File name:

d788b5f8127e6f269f21712c78b68cf4

Full analysis: https://app.any.run/tasks/a413131c-6147-41ba-8849-c84414dfd699
Verdict: Malicious activity
Threats:

Pony is a malware with two main functions — stealing information and dropping other viruses with different tasks on infected machines. It has been around since 2011, and it still actively attacks users in Europe and America.

Analysis date: May 24, 2019, 01:30:28
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
autoit
trojan
pony
fareit
opendir
Indicators:
MIME: application/octet-stream
File info: ACE archive data version 20, from Win/32, version 20 to extract, contains AV-String (unregistered), solid
MD5:

D788B5F8127E6F269F21712C78B68CF4

SHA1:

1A3850ED34220F2B4B9A8078F54FE51E56ABA0E8

SHA256:

5A6A4840D5B3511EB7F2C153B5916047156BC523687FE66D14580C52BB3EFB42

SSDEEP:

12288:lGroEWt5MxsZW/t0PbyMWhful/7TGus6/6W3uFSivAPWqcu9uTxvSOH:0roEWjMxKYOPbwu1fRl3vivScu8TsOH

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • Order Confirmation OC-9873874634343.PDF.exe (PID: 3428)
      • lss.exe (PID: 2468)
      • lss.exe (PID: 3380)
    • Detected Pony/Fareit Trojan

      • RegSvcs.exe (PID: 2336)
    • Actions looks like stealing of personal data

      • RegSvcs.exe (PID: 2336)
    • Connects to CnC server

      • RegSvcs.exe (PID: 2336)
    • Changes the autorun value in the registry

      • lss.exe (PID: 3380)
  • SUSPICIOUS

    • Drop AutoIt3 executable file

      • Order Confirmation OC-9873874634343.PDF.exe (PID: 3428)
    • Executable content was dropped or overwritten

      • Order Confirmation OC-9873874634343.PDF.exe (PID: 3428)
    • Application launched itself

      • lss.exe (PID: 2468)
  • INFO

    • Manual execution by user

      • Order Confirmation OC-9873874634343.PDF.exe (PID: 3428)
    • Dropped object may contain Bitcoin addresses

      • Order Confirmation OC-9873874634343.PDF.exe (PID: 3428)
      • lss.exe (PID: 2468)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.ace | ACE compressed archive (100)
No data.
screenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
37
Monitored processes
5
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start drop and start winrar.exe no specs order confirmation oc-9873874634343.pdf.exe lss.exe no specs lss.exe #PONY regsvcs.exe

Process information

PID
CMD
Path
Indicators
Parent process
2336"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe"C:\Windows\Microsoft.NET\Framework\v4.0.30319\RegSvcs.exe
lss.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft .NET Services Installation Utility
Exit code:
0
Version:
4.6.1055.0 built by: NETFXREL2
Modules
Images
c:\windows\microsoft.net\framework\v4.0.30319\regsvcs.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\ole32.dll
c:\windows\system32\gdi32.dll
2468"C:\Users\admin\AppData\Local\Temp\27555262\lss.exe" mln=jgc C:\Users\admin\AppData\Local\Temp\27555262\lss.exeOrder Confirmation OC-9873874634343.PDF.exe
User:
admin
Company:
AutoIt Team
Integrity Level:
MEDIUM
Description:
AutoIt v3 Script
Exit code:
0
Version:
3, 3, 14, 5
Modules
Images
c:\users\admin\appdata\local\temp\27555262\lss.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\wsock32.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\version.dll
2964"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\d788b5f8127e6f269f21712c78b68cf4.ace"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3380C:\Users\admin\AppData\Local\Temp\27555262\lss.exe C:\Users\admin\AppData\Local\Temp\27555262\PAVXLC:\Users\admin\AppData\Local\Temp\27555262\lss.exe
lss.exe
User:
admin
Company:
AutoIt Team
Integrity Level:
MEDIUM
Description:
AutoIt v3 Script
Exit code:
0
Version:
3, 3, 14, 5
Modules
Images
c:\users\admin\appdata\local\temp\27555262\lss.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\wsock32.dll
c:\windows\system32\ws2_32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\nsi.dll
c:\windows\system32\version.dll
3428"C:\Users\admin\Desktop\Order Confirmation OC-9873874634343.PDF.exe" C:\Users\admin\Desktop\Order Confirmation OC-9873874634343.PDF.exe
explorer.exe
User:
admin
Integrity Level:
MEDIUM
Exit code:
0
Modules
Images
c:\users\admin\desktop\order confirmation oc-9873874634343.pdf.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\winsxs\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.7601.17514_none_41e6975e2bd6f2b2\comctl32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
Total events
841
Read events
805
Write events
36
Delete events
0

Modification events

(PID) Process:(2964) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtBMP
Value:
(PID) Process:(2964) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\Themes
Operation:writeName:ShellExtIcon
Value:
(PID) Process:(2964) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\62\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(2964) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\AppData\Local\Temp\d788b5f8127e6f269f21712c78b68cf4.ace
(PID) Process:(2964) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(2964) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(2964) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(2964) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(2964) WinRAR.exeKey:HKEY_CURRENT_USER\Software\ACE Compression Software\ActiveAce\2.0
Operation:writeName:Count
Value:
0
(PID) Process:(2964) WinRAR.exeKey:HKEY_CURRENT_USER\Software\ACE Compression Software\ActiveAce\2.0
Operation:writeName:Name
Value:
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
Executable files
1
Suspicious files
0
Text files
46
Unknown types
0

Dropped files

PID
Process
Filename
Type
2964WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa2964.45598\Order Confirmation OC-9873874634343.PDF.exe
MD5:
SHA256:
3428Order Confirmation OC-9873874634343.PDF.exeC:\Users\admin\AppData\Local\Temp\27555262\mln=jgctext
MD5:
SHA256:
3428Order Confirmation OC-9873874634343.PDF.exeC:\Users\admin\AppData\Local\Temp\27555262\sck.bmptext
MD5:
SHA256:
3428Order Confirmation OC-9873874634343.PDF.exeC:\Users\admin\AppData\Local\Temp\27555262\oxi.ppttext
MD5:
SHA256:
3428Order Confirmation OC-9873874634343.PDF.exeC:\Users\admin\AppData\Local\Temp\27555262\jdb.dattext
MD5:
SHA256:
3428Order Confirmation OC-9873874634343.PDF.exeC:\Users\admin\AppData\Local\Temp\27555262\StructureConstants.pdftext
MD5:
SHA256:
3428Order Confirmation OC-9873874634343.PDF.exeC:\Users\admin\AppData\Local\Temp\27555262\wvo.icotext
MD5:
SHA256:
3428Order Confirmation OC-9873874634343.PDF.exeC:\Users\admin\AppData\Local\Temp\27555262\asl.bmptext
MD5:
SHA256:
3428Order Confirmation OC-9873874634343.PDF.exeC:\Users\admin\AppData\Local\Temp\27555262\hlt.mp4text
MD5:
SHA256:
3428Order Confirmation OC-9873874634343.PDF.exeC:\Users\admin\AppData\Local\Temp\27555262\ieb.pdftext
MD5:
SHA256:
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
3
TCP/UDP connections
3
DNS requests
2
Threats
15

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2336
RegSvcs.exe
GET
185.171.24.173:80
http://www.avrupaendustri.com/wp-admin/css/colors/blue/coreserver/shit.exe
TR
malicious
2336
RegSvcs.exe
GET
185.171.24.173:80
http://avrupaendustri.com/wp-admin/css/colors/blue/coreserver/shit.exe
TR
malicious
2336
RegSvcs.exe
POST
185.171.24.173:80
http://www.avrupaendustri.com/wp-admin/css/colors/blue/coreserver/gate.php
TR
malicious
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2336
RegSvcs.exe
185.171.24.173:80
www.avrupaendustri.com
Bursabil Konfeksiyon Tekstil Bilisim Teknoloji insaat Sanayi ve Ticaret Limited Sirketi
TR
malicious

DNS requests

Domain
IP
Reputation
www.avrupaendustri.com
  • 185.171.24.173
malicious
avrupaendustri.com
  • 185.171.24.173
malicious

Threats

PID
Process
Class
Message
2336
RegSvcs.exe
A Network Trojan was detected
ET TROJAN Fareit/Pony Downloader Checkin 2
2336
RegSvcs.exe
Potential Corporate Privacy Violation
ET POLICY Windows 98 User-Agent Detected - Possible Malware or Non-Updated System
2336
RegSvcs.exe
Potential Corporate Privacy Violation
ET POLICY Unsupported/Fake Internet Explorer Version MSIE 5.
2336
RegSvcs.exe
A Network Trojan was detected
ET TROJAN Trojan Generic - POST To gate.php with no referer
2336
RegSvcs.exe
A Network Trojan was detected
ET TROJAN Pony Downloader HTTP Library MSIE 5 Win98
2336
RegSvcs.exe
A Network Trojan was detected
MALWARE [PTsecurity] Fareit/Pony Downloader Checkin
2336
RegSvcs.exe
A Network Trojan was detected
ET TROJAN Fareit/Pony Downloader Checkin 3
2336
RegSvcs.exe
Potential Corporate Privacy Violation
ET POLICY Windows 98 User-Agent Detected - Possible Malware or Non-Updated System
2336
RegSvcs.exe
A Network Trojan was detected
ET TROJAN Pony Downloader HTTP Library MSIE 5 Win98
2336
RegSvcs.exe
Potential Corporate Privacy Violation
ET POLICY Unsupported/Fake Internet Explorer Version MSIE 5.
No debug info