File name:

Net.Fox_Tool 2.3321.zip

Full analysis: https://app.any.run/tasks/02e397f7-8bef-4985-b2e2-e88889219e2e
Verdict: Malicious activity
Analysis date: June 21, 2025, 19:36:21
OS: Windows 10 Professional (build: 19044, 64 bit)
Tags:
themida
Indicators:
MIME: application/zip
File info: Zip archive data, at least v2.0 to extract, compression method=store
MD5:

82E5B7D48ACB952BB729BECD13A62622

SHA1:

D188521755222540F13E3515A942FC81E4A218F9

SHA256:

3B3EC10756AFFE8813EEBF7C295C0DEDFCD2180ACA12198C8F3D1048D26AF999

SSDEEP:

98304:Y7pg9/wmMWlwGX5f0XD190qfF7EcHhTiYxtfaNgGSSqN3dV9bYa9Mdvs91Rp1CRv:yg+1yXu8ZLA0aKdpLHqGrzxWcAsURgxL

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    No malicious indicators.
  • SUSPICIOUS

    • Process drops legitimate windows executable

      • WinRAR.exe (PID: 3656)
    • Executable content was dropped or overwritten

      • Net.Fox_Tool 2.3.exe (PID: 984)
    • There is functionality for taking screenshot (YARA)

      • Net.Fox_Tool 2.3.exe (PID: 984)
    • Reads the BIOS version

      • Net.Fox_Tool 2.3.exe (PID: 984)
    • Reads security settings of Internet Explorer

      • Net.Fox_Tool 2.3.exe (PID: 984)
  • INFO

    • Manual execution by a user

      • Net.Fox_Tool 2.3.exe (PID: 5400)
      • Net.Fox_Tool 2.3.exe (PID: 984)
    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 3656)
    • Process checks whether UAC notifications are on

      • Net.Fox_Tool 2.3.exe (PID: 984)
    • Create files in a temporary directory

      • Net.Fox_Tool 2.3.exe (PID: 984)
    • Reads the machine GUID from the registry

      • Net.Fox_Tool 2.3.exe (PID: 984)
    • Themida protector has been detected

      • Net.Fox_Tool 2.3.exe (PID: 984)
    • Reads the software policy settings

      • slui.exe (PID: 2716)
      • Net.Fox_Tool 2.3.exe (PID: 984)
    • Checks proxy server information

      • slui.exe (PID: 2716)
      • Net.Fox_Tool 2.3.exe (PID: 984)
    • Checks supported languages

      • Net.Fox_Tool 2.3.exe (PID: 984)
    • Reads the computer name

      • Net.Fox_Tool 2.3.exe (PID: 984)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.zip | ZIP compressed archive (100)

EXIF

ZIP

ZipRequiredVersion: 20
ZipBitFlag: -
ZipCompression: None
ZipModifyDate: 2025:06:22 04:31:12
ZipCRC: 0x00000000
ZipCompressedSize: -
ZipUncompressedSize: -
ZipFileName: Net.Fox_Tool 2.3/
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
139
Monitored processes
5
Malicious processes
1
Suspicious processes
0

Behavior graph

Click at the process to see the details
start winrar.exe rundll32.exe no specs net.fox_tool 2.3.exe no specs net.fox_tool 2.3.exe slui.exe

Process information

PID
CMD
Path
Indicators
Parent process
984"C:\Users\admin\Desktop\Net.Fox_Tool 2.3\Net.Fox_Tool 2.3.exe" C:\Users\admin\Desktop\Net.Fox_Tool 2.3\Net.Fox_Tool 2.3.exe
explorer.exe
User:
admin
Integrity Level:
HIGH
Description:
NETFOXEXPLOIT2.3
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\net.fox_tool 2.3\net.fox_tool 2.3.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
c:\windows\system32\wow64.dll
c:\windows\system32\wow64win.dll
c:\windows\system32\wow64cpu.dll
c:\windows\syswow64\mscoree.dll
c:\windows\syswow64\kernel32.dll
c:\windows\syswow64\kernelbase.dll
c:\windows\syswow64\apphelp.dll
2716C:\WINDOWS\System32\slui.exe -EmbeddingC:\Windows\System32\slui.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Activation Client
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\slui.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\bcrypt.dll
c:\windows\system32\user32.dll
3100C:\WINDOWS\System32\rundll32.exe C:\WINDOWS\System32\shell32.dll,SHCreateLocalServerRunDll {9aa46009-3ce0-458a-a354-715610a075e6} -EmbeddingC:\Windows\System32\rundll32.exesvchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows host process (Rundll32)
Exit code:
0
Version:
10.0.19041.1 (WinBuild.160101.0800)
Modules
Images
c:\windows\system32\rundll32.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\combase.dll
c:\windows\system32\ucrtbase.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\shcore.dll
c:\windows\system32\imagehlp.dll
3656"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Net.Fox_Tool 2.3321.zip"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\win32u.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\gdi32full.dll
c:\windows\system32\msvcp_win.dll
c:\windows\system32\ucrtbase.dll
5400"C:\Users\admin\Desktop\Net.Fox_Tool 2.3\Net.Fox_Tool 2.3.exe" C:\Users\admin\Desktop\Net.Fox_Tool 2.3\Net.Fox_Tool 2.3.exeexplorer.exe
User:
admin
Integrity Level:
MEDIUM
Description:
NETFOXEXPLOIT2.3
Exit code:
3221226540
Version:
1.0.0.0
Modules
Images
c:\users\admin\desktop\net.fox_tool 2.3\net.fox_tool 2.3.exe
c:\windows\system32\ntdll.dll
c:\windows\syswow64\ntdll.dll
Total events
8 844
Read events
8 824
Write events
20
Delete events
0

Modification events

(PID) Process:(3656) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(3656) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(3656) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:3
Value:
C:\Users\admin\Desktop\preferences.zip
(PID) Process:(3656) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\chromium_ext.zip
(PID) Process:(3656) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\omni_23_10_2024_.zip
(PID) Process:(3656) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\Net.Fox_Tool 2.3321.zip
(PID) Process:(3656) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3656) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3656) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(3656) WinRAR.exeKey:HKEY_CURRENT_USER\SOFTWARE\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
Executable files
14
Suspicious files
4
Text files
11
Unknown types
0

Dropped files

PID
Process
Filename
Type
3656WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3656.40847\Net.Fox_Tool 2.3\NAudio.Core.xmlxml
MD5:3EC48FA66AB5CF0A3EC350D550957C0C
SHA256:EF3C495408488D648888C1A571B83E858F7CDCB65B7A9B71EE1808B50CC07C4C
3656WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3656.40847\Net.Fox_Tool 2.3\NAudio.Asio.xmlxml
MD5:C416A46EE20410C9989A5145F33BFD0E
SHA256:79C97FFAFC1860285CD19CAFE104C9AD4739D8CA5958575DE4C6995A5A531B3D
3656WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3656.40847\Net.Fox_Tool 2.3\NAudio.Wasapi.dllexecutable
MD5:278EBB79DA14ECF8E0559530C2FDA076
SHA256:618EF0E49D64E7A66DFE64BBF6AE81705B9D9683D8A9F321E5C3024D666BDF82
3656WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3656.40847\Net.Fox_Tool 2.3\NAudio.Asio.dllexecutable
MD5:EB254B04D63A9F03B77563243805F68F
SHA256:CA03780217139B37F7F5B6921D59DEFB8D24988315B16B167A77FA88CAA7D00F
3656WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3656.40847\Net.Fox_Tool 2.3\NAudio.Midi.dllexecutable
MD5:3F5C79100F4F7902114C3FCBA275C606
SHA256:F246E29921797B173B54229685E997A11F9CC388FA1E589C212328ABD7A94EBE
3656WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3656.40847\Net.Fox_Tool 2.3\NAudio.Core.dllexecutable
MD5:48867F392B8E77DC06C062638C6FBD36
SHA256:FCF493FC47A2F478A65303886B975FBDBF714CBB1F2D79F7FCE97E4BB16B01A8
3656WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3656.40847\Net.Fox_Tool 2.3\NAudio.Midi.xmlxml
MD5:0C57AAD70E5F035FA40B1FE21D755B4D
SHA256:B890AB3831E49FE591F9524FD1EC681CFF0715ABF439312E93ECCBD31DC9FFF4
3656WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3656.40847\Net.Fox_Tool 2.3\NAudio.Wasapi.xmlxml
MD5:D7BD89579E563D6EFD6411CE146111B1
SHA256:154BFAAB7A4A8C9AE177CDCA77F3F2974ECEA8E7AD39A0EEAB2176320D1B2892
3656WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3656.40847\Net.Fox_Tool 2.3\dnlib.dllexecutable
MD5:3D913AAB7B1C514502C6A232E37D470E
SHA256:BDB84AA16678189510DEF7C589851F6EA15E60FF977EA4C7C8C156504E6AC0FF
3656WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3656.40847\Net.Fox_Tool 2.3\Microsoft.Win32.Registry.xmlxml
MD5:343B6690BBFEFE724D44538B1D149367
SHA256:486BBB53EA7CDA26D344929BD80829F604BD19713F1B39CD7A7EA956C189F324
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
8
TCP/UDP connections
26
DNS requests
17
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1268
svchost.exe
GET
200
23.55.104.172:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
1268
svchost.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl
unknown
whitelisted
984
Net.Fox_Tool 2.3.exe
GET
200
23.55.104.172:80
http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl
unknown
whitelisted
984
Net.Fox_Tool 2.3.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/MicCodSigPCA2011_2011-07-08.crl
unknown
whitelisted
3480
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl
unknown
whitelisted
4168
svchost.exe
GET
200
2.17.190.73:80
http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D
unknown
whitelisted
3480
SIHClient.exe
GET
200
95.101.149.131:80
http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl
unknown
whitelisted
2940
svchost.exe
GET
200
23.209.209.135:80
http://x1.c.lencr.org/
unknown
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:137
whitelisted
5944
MoUsoCoreWorker.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
1268
svchost.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
3956
RUXIMICS.exe
51.104.136.2:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
IE
whitelisted
4
System
192.168.100.255:138
whitelisted
1268
svchost.exe
51.124.78.146:443
settings-win.data.microsoft.com
MICROSOFT-CORP-MSN-AS-BLOCK
NL
whitelisted
1268
svchost.exe
23.55.104.172:80
crl.microsoft.com
Akamai International B.V.
US
whitelisted
1268
svchost.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted
984
Net.Fox_Tool 2.3.exe
23.55.104.172:80
crl.microsoft.com
Akamai International B.V.
US
whitelisted
984
Net.Fox_Tool 2.3.exe
95.101.149.131:80
www.microsoft.com
Akamai International B.V.
NL
whitelisted

DNS requests

Domain
IP
Reputation
settings-win.data.microsoft.com
  • 51.104.136.2
  • 51.124.78.146
  • 4.231.128.59
whitelisted
google.com
  • 142.250.186.78
whitelisted
crl.microsoft.com
  • 23.55.104.172
  • 23.55.104.190
whitelisted
www.microsoft.com
  • 95.101.149.131
whitelisted
slscr.update.microsoft.com
  • 52.149.20.212
whitelisted
fe3cr.delivery.mp.microsoft.com
  • 40.69.42.241
whitelisted
login.live.com
  • 20.190.160.3
  • 20.190.160.20
  • 20.190.160.66
  • 20.190.160.2
  • 40.126.32.68
  • 20.190.160.65
  • 40.126.32.133
  • 40.126.32.76
whitelisted
ocsp.digicert.com
  • 2.17.190.73
whitelisted
client.wns.windows.com
  • 172.211.123.248
whitelisted
activation-v2.sls.microsoft.com
  • 40.91.76.224
whitelisted

Threats

No threats detected
No debug info