| File name: | Trojan.Autorun_Gen.Trojan.Heur.AutoIT.13.vir |
| Full analysis: | https://app.any.run/tasks/690fdbd2-6275-4583-9ca0-8e6629130c53 |
| Verdict: | Malicious activity |
| Threats: | Pony is a malware with two main functions — stealing information and dropping other viruses with different tasks on infected machines. It has been around since 2011, and it still actively attacks users in Europe and America. |
| Analysis date: | October 15, 2024, 16:02:58 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Tags: | |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
| MD5: | FA7A1631977A299AFA812A5F939F1027 |
| SHA1: | B01A0078E8598CA33D3F837645F8738D57B9647C |
| SHA256: | 2F5405E375AB1B358882068B957E8CF2F7CAEB847DF3E2160A6CDDE89D76170D |
| SSDEEP: | 49152:DHlGAXWQkC2R/QORBt7QjFtmcaTH/vU4do9Pcjq1GvXB1sgPR8N32+Rr181vWDZk:oAGQX21RBt7QjTmcaTH/vU4do9Pcjq1G |
| .exe | | | DOS Executable Generic (100) |
|---|
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2019:05:12 22:53:14+00:00 |
| ImageFileCharacteristics: | Executable, Large address aware, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 12 |
| CodeSize: | 581120 |
| InitializedDataSize: | 601600 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x27dcd |
| OSVersion: | 5.1 |
| ImageVersion: | - |
| SubsystemVersion: | 5.1 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 1.0.0.0 |
| ProductVersionNumber: | 1.0.0.0 |
| FileFlagsMask: | 0x0000 |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Dynamic link library |
| FileSubtype: | - |
| LanguageCode: | English (U.S.) |
| CharacterSet: | Unicode |
| FileDescription: | DPTopologyAppv2_0 |
| OriginalFileName: | AuditPolicyGPInterop |
| CompanyName: | ktmutil |
| FileVersion: | 110.713.104.654 |
| LegalCopyright: | setupugc |
| ProductName: | bridgeres |
| ProductVersion: | 812.318.935.877 |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 2280 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5616 | \??\C:\WINDOWS\system32\conhost.exe 0xffffffff -ForceV1 | C:\Windows\System32\conhost.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 5828 | "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe" | C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe | Trojan.Autorun_Gen.Trojan.Heur.AutoIT.13.vir.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft .NET Assembly Registration Utility Exit code: 0 Version: 2.0.50727.9149 (WinRelRS6.050727-9100) Modules
| |||||||||||||||
| 6044 | TimeOut 1 | C:\Windows\SysWOW64\timeout.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: timeout - pauses command processing Exit code: 0 Version: 10.0.19041.1 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6364 | "C:\Windows\System32\cmd.exe" /c TimeOut 1 & Del /F "C:\Users\admin\Desktop\Trojan.Autorun_Gen.Trojan.Heur.AutoIT.13.vir.exe" | C:\Windows\SysWOW64\cmd.exe | — | Trojan.Autorun_Gen.Trojan.Heur.AutoIT.13.vir.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| 6504 | "C:\Users\admin\Desktop\Trojan.Autorun_Gen.Trojan.Heur.AutoIT.13.vir.exe" | C:\Users\admin\Desktop\Trojan.Autorun_Gen.Trojan.Heur.AutoIT.13.vir.exe | explorer.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
| 7124 | C:\WINDOWS\system32\cmd.exe /c ""C:\Users\admin\AppData\Local\Temp\609078.bat" "C:\Windows\Microsoft.NET\Framework\v2.0.50727\RegAsm.exe" " | C:\Windows\SysWOW64\cmd.exe | — | RegAsm.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Version: 10.0.19041.3636 (WinBuild.160101.0800) Modules
| |||||||||||||||
| (PID) Process: | (5828) RegAsm.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\WinRAR |
| Operation: | write | Name: | HWID |
Value: 7B30393131463945302D464437432D344637412D423131372D4442373638334145433134397D | |||
| (PID) Process: | (5828) RegAsm.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content |
| Operation: | write | Name: | CachePrefix |
Value: | |||
| (PID) Process: | (5828) RegAsm.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (5828) RegAsm.exe | Key: | HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 5828 | RegAsm.exe | C:\Users\admin\AppData\Local\Temp\609078.bat | text | |
MD5:3880EEB1C736D853EB13B44898B718AB | SHA256:936D9411D5226B7C5A150ECAF422987590A8870C8E095E1CAA072273041A86E7 | |||
| 6504 | Trojan.Autorun_Gen.Trojan.Heur.AutoIT.13.vir.exe | C:\Users\admin\AppData\Roaming\BitLockerWizardElev\CallHistoryClient.exe | executable | |
MD5:F09BF67C7EC5A016462890E3C761CDD9 | SHA256:538D3BB9F653114E7AE008F3262A75B0C84A4B55B9B794BAEFB3750058164F85 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
6944 | svchost.exe | GET | 200 | 2.16.241.19:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
5828 | RegAsm.exe | POST | — | 185.79.156.18:80 | http://185.79.156.18/bit/03/gate.php | unknown | — | — | malicious |
5700 | RUXIMICS.exe | GET | 200 | 2.16.241.19:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
5700 | RUXIMICS.exe | GET | 200 | 88.221.169.152:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
6944 | svchost.exe | GET | 200 | 88.221.169.152:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
5488 | MoUsoCoreWorker.exe | GET | 200 | 88.221.169.152:80 | http://www.microsoft.com/pkiops/crl/MicSecSerCA2011_2011-10-18.crl | unknown | — | — | whitelisted |
5828 | RegAsm.exe | POST | — | 185.79.156.18:80 | http://185.79.156.18/bit/03/gate.php | unknown | — | — | malicious |
5828 | RegAsm.exe | POST | — | 185.79.156.18:80 | http://185.79.156.18/bit/03/gate.php | unknown | — | — | malicious |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
4 | System | 192.168.100.255:137 | — | — | — | whitelisted |
6944 | svchost.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
5488 | MoUsoCoreWorker.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
5700 | RUXIMICS.exe | 51.124.78.146:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
— | — | 2.23.209.143:443 | www.bing.com | Akamai International B.V. | GB | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
5700 | RUXIMICS.exe | 2.16.241.19:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
6944 | svchost.exe | 2.16.241.19:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
5828 | RegAsm.exe | 185.79.156.18:80 | — | Iran Telecommunication Company PJS | IR | malicious |
6944 | svchost.exe | 88.221.169.152:80 | www.microsoft.com | AKAMAI-AS | DE | whitelisted |
Domain | IP | Reputation |
|---|---|---|
settings-win.data.microsoft.com |
| whitelisted |
www.bing.com |
| whitelisted |
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |
self.events.data.microsoft.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
5828 | RegAsm.exe | Malware Command and Control Activity Detected | ET MALWARE Fareit/Pony Downloader Checkin 2 |
5828 | RegAsm.exe | Potential Corporate Privacy Violation | ET POLICY Unsupported/Fake Internet Explorer Version MSIE 5. |
5828 | RegAsm.exe | A Network Trojan was detected | ET MALWARE Trojan Generic - POST To gate.php with no referer |
5828 | RegAsm.exe | Potential Corporate Privacy Violation | ET POLICY Windows 98 User-Agent Detected - Possible Malware or Non-Updated System |
5828 | RegAsm.exe | A Network Trojan was detected | ET MALWARE Pony Downloader HTTP Library MSIE 5 Win98 |
5828 | RegAsm.exe | A Network Trojan was detected | ET MALWARE Generic Request to gate.php Dotted-Quad |
5828 | RegAsm.exe | Malware Command and Control Activity Detected | ET MALWARE Fareit/Pony Downloader Checkin 2 |
5828 | RegAsm.exe | Potential Corporate Privacy Violation | ET POLICY Unsupported/Fake Internet Explorer Version MSIE 5. |
5828 | RegAsm.exe | A Network Trojan was detected | ET MALWARE Generic Request to gate.php Dotted-Quad |
5828 | RegAsm.exe | A Network Trojan was detected | ET MALWARE Pony Downloader HTTP Library MSIE 5 Win98 |