| File name: | y |
| Full analysis: | https://app.any.run/tasks/03fd58f5-9fbc-4cf3-9fc8-f6d87f727e47 |
| Verdict: | Malicious activity |
| Threats: | The Arechclient2 malware is a sophisticated .NET-based Remote Access Trojan (RAT) that collects sensitive information, such as browser credentials, from infected computers. It employs various stealth techniques, including Base64 encoding to obscure its code and the ability to pause activities to evade automated security tools. The malware also can adjust Windows Defender settings and uses code injection to manipulate legitimate processes. |
| Analysis date: | March 31, 2025, 15:11:01 |
| OS: | Windows 10 Professional (build: 19044, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, 7 sections |
| MD5: | C60F7746BCDA81F8EEC9770C9FFD84C0 |
| SHA1: | 9D94AC6D422B5A95A3AF7EA1D44A2E6B4C050943 |
| SHA256: | E6B4BC4EA5919D650D663BE4686A5D138CA01950C9CD3473AE10AE4854460E0E |
| SSDEEP: | 98304:6/9ADTpciOT2D4qJHFYLZ5zoXhj0meKCXQ981Vz5DatQT94FYzzPxLleHkbnByL/:zCtXQNLvqWPP |
| .exe | | | Win32 Executable (generic) (52.9) |
|---|---|---|
| .exe | | | Generic Win/DOS Executable (23.5) |
| .exe | | | DOS Executable Generic (23.5) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2023:04:05 13:00:43+00:00 |
| ImageFileCharacteristics: | Executable, 32-bit, Removable run from swap, Net run from swap |
| PEType: | PE32 |
| LinkerVersion: | 14.34 |
| CodeSize: | 442880 |
| InitializedDataSize: | 237056 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x46a50 |
| OSVersion: | 6 |
| ImageVersion: | - |
| SubsystemVersion: | 6 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 8.3.6.0 |
| ProductVersionNumber: | 8.3.6.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | English (U.S.) |
| CharacterSet: | ASCII |
| CompanyName: | Neckline |
| FileDescription: | Greenbottle |
| FileVersion: | 8.3.6.0 |
| InternalName: | burn |
| OriginalFileName: | valse.exe |
| ProductName: | Greenbottle |
| ProductVersion: | 8.3.6.0 |
| LegalCopyright: | Copyright (c) Neckline. All rights reserved. |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 720 | "C:\Users\admin\AppData\Local\Temp\{DA4CDB0B-6735-40C9-9217-CDDEF98F9CC3}\.cr\y.exe" -burn.clean.room="C:\Users\admin\AppData\Local\Temp\y.exe" -burn.filehandle.attached=752 -burn.filehandle.self=756 | C:\Users\admin\AppData\Local\Temp\{DA4CDB0B-6735-40C9-9217-CDDEF98F9CC3}\.cr\y.exe | y.exe | ||||||||||||
User: admin Company: Neckline Integrity Level: MEDIUM Description: Greenbottle Exit code: 3221225477 Version: 8.3.6.0 Modules
| |||||||||||||||
| 1040 | C:\WINDOWS\SysWOW64\WerFault.exe -u -p 720 -s 780 | C:\Windows\SysWOW64\WerFault.exe | — | y.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Problem Reporting Exit code: 0 Version: 10.0.19041.3996 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 1512 | C:\WINDOWS\SysWOW64\WerFault.exe -u -p 720 -s 684 | C:\Windows\SysWOW64\WerFault.exe | — | y.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Problem Reporting Exit code: 0 Version: 10.0.19041.3996 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 2136 | C:\Users\admin\AppData\Roaming\Nodectrl_beta\vcpkgsrv.exe | C:\Users\admin\AppData\Roaming\Nodectrl_beta\vcpkgsrv.exe | vcpkgsrv.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft (R) Visual C++ Package Server Exit code: 1 Version: 17.0.34202.158 built by: D17.7 Modules
| |||||||||||||||
| 2384 | C:\Users\admin\AppData\Local\Temp\{44F14ECB-5131-4B27-9302-B3325FBF52E7}\.ba\vcpkgsrv.exe | C:\Users\admin\AppData\Local\Temp\{44F14ECB-5131-4B27-9302-B3325FBF52E7}\.ba\vcpkgsrv.exe | y.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft (R) Visual C++ Package Server Exit code: 0 Version: 17.0.34202.158 built by: D17.7 Modules
| |||||||||||||||
| 4040 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 4200 | C:\WINDOWS\system32\SppExtComObj.exe -Embedding | C:\Windows\System32\SppExtComObj.Exe | — | svchost.exe | |||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: KMS Connection Broker Version: 10.0.19041.3996 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5988 | C:\WINDOWS\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | C:\Windows\Microsoft.NET\Framework\v4.0.30319\MSBuild.exe | vcpkgsrv.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: MSBuild.exe Version: 4.8.9037.0 built by: NET481REL1 Modules
| |||||||||||||||
| 6032 | "C:\Users\admin\AppData\Local\Temp\y.exe" | C:\Users\admin\AppData\Local\Temp\y.exe | explorer.exe | ||||||||||||
User: admin Company: Neckline Integrity Level: MEDIUM Description: Greenbottle Exit code: 3221225477 Version: 8.3.6.0 Modules
| |||||||||||||||
| 6640 | "C:\WINDOWS\System32\SLUI.exe" RuleId=3482d82e-ca2c-4e1f-8864-da0267b484b2;Action=AutoActivate;AppId=55c92734-d682-4d71-983e-d6ec3f16059f;SkuId=4de7cb65-cdf1-4de9-8ae8-e3cce27b9f2c;NotificationInterval=1440;Trigger=TimerEvent | C:\Windows\System32\slui.exe | — | SppExtComObj.Exe | |||||||||||
User: NETWORK SERVICE Company: Microsoft Corporation Integrity Level: SYSTEM Description: Windows Activation Client Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (5988) MSBuild.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32 |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
| (PID) Process: | (5988) MSBuild.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32 |
| Operation: | write | Name: | EnableAutoFileTracing |
Value: 0 | |||
| (PID) Process: | (5988) MSBuild.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32 |
| Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
| (PID) Process: | (5988) MSBuild.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32 |
| Operation: | write | Name: | FileTracingMask |
Value: | |||
| (PID) Process: | (5988) MSBuild.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32 |
| Operation: | write | Name: | ConsoleTracingMask |
Value: | |||
| (PID) Process: | (5988) MSBuild.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32 |
| Operation: | write | Name: | MaxFileSize |
Value: 1048576 | |||
| (PID) Process: | (5988) MSBuild.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASAPI32 |
| Operation: | write | Name: | FileDirectory |
Value: %windir%\tracing | |||
| (PID) Process: | (5988) MSBuild.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS |
| Operation: | write | Name: | EnableFileTracing |
Value: 0 | |||
| (PID) Process: | (5988) MSBuild.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS |
| Operation: | write | Name: | EnableAutoFileTracing |
Value: 0 | |||
| (PID) Process: | (5988) MSBuild.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\WOW6432Node\Microsoft\Tracing\MSBuild_RASMANCS |
| Operation: | write | Name: | EnableConsoleTracing |
Value: 0 | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 720 | y.exe | C:\Users\admin\AppData\Local\Temp\{44F14ECB-5131-4B27-9302-B3325FBF52E7}\.ba\Lancejack.dll | executable | |
MD5:3E9E67AE80D1A43F62F5E91C8F968B32 | SHA256:E9534B6926E16F599FF3F34E52F001829A5E0BBAF035EF1B81082372C0BF3B94 | |||
| 720 | y.exe | C:\Users\admin\AppData\Local\Temp\{44F14ECB-5131-4B27-9302-B3325FBF52E7}\.ba\smaragd.dat | binary | |
MD5:96A94319614EF5D6F973EA2A3199476B | SHA256:169381848670AB5DB79A6576814C7AD031807E473A94141E768B157BD492DDE7 | |||
| 2136 | vcpkgsrv.exe | C:\Users\admin\AppData\Local\Temp\myxowfgxmjusd | — | |
MD5:— | SHA256:— | |||
| 6032 | y.exe | C:\Users\admin\AppData\Local\Temp\{DA4CDB0B-6735-40C9-9217-CDDEF98F9CC3}\.cr\y.exe | executable | |
MD5:1607B1FDB66920DCFCFBFA2AEE989E07 | SHA256:AE24AA7F073A5E53D4AF1F2AEAF08EF5E516DACB797C63E88702B3AC14E0EE31 | |||
| 720 | y.exe | C:\Users\admin\AppData\Local\Temp\{44F14ECB-5131-4B27-9302-B3325FBF52E7}\.ba\vcruntime140_1.dll | executable | |
MD5:CF0A1C4776FFE23ADA5E570FC36E39FE | SHA256:6FD366A691ED68430BCD0A3DE3D8D19A0CB2102952BFC140BBEF4354ED082C47 | |||
| 2384 | vcpkgsrv.exe | C:\Users\admin\AppData\Roaming\Nodectrl_beta\vcpkgsrv.exe | executable | |
MD5:00FC4EEAA353DA05C9E0B51D6E6A052A | SHA256:5D4E58C4D6F889988DB3B756570241E5A5CC5A52DCC6385FA1E0EB3372AA9DE8 | |||
| 1040 | WerFault.exe | C:\ProgramData\Microsoft\Windows\WER\ReportQueue\AppCrash_y.exe_12ba98f6c3d31cabff4201187fe3459e2a0301d_28d9a5aa_aa0ca0fc-5a7a-4f3e-a515-6d443b70302b\Report.wer | — | |
MD5:— | SHA256:— | |||
| 2384 | vcpkgsrv.exe | C:\Users\admin\AppData\Roaming\Nodectrl_beta\cpfe.dll | executable | |
MD5:53A4020F708F82C4C81376B2DA0CBC7C | SHA256:4ADC0E535657EFE06ECEBFC2E6F999C20289FBE0132890C989B8F4BF6DDBB451 | |||
| 2384 | vcpkgsrv.exe | C:\Users\admin\AppData\Roaming\Nodectrl_beta\vcruntime140_1.dll | executable | |
MD5:CF0A1C4776FFE23ADA5E570FC36E39FE | SHA256:6FD366A691ED68430BCD0A3DE3D8D19A0CB2102952BFC140BBEF4354ED082C47 | |||
| 2384 | vcpkgsrv.exe | C:\Users\admin\AppData\Roaming\Nodectrl_beta\smaragd.dat | binary | |
MD5:96A94319614EF5D6F973EA2A3199476B | SHA256:169381848670AB5DB79A6576814C7AD031807E473A94141E768B157BD492DDE7 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
— | — | GET | 200 | 2.16.164.81:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
5988 | MSBuild.exe | GET | 200 | 45.9.190.157:9000 | http://45.9.190.157:9000/wbinjget?q=EF680CC9EFE0A8BCEC05D07897760CE8 | unknown | — | — | unknown |
6544 | svchost.exe | GET | 200 | 2.23.77.188:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
4696 | SIHClient.exe | GET | 200 | 23.209.214.100:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
4696 | SIHClient.exe | GET | 200 | 23.209.214.100:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
— | — | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
— | — | 2.16.164.81:80 | crl.microsoft.com | Akamai International B.V. | NL | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
3216 | svchost.exe | 20.10.31.115:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
6544 | svchost.exe | 20.190.159.128:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
6544 | svchost.exe | 2.23.77.188:80 | ocsp.digicert.com | AKAMAI-AS | DE | whitelisted |
2104 | svchost.exe | 51.104.136.2:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
5988 | MSBuild.exe | 45.9.190.157:443 | — | Hostinger International Limited | NL | unknown |
4696 | SIHClient.exe | 52.149.20.212:443 | slscr.update.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
google.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
fe3cr.delivery.mp.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
5988 | MSBuild.exe | A Network Trojan was detected | ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M2 (GET) |
5988 | MSBuild.exe | A Network Trojan was detected | ET MALWARE Arechclient2 Backdoor/SecTopRAT Related Activity M3 (GET) |