File name:

FOCA-v3.4.7.1.zip

Full analysis: https://app.any.run/tasks/59e6b3da-878b-41a4-98cf-c39e26d87b54
Verdict: Malicious activity
Analysis date: January 08, 2024, 12:53:33
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract
MD5:

22E6D94D033016C0A98832EBC6480A1B

SHA1:

32C437FE0C06D2E11F6B574B3CF72731289AFEE7

SHA256:

2B7F2CA60DC56245C0101BF171F13A1AE3E89AB93022A969011A08D06270E7FD

SSDEEP:

98304:Tbt+/Y1nt2gIteDX5Xr82ziM7lDdtxlkEMl7RDrlEZkT8dN7ufXvIfK+BxNm0ohN:BxcWMF+o3v

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • The process creates files with name similar to system file names

      • WinRAR.exe (PID: 124)
    • Reads the Internet Settings

      • FOCA.exe (PID: 1632)
  • INFO

    • Drops the executable file immediately after the start

      • WinRAR.exe (PID: 124)
    • Process drops legitimate windows executable

      • WinRAR.exe (PID: 124)
    • Checks supported languages

      • FOCA.exe (PID: 1632)
    • Reads the computer name

      • FOCA.exe (PID: 1632)
    • Manual execution by a user

      • FOCA.exe (PID: 1632)
      • taskmgr.exe (PID: 1544)
    • Reads the machine GUID from the registry

      • FOCA.exe (PID: 1632)
    • Creates files in the program directory

      • FOCA.exe (PID: 1632)
    • Connects to unusual port

      • FOCA.exe (PID: 1632)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: Deflated
ZipModifyDate: 2020:02:20 12:36:06
ZipCRC: 0x5d948e30
ZipCompressedSize: 7880
ZipUncompressedSize: 17408
ZipFileName: BaseSDK.dll
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
37
Monitored processes
3
Malicious processes
0
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe no specs foca.exe taskmgr.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
124"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\Desktop\FOCA-v3.4.7.1.zip"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
1544"C:\Windows\system32\taskmgr.exe" /4C:\Windows\System32\taskmgr.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Task Manager
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\taskmgr.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
1632"C:\Users\admin\Desktop\FOCA.exe" C:\Users\admin\Desktop\FOCA.exe
explorer.exe
User:
admin
Company:
elevenpaths
Integrity Level:
MEDIUM
Description:
FOCA (Open Source)
Exit code:
0
Version:
3.4.7.1
Modules
Images
c:\users\admin\desktop\foca.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\mscoree.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\microsoft.net\framework\v4.0.30319\mscoreei.dll
Total events
1 305
Read events
1 277
Write events
28
Delete events
0

Modification events

(PID) Process:(124) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\182\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(124) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip
(PID) Process:(124) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\phacker.zip
(PID) Process:(124) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(124) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\curl-8.5.0_1-win32-mingw.zip
(PID) Process:(124) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(124) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(124) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(124) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(124) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\MainWin
Operation:writeName:Placement
Value:
2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF42000000420000000204000037020000
Executable files
41
Suspicious files
1
Text files
3
Unknown types
0

Dropped files

PID
Process
Filename
Type
124WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa124.41910\Google.Apis.Customsearch.v1.dllexecutable
MD5:6B56E5A3CCA6473DA6807D1A54392E93
SHA256:FEE3A2E3F33F28AC3729069AC3F10B979394997DEA56093040551581A205165E
124WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa124.41910\FOCA.exeexecutable
MD5:BDEAF3E240B199E642D16CD6C6535F90
SHA256:1A1654F5F3B39A563BDCC5F17149C9514D075ABC25C18E637DA7C0DA92AA1523
124WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa124.41910\DotNetZip.dllexecutable
MD5:60CAABBD43235889D64F230617C0E24E
SHA256:4D7851BB977D7BD1D7503E994BC4C4083FAA2751F41624237309157B1B88681D
124WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa124.41910\de\PdfSharp.Charting.resources.dllexecutable
MD5:0DCCDE78C88B05DAB40D4A756F3B4735
SHA256:7301AAEF6E13B62D47636C246F08914F0B7C4734D2A8C1EC9489AF43BA9C71B8
124WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa124.41910\FOCA.exe.configxml
MD5:6C92329C05FCF57D272273807D5E63CD
SHA256:729FD10327A1EE98D0FF877FE2F6A6A20261CD81F7CBED7057DBCF8513173EBC
124WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa124.41910\Google.Apis.PlatformServices.dllexecutable
MD5:7C2DF27D09820B6E74EE7AADECAB447D
SHA256:B9E3BB1B3E14B2CA104B6D906464A7A4BE1A39D54B27CC1164C0BD8C5ED793B3
124WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa124.41910\EntityFramework.SqlServer.dllexecutable
MD5:1F16D47FACE0CD4A0B0335923FD5AB84
SHA256:A82C08834CEEDA5B49F28E934687F71AF2300BDAD6DF5EB4A9DB51F6CFEEBE56
124WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa124.41910\com.rusanu.dataconnectiondialog.dllexecutable
MD5:EB680C2FE9679348820810FB292CEDAA
SHA256:8AAFDD33EF1CD9BF411A394968A61F533CE26C7200CEEB235684571897710850
124WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa124.41910\DiarioSDKNet.dllexecutable
MD5:2156CF81A4D7F0F83807154B9D4DB88F
SHA256:9742747AF034A1E8DFD0BA897F9FBF6FF9BC217D27C609DFCF874068575DF6FF
124WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa124.41910\EntityFramework.dllexecutable
MD5:2354C79962BF18BD66C7C34F6104B02F
SHA256:ECF7EE2EFFCD6E91E792FA5658D58D85D69A19C9F7C06E533ECBDCC9F61A9A4C
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
0
TCP/UDP connections
13
DNS requests
5
Threats
0

HTTP requests

No HTTP requests
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
4
System
192.168.100.255:138
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown
1632
FOCA.exe
188.114.97.3:1433
www.spynote.us
CLOUDFLARENET
NL
unknown
1632
FOCA.exe
188.114.96.3:1433
www.spynote.us
CLOUDFLARENET
NL
unknown
4
System
188.114.97.3:445
www.spynote.us
CLOUDFLARENET
NL
unknown
4
System
188.114.96.3:445
www.spynote.us
CLOUDFLARENET
NL
unknown

DNS requests

Domain
IP
Reputation
www.spynote.us
  • 188.114.97.3
  • 188.114.96.3
malicious
dns.msftncsi.com
  • 131.107.255.255
shared

Threats

No threats detected
No debug info