | |||
| (PID) Process: | (7544) WinRAR.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory |
| Operation: | write | Name: | 3 |
Value: C:\Users\admin\Desktop\chromium_ext.zip | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 7252 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DIb7252.44098\MDE_File_Sample_a3ccc0114ae3ae2512ebd17a35ee4e4538664459.zip | compressed | |
MD5:B19B6F1C7E6E24CBD6BDE9DB063A0EA1 | SHA256:601D608BC2D588D71DA813457C5D74B87F88776CAD898B12FA838E3BC3FE7196 | |||
| 8160 | a3ccc0114ae3ae2512ebd17a35ee4e4538664459.tmp | C:\Users\admin\AppData\Local\Temp\is-VT2T9.tmp\_isetup\_setup64.tmp | executable | |
MD5:E4211D6D009757C078A9FAC7FF4F03D4 | SHA256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95 | |||
| 7544 | WinRAR.exe | C:\Users\admin\AppData\Local\Temp\Rar$DRb7544.45095\a3ccc0114ae3ae2512ebd17a35ee4e4538664459 | executable | |
MD5:5BB63E98FBD296FA1CE018DC6EC67189 | SHA256:E36D6F94FDF6E6B8DC2E4D304A6E9E2A67A79BDA469D9AB791B1F6207FA86AE9 | |||
| 8160 | a3ccc0114ae3ae2512ebd17a35ee4e4538664459.tmp | C:\Users\admin\AppData\Local\Temp\is-VT2T9.tmp\_isetup\_iscrypt.dll | executable | |
MD5:A69559718AB506675E907FE49DEB71E9 | SHA256:2F6294F9AA09F59A574B5DCD33BE54E16B39377984F3D5658CDA44950FA0F8FC | |||
| 7184 | a3ccc0114ae3ae2512ebd17a35ee4e4538664459.tmp | C:\Users\admin\AppData\Local\Temp\is-0SMGH.tmp\_isetup\_iscrypt.dll | executable | |
MD5:A69559718AB506675E907FE49DEB71E9 | SHA256:2F6294F9AA09F59A574B5DCD33BE54E16B39377984F3D5658CDA44950FA0F8FC | |||
| 7200 | a3ccc0114ae3ae2512ebd17a35ee4e4538664459.exe | C:\Users\admin\AppData\Local\Temp\is-5K00B.tmp\a3ccc0114ae3ae2512ebd17a35ee4e4538664459.tmp | executable | |
MD5:797B09E2DCF988B4320DDCDD4CB936F0 | SHA256:1A93F3E99AFAE583E7AD643C3A0850E7136CF727C6DEAD288F482214837F9B4C | |||
| 7184 | a3ccc0114ae3ae2512ebd17a35ee4e4538664459.tmp | C:\Users\admin\AppData\Local\Temp\is-0SMGH.tmp\_isetup\_isdecmp.dll | executable | |
MD5:77D6D961F71A8C558513BED6FD0AD6F1 | SHA256:5DA7C8D33D3B7DB46277012D92875C0B850C8ABF1EB3C8C9C5B9532089A0BCF0 | |||
| 7184 | a3ccc0114ae3ae2512ebd17a35ee4e4538664459.tmp | C:\Users\admin\AppData\Local\Temp\is-0SMGH.tmp\_isetup\_setup64.tmp | executable | |
MD5:E4211D6D009757C078A9FAC7FF4F03D4 | SHA256:388A796580234EFC95F3B1C70AD4CB44BFDDC7BA0F9203BF4902B9929B136F95 | |||
| 8140 | a3ccc0114ae3ae2512ebd17a35ee4e4538664459.exe | C:\Users\admin\AppData\Local\Temp\is-9B066.tmp\a3ccc0114ae3ae2512ebd17a35ee4e4538664459.tmp | executable | |
MD5:797B09E2DCF988B4320DDCDD4CB936F0 | SHA256:1A93F3E99AFAE583E7AD643C3A0850E7136CF727C6DEAD288F482214837F9B4C | |||
| 8160 | a3ccc0114ae3ae2512ebd17a35ee4e4538664459.tmp | C:\Users\admin\AppData\Local\Temp\is-VT2T9.tmp\_isetup\_isdecmp.dll | executable | |
MD5:77D6D961F71A8C558513BED6FD0AD6F1 | SHA256:5DA7C8D33D3B7DB46277012D92875C0B850C8ABF1EB3C8C9C5B9532089A0BCF0 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
2104 | svchost.exe | GET | 200 | 23.35.229.160:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
— | — | GET | 200 | 2.17.190.73:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
7872 | SIHClient.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
2104 | svchost.exe | GET | 200 | 23.48.23.156:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
7872 | SIHClient.exe | GET | 200 | 95.101.149.131:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
1300 | InstallUtil.exe | GET | 200 | 147.93.57.117:9000 | http://147.93.57.117:9000/wbinjget?q=EF680CC9EFE0A8BCEC05D07897760CE8 | unknown | — | — | unknown |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
— | — | 172.211.123.248:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | FR | whitelisted |
— | — | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
2104 | svchost.exe | 23.48.23.156:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
2104 | svchost.exe | 23.35.229.160:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
6544 | svchost.exe | 20.190.159.64:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 2.17.190.73:80 | ocsp.digicert.com | AKAMAI-AS | DE | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
2104 | svchost.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
5496 | MoUsoCoreWorker.exe | 4.231.128.59:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
Domain | IP | Reputation |
|---|---|---|
client.wns.windows.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
nexusrules.officeapps.live.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
1300 | InstallUtil.exe | A Network Trojan was detected | ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) |
1300 | InstallUtil.exe | A Network Trojan was detected | ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M3 (GET) |