URL: | https://keygenninja.com/er/Avast+Free+Antivirus+Licence/ |
Full analysis: | https://app.any.run/tasks/eb1239d7-8b65-4f87-bff8-229c0f49a06e |
Verdict: | Malicious activity |
Threats: | Pony is a malware with two main functions — stealing information and dropping other viruses with different tasks on infected machines. It has been around since 2011, and it still actively attacks users in Europe and America. |
Analysis date: | August 29, 2020, 05:37:23 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Tags: | |
Indicators: | |
MD5: | 1DEF278D134BBCEABBDCF800B4E92E24 |
SHA1: | 7D5BE1D47248DF696742289297A7E3DB1117BD1D |
SHA256: | 4B103C75342FC33A09BCDB7B0C86E379A49CA2BABF7AD17A19A5CF7E29E39D5E |
SSDEEP: | 3:N8FVYpPJwkVAHJv:24pPJwkyF |
PID | CMD | Path | Indicators | Parent process | |||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
324 | \??\C:\Windows\system32\conhost.exe "-1989872801555741158-369249440-8958998671057930393-2077447134-726827811-157760501" | C:\Windows\system32\conhost.exe | — | csrss.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Console Window Host Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
376 | consent.exe 868 454 04C4D008 | C:\Windows\system32\consent.exe | — | svchost.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: SYSTEM Description: Consent UI for administrative applications Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
560 | "C:\Users\admin\AppData\Local\Temp\RarSFX2\BTRSetp.exe" | C:\Users\admin\AppData\Local\Temp\RarSFX2\BTRSetp.exe | keygen-step-4.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
572 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=watcher --main-thread-id=4028 --on-initialized-event-handle=324 --parent-handle=328 /prefetch:6 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: MEDIUM Description: Google Chrome Exit code: 0 Version: 75.0.3770.100 Modules
| |||||||||||||||
576 | ping 127.0.0.1 -n 3 | C:\Windows\system32\PING.EXE | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: TCP/IP Ping Command Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
632 | keygen-pr.exe -p83fsase3Ge | C:\Users\admin\AppData\Local\Temp\RarSFX0\keygen-pr.exe | cmd.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Modules
| |||||||||||||||
792 | \??\C:\Windows\system32\conhost.exe "15310543701886791492987932172-4438884082126704913-1603639800464645449-1638906695" | C:\Windows\system32\conhost.exe | — | csrss.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: HIGH Description: Console Window Host Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
856 | cmd.exe /C ping 1.1.1.1 -n 1 -w 3000 > Nul & Del /f /q "C:\Users\admin\AppData\Local\Temp\RarSFX2\setup.upx.exe" | C:\Windows\system32\cmd.exe | — | setup.upx.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
960 | "C:\Users\admin\AppData\Local\Temp\RarSFX2\wyfdggzz.exe" | C:\Users\admin\AppData\Local\Temp\RarSFX2\wyfdggzz.exe | keygen-step-4.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Exit code: 0 Version: 1.0.0.1 Modules
| |||||||||||||||
992 | "C:\Windows\system32\SearchFilterHost.exe" 0 516 520 528 65536 524 | C:\Windows\system32\SearchFilterHost.exe | — | SearchIndexer.exe | |||||||||||
User: SYSTEM Company: Microsoft Corporation Integrity Level: MEDIUM Description: Microsoft Windows Search Filter Host Exit code: 0 Version: 7.00.7600.16385 (win7_rtm.090713-1255) Modules
|
(PID) Process: | (2596) host.exe | Key: | HKEY_CURRENT_USER\Control Panel\Cursors |
Operation: | write | Name: | APPSTARTING |
Value: %SystemRoot%\cursors\clearcur.cur | |||
(PID) Process: | (2596) host.exe | Key: | HKEY_CURRENT_USER\Control Panel\Cursors |
Operation: | write | Name: | ARROW |
Value: %SystemRoot%\cursors\clearcur.cur | |||
(PID) Process: | (2596) host.exe | Key: | HKEY_CURRENT_USER\Control Panel\Cursors |
Operation: | write | Name: | CROSS |
Value: %SystemRoot%\cursors\clearcur.cur | |||
(PID) Process: | (2596) host.exe | Key: | HKEY_CURRENT_USER\Control Panel\Cursors |
Operation: | write | Name: | HAND |
Value: %SystemRoot%\cursors\clearcur.cur | |||
(PID) Process: | (2596) host.exe | Key: | HKEY_CURRENT_USER\Control Panel\Cursors |
Operation: | write | Name: | HELP |
Value: %SystemRoot%\cursors\clearcur.cur | |||
(PID) Process: | (2596) host.exe | Key: | HKEY_CURRENT_USER\Control Panel\Cursors |
Operation: | write | Name: | IBEAM |
Value: %SystemRoot%\cursors\clearcur.cur | |||
(PID) Process: | (2596) host.exe | Key: | HKEY_CURRENT_USER\Control Panel\Cursors |
Operation: | write | Name: | NO |
Value: %SystemRoot%\cursors\clearcur.cur | |||
(PID) Process: | (2596) host.exe | Key: | HKEY_CURRENT_USER\Control Panel\Cursors |
Operation: | write | Name: | SIZEALL |
Value: %SystemRoot%\cursors\clearcur.cur | |||
(PID) Process: | (2596) host.exe | Key: | HKEY_CURRENT_USER\Control Panel\Cursors |
Operation: | write | Name: | SIZENESW |
Value: %SystemRoot%\cursors\clearcur.cur | |||
(PID) Process: | (2596) host.exe | Key: | HKEY_CURRENT_USER\Control Panel\Cursors |
Operation: | write | Name: | SIZENS |
Value: %SystemRoot%\cursors\clearcur.cur |
PID | Process | Filename | Type | |
---|---|---|---|---|
2944 | iexplore.exe | C:\Users\admin\AppData\Local\Temp\Low\Cab34D1.tmp | — | |
MD5:— | SHA256:— | |||
2944 | iexplore.exe | C:\Users\admin\AppData\Local\Temp\Low\Tar34D2.tmp | — | |
MD5:— | SHA256:— | |||
2648 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\Internet Explorer\Services\search_{0633EE93-D776-472f-A0FF-E1416B8B2E3A}.ico | — | |
MD5:— | SHA256:— | |||
2944 | iexplore.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\AAQR4IKK.txt | — | |
MD5:— | SHA256:— | |||
2944 | iexplore.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\YXSY2UN2.txt | — | |
MD5:— | SHA256:— | |||
2944 | iexplore.exe | C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\MFAQUS6V\Avast+Free+Antivirus+Licence[1].htm | html | |
MD5:— | SHA256:— | |||
2944 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\9FF67FB3141440EED32363089565AE60_297403111CEDEF1869FC623007E30BE7 | binary | |
MD5:— | SHA256:— | |||
2944 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\6BADA8974A10C4BD62CC921D13E43B18_28DEA62A0AE77228DD387E155AD0BA27 | binary | |
MD5:— | SHA256:— | |||
2944 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\CC197601BE0898B7B0FCC91FA15D8A69_A32AB11F03BFC377BA77491279F72EFE | der | |
MD5:— | SHA256:— | |||
2944 | iexplore.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B398B80134F72209547439DB21AB308D_592839A8569F831D0F2306AE4BB5C24B | der | |
MD5:— | SHA256:— |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
2944 | iexplore.exe | GET | 200 | 172.217.21.227:80 | http://ocsp.pki.goog/gts1o1core/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBRCRjDCJxnb3nDwj%2Fxz5aZfZjgXvAQUmNH4bhDrz5vsYJ8YkBug630J%2FSsCEQDt8oJ55dD%2FpwgAAAAAUx1U | US | der | 472 b | whitelisted |
2944 | iexplore.exe | GET | 200 | 172.217.21.227:80 | http://ocsp.pki.goog/gts1o1core/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRCRjDCJxnb3nDwj%2Fxz5aZfZjgXvAQUmNH4bhDrz5vsYJ8YkBug630J%2FSsCEArqRmtSYJmnCAAAAABTHN0%3D | US | der | 471 b | whitelisted |
2944 | iexplore.exe | GET | 200 | 93.184.220.29:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEAo3h2ReX7SMIk79G%2B0UDDw%3D | US | der | 1.47 Kb | whitelisted |
2944 | iexplore.exe | GET | 200 | 172.217.21.227:80 | http://ocsp.pki.goog/gts1o1core/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBRCRjDCJxnb3nDwj%2Fxz5aZfZjgXvAQUmNH4bhDrz5vsYJ8YkBug630J%2FSsCEQDt8oJ55dD%2FpwgAAAAAUx1U | US | der | 472 b | whitelisted |
2648 | iexplore.exe | GET | 200 | 93.184.220.29:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTBL0V27RVZ7LBduom%2FnYB45SPUEwQU5Z1ZMIJHWMys%2BghUNoZ7OrUETfACEA8sEMlbBsCTf7jUSfg%2BhWk%3D | US | der | 1.47 Kb | whitelisted |
2944 | iexplore.exe | GET | 200 | 172.217.21.227:80 | http://ocsp.pki.goog/gts1o1core/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRCRjDCJxnb3nDwj%2Fxz5aZfZjgXvAQUmNH4bhDrz5vsYJ8YkBug630J%2FSsCEHt6E9W%2FW9ZWCAAAAABTHTA%3D | US | der | 471 b | whitelisted |
2944 | iexplore.exe | GET | 200 | 172.217.21.227:80 | http://ocsp.pki.goog/gts1o1core/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRCRjDCJxnb3nDwj%2Fxz5aZfZjgXvAQUmNH4bhDrz5vsYJ8YkBug630J%2FSsCEDt878iBbv1RCAAAAABTHN4%3D | US | der | 471 b | whitelisted |
2944 | iexplore.exe | GET | 200 | 172.217.21.227:80 | http://ocsp.pki.goog/gsr2/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBTgXIsxbvr2lBkPpoIEVRE6gHlCnAQUm%2BIHV2ccHsBqBt5ZtJot39wZhi4CDQHjtJqhjYqpgSVpULg%3D | US | der | 468 b | whitelisted |
2944 | iexplore.exe | GET | 200 | 172.217.21.227:80 | http://ocsp.pki.goog/gts1o1core/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRCRjDCJxnb3nDwj%2Fxz5aZfZjgXvAQUmNH4bhDrz5vsYJ8YkBug630J%2FSsCEArqRmtSYJmnCAAAAABTHN0%3D | US | der | 471 b | whitelisted |
2944 | iexplore.exe | GET | 200 | 172.217.21.227:80 | http://ocsp.pki.goog/gts1o1core/MFEwTzBNMEswSTAJBgUrDgMCGgUABBRCRjDCJxnb3nDwj%2Fxz5aZfZjgXvAQUmNH4bhDrz5vsYJ8YkBug630J%2FSsCEDt878iBbv1RCAAAAABTHN4%3D | US | der | 471 b | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
2944 | iexplore.exe | 172.67.168.77:443 | keygenninja.com | — | US | unknown |
2944 | iexplore.exe | 93.184.220.29:80 | ocsp.digicert.com | MCI Communications Services, Inc. d/b/a Verizon Business | US | whitelisted |
2944 | iexplore.exe | 104.17.78.107:443 | cdnjs.cloudflare.com | Cloudflare Inc | US | unknown |
2944 | iexplore.exe | 172.217.22.8:443 | www.googletagmanager.com | Google Inc. | US | whitelisted |
2944 | iexplore.exe | 172.217.21.227:80 | ocsp.pki.goog | Google Inc. | US | whitelisted |
2944 | iexplore.exe | 216.58.208.46:443 | www.google-analytics.com | Google Inc. | US | whitelisted |
2648 | iexplore.exe | 13.107.21.200:80 | www.bing.com | Microsoft Corporation | US | whitelisted |
2944 | iexplore.exe | 74.125.206.155:443 | stats.g.doubleclick.net | Google Inc. | US | whitelisted |
2944 | iexplore.exe | 216.58.206.4:443 | www.google.com | Google Inc. | US | whitelisted |
2648 | iexplore.exe | 93.184.220.29:80 | ocsp.digicert.com | MCI Communications Services, Inc. d/b/a Verizon Business | US | whitelisted |
Domain | IP | Reputation |
---|---|---|
keygenninja.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
cdnjs.cloudflare.com |
| whitelisted |
www.googletagmanager.com |
| whitelisted |
ocsp.pki.goog |
| whitelisted |
api.bing.com |
| whitelisted |
www.bing.com |
| whitelisted |
www.google-analytics.com |
| whitelisted |
stats.g.doubleclick.net |
| whitelisted |
www.google.com |
| malicious |
PID | Process | Class | Message |
---|---|---|---|
— | — | Potential Corporate Privacy Violation | POLICY [PTsecurity] IP Check Domain SSL certificate |
— | — | Potential Corporate Privacy Violation | POLICY [PTsecurity] IP Check Domain SSL certificate |
— | — | A Network Trojan was detected | STEALER [PTsecurity] Powerkatz32_2 |
— | — | A Network Trojan was detected | STEALER [PTsecurity] Powerkatz32_2 |
— | — | A Network Trojan was detected | MALWARE [PTsecurity] Trojan.Win32.Nebuler Checkin |
— | — | A Network Trojan was detected | ET TROJAN Fareit/Pony Downloader Checkin 2 |
— | — | Potentially Bad Traffic | ET INFO Observed DNS Query to .cloud TLD |
— | — | A Network Trojan was detected | ET TROJAN Fareit/Pony Downloader Checkin 2 |
— | — | A Network Trojan was detected | ET TROJAN Suspicious User-Agent (WindowsNT) With No Separating Space |
— | — | Potentially Bad Traffic | ET INFO HTTP Request to Suspicious *.cloud Domain |
Process | Message |
---|---|
id6.exe | 006 |
id6.exe | http://freekzvideo.cloud/business/receive |
mdmd_pytopm.exe | OpenProcess |
mdmd_pytopm.exe | NtQueryInformationFile |
mdmd_pytopm.exe | |
mdmd_pytopm.exe | DuplicateHandle |
mdmd_pytopm.exe | |
mdmd_pytopm.exe | NtQuerySystemInformation |
mdmd_pytopm.exe | |
mdmd_pytopm.exe | |