File name:

Tender_0086365327_output5AFA060.ace

Full analysis: https://app.any.run/tasks/5a6c5b04-4d96-460f-9d8c-5e2990b37097
Verdict: Malicious activity
Threats:

Pony is a malware with two main functions — stealing information and dropping other viruses with different tasks on infected machines. It has been around since 2011, and it still actively attacks users in Europe and America.

Analysis date: December 06, 2018, 08:08:56
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
pony
fareit
Indicators:
MIME: application/x-rar
File info: RAR archive data, v5
MD5:

0239B0165560AA691D12DB490387EE57

SHA1:

665A6D17079B3277A36D45DDA79D29E3C4C4B55C

SHA256:

429811EF7FF2D0F3B94135FFF17C612A8CA3A9F2968B5EB739AC6224CD9A5E99

SSDEEP:

3072:5TnfG/uqF/kz4TqhDudsX8k7xO0+3xP/isYILBcc16keU6TpkEbZotCfSzo:xW/kUcuU/7xOB3rlcc4DU6TCooAfSzo

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • Tender_0086365327_output5AFA060.bat (PID: 2784)
      • win73.bat (PID: 3100)
      • win73.bat (PID: 2396)
      • Tender_0086365327_output5AFA060.bat (PID: 2528)
    • Changes the autorun value in the registry

      • WScript.exe (PID: 2956)
    • Detected Pony/Fareit Trojan

      • win73.bat (PID: 2396)
    • Actions looks like stealing of personal data

      • win73.bat (PID: 2396)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2728)
      • Tender_0086365327_output5AFA060.bat (PID: 2784)
    • Starts application with an unusual extension

      • WinRAR.exe (PID: 2728)
      • Tender_0086365327_output5AFA060.bat (PID: 2784)
      • win73.bat (PID: 3100)
    • Suspicious files were dropped or overwritten

      • WinRAR.exe (PID: 2728)
      • Tender_0086365327_output5AFA060.bat (PID: 2784)
    • Executes scripts

      • Tender_0086365327_output5AFA060.bat (PID: 2784)
    • Starts itself from another location

      • Tender_0086365327_output5AFA060.bat (PID: 2784)
    • Creates files in the user directory

      • notepad++.exe (PID: 2844)
    • Application launched itself

      • win73.bat (PID: 3100)
  • INFO

    No info indicators.
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.rar | RAR compressed archive (v5.0) (61.5)
.rar | RAR compressed archive (gen) (38.4)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
38
Monitored processes
8
Malicious processes
5
Suspicious processes
0

Behavior graph

Click at the process to see the details
drop and start start drop and start winrar.exe tender_0086365327_output5afa060.bat wscript.exe win73.bat no specs notepad++.exe gup.exe #PONY win73.bat tender_0086365327_output5afa060.bat no specs

Process information

PID
CMD
Path
Indicators
Parent process
2396C:\Users\admin\AppData\Local\Temp\subfolder\win73.bat" C:\Users\admin\AppData\Local\Temp\subfolder\win73.bat
win73.bat
User:
admin
Company:
Oximation5
Integrity Level:
MEDIUM
Description:
SAPOROUS1
Exit code:
0
Version:
3.04.0007
Modules
Images
c:\users\admin\appdata\local\temp\subfolder\win73.bat
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvbvm60.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
2528"C:\Users\admin\Desktop\Tender_0086365327_output5AFA060.bat" C:\Users\admin\Desktop\Tender_0086365327_output5AFA060.batexplorer.exe
User:
admin
Company:
Oximation5
Integrity Level:
MEDIUM
Description:
SAPOROUS1
Exit code:
0
Version:
3.04.0007
Modules
Images
c:\users\admin\desktop\tender_0086365327_output5afa060.bat
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvbvm60.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
2728"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Tender_0086365327_output5AFA060.ace"C:\Program Files\WinRAR\WinRAR.exe
explorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
2784"C:\Users\admin\AppData\Local\Temp\Rar$DIa2728.25165\Tender_0086365327_output5AFA060.bat" C:\Users\admin\AppData\Local\Temp\Rar$DIa2728.25165\Tender_0086365327_output5AFA060.bat
WinRAR.exe
User:
admin
Company:
Oximation5
Integrity Level:
MEDIUM
Description:
SAPOROUS1
Exit code:
0
Version:
3.04.0007
Modules
Images
c:\users\admin\appdata\local\temp\rar$dia2728.25165\tender_0086365327_output5afa060.bat
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvbvm60.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
2844"C:\Program Files\Notepad++\notepad++.exe" "C:\Users\admin\Desktop\Tender_0086365327_output5AFA060.bat"C:\Program Files\Notepad++\notepad++.exe
explorer.exe
User:
admin
Company:
Don HO don.h@free.fr
Integrity Level:
MEDIUM
Description:
Notepad++ : a free (GNU) source code editor
Exit code:
0
Version:
7.51
Modules
Images
c:\program files\notepad++\notepad++.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2956"C:\Windows\System32\WScript.exe" "C:\Users\admin\AppData\Local\Temp\subfolder\win73.vbs" C:\Windows\System32\WScript.exe
Tender_0086365327_output5AFA060.bat
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft ® Windows Based Script Host
Exit code:
0
Version:
5.8.7600.16385
Modules
Images
c:\windows\system32\wscript.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
3100"C:\Users\admin\AppData\Local\Temp\subfolder\win73.bat" C:\Users\admin\AppData\Local\Temp\subfolder\win73.batTender_0086365327_output5AFA060.bat
User:
admin
Company:
Oximation5
Integrity Level:
MEDIUM
Description:
SAPOROUS1
Exit code:
0
Version:
3.04.0007
Modules
Images
c:\users\admin\appdata\local\temp\subfolder\win73.bat
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvbvm60.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
4012"C:\Program Files\Notepad++\updater\gup.exe" -v7.51C:\Program Files\Notepad++\updater\gup.exe
notepad++.exe
User:
admin
Company:
Don HO don.h@free.fr
Integrity Level:
MEDIUM
Description:
GUP : a free (LGPL) Generic Updater
Exit code:
0
Version:
4.1
Modules
Images
c:\program files\notepad++\updater\gup.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\program files\notepad++\updater\libcurl.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\wldap32.dll
Total events
881
Read events
847
Write events
34
Delete events
0

Modification events

(PID) Process:(2728) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2728) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2728) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\5F\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2728) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\Tender_0086365327_output5AFA060.ace
(PID) Process:(2728) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2728) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2728) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2728) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(2728) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\5F\52C64B7E
Operation:writeName:@C:\Windows\System32\acppage.dll,-6002
Value:
Windows Batch File
(PID) Process:(2728) WinRAR.exeKey:HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap
Operation:writeName:UNCAsIntranet
Value:
0
Executable files
2
Suspicious files
2
Text files
7
Unknown types
0

Dropped files

PID
Process
Filename
Type
2728WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2728.27071\Tender_0086365327_output5AFA060.bat
MD5:
SHA256:
2728WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DIa2728.25165\Tender_0086365327_output5AFA060.batexecutable
MD5:
SHA256:
2784Tender_0086365327_output5AFA060.batC:\Users\admin\AppData\Local\Temp\subfolder\win73.vbstext
MD5:
SHA256:
2844notepad++.exeC:\Users\admin\AppData\Roaming\Notepad++\config.xmlxml
MD5:
SHA256:
3100win73.batC:\Users\admin\AppData\Local\Temp\~DF3109DC1F7AC6EB06.TMPbinary
MD5:
SHA256:
2844notepad++.exeC:\Users\admin\AppData\Roaming\Notepad++\session.xmltext
MD5:
SHA256:
2784Tender_0086365327_output5AFA060.batC:\Users\admin\AppData\Local\Temp\subfolder\win73.batexecutable
MD5:
SHA256:
2784Tender_0086365327_output5AFA060.batC:\Users\admin\AppData\Local\Temp\~DFAA54CB3835136320.TMPbinary
MD5:
SHA256:
2844notepad++.exeC:\Users\admin\AppData\Roaming\Notepad++\langs.xmlxml
MD5:E792264BEC29005B9044A435FBA185AB
SHA256:5298FD2F119C43D04F6CF831F379EC25B4156192278E40E458EC356F9B49D624
2844notepad++.exeC:\Users\admin\AppData\Roaming\Notepad++\stylers.xmlxml
MD5:44982E1D48434C0AB3E8277E322DD1E4
SHA256:3E661D3F1FF3977B022A0ACC26B840B5E57D600BC03DCFC6BEFDB408C665904C
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
3
TCP/UDP connections
3
DNS requests
3
Threats
2

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
GET
200
2.16.106.80:80
http://ocsp.usertrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTNMNJMNDqCqx8FcBWK16EHdimS6QQUU3m%2FWqorSs9UgOHYm8Cd8rIDZssCEAXk3DuUOKs7hZfLpqGYUOM%3D
unknown
der
727 b
whitelisted
2396
win73.bat
POST
162.144.36.116:80
http://masariqroup.com/kabospy/gate.php
US
malicious
GET
200
2.16.106.80:80
http://ocsp.usertrust.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBR8sWZUnKvbRO5iJhat9GV793rVlAQUrb2YejS0Jvf6xCZU7wO94CTLVBoCEBPqKHBb9OztDDZjCYBhQzY%3D
unknown
der
471 b
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4012
gup.exe
37.59.28.236:443
notepad-plus-plus.org
OVH SAS
FR
whitelisted
2.16.106.80:80
ocsp.usertrust.com
Akamai International B.V.
whitelisted
2396
win73.bat
162.144.36.116:80
masariqroup.com
Unified Layer
US
suspicious

DNS requests

Domain
IP
Reputation
notepad-plus-plus.org
  • 37.59.28.236
whitelisted
ocsp.usertrust.com
  • 2.16.106.80
  • 2.16.106.50
whitelisted
masariqroup.com
  • 162.144.36.116
malicious

Threats

PID
Process
Class
Message
2396
win73.bat
Potential Corporate Privacy Violation
ET POLICY Windows 98 User-Agent Detected - Possible Malware or Non-Updated System
2396
win73.bat
A Network Trojan was detected
ET TROJAN Trojan Generic - POST To gate.php with no referer
Process
Message
notepad++.exe
VerifyLibrary: certificate revocation checking is disabled
notepad++.exe
VerifyLibrary: certificate revocation checking is disabled
notepad++.exe
42C4C5846BB675C74E2B2C90C69AB44366401093