File name:

evil_1.eml

Full analysis: https://app.any.run/tasks/a9de0c57-eb80-448b-84bd-44dbc6edac7c
Verdict: Malicious activity
Threats:

Pony is a malware with two main functions — stealing information and dropping other viruses with different tasks on infected machines. It has been around since 2011, and it still actively attacks users in Europe and America.

Analysis date: April 15, 2019, 02:45:49
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Tags:
trojan
pony
fareit
Indicators:
MIME: text/html
File info: HTML document, ASCII text, with CRLF line terminators
MD5:

D32257593D83880D5D037BDC76EBB260

SHA1:

8CF4AFA45A1A88737EE025BCF35FCA070D0FB72D

SHA256:

85BADD4A140729C66064BC1D21F6822E0DBF592E203EC91C8DBA2447D42DC7E4

SSDEEP:

6144:87PWcTFUFnJ5wJbfI6/BBh5kGw6YhVdPOF0EDSous5fbLKXNSNr25rM:E6J5ikafkLpHASouUnKXs

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Application was dropped or rewritten from another process

      • REQUEST FOR INVITATION TO QUOTE.exe (PID: 3268)
      • REQUEST FOR INVITATION TO QUOTE.exe (PID: 4028)
    • Detected Pony/Fareit Trojan

      • REQUEST FOR INVITATION TO QUOTE.exe (PID: 4028)
    • Actions looks like stealing of personal data

      • REQUEST FOR INVITATION TO QUOTE.exe (PID: 4028)
  • SUSPICIOUS

    • Executable content was dropped or overwritten

      • WinRAR.exe (PID: 2856)
    • Application launched itself

      • REQUEST FOR INVITATION TO QUOTE.exe (PID: 3268)
    • Creates files in the user directory

      • OUTLOOK.EXE (PID: 2680)
    • Starts CMD.EXE for commands execution

      • REQUEST FOR INVITATION TO QUOTE.exe (PID: 4028)
  • INFO

    • Reads Microsoft Office registry keys

      • OUTLOOK.EXE (PID: 2680)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
40
Monitored processes
5
Malicious processes
4
Suspicious processes
0

Behavior graph

Click at the process to see the details
start drop and start outlook.exe winrar.exe request for invitation to quote.exe no specs #PONY request for invitation to quote.exe cmd.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
2680"C:\PROGRA~1\MICROS~1\Office14\OUTLOOK.EXE" /eml "C:\Users\admin\AppData\Local\Temp\evil_1.eml"C:\PROGRA~1\MICROS~1\Office14\OUTLOOK.EXE
explorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Microsoft Outlook
Exit code:
0
Version:
14.0.6025.1000
Modules
Images
c:\progra~1\micros~1\office14\outlook.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\version.dll
c:\windows\system32\msvcrt.dll
c:\windows\winsxs\x86_microsoft.vc90.crt_1fc8b3b9a1e18e3b_9.0.30729.6161_none_50934f2ebcb7eb57\msvcr90.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
2804cmd /c ""C:\Users\admin\AppData\Local\Temp\1155453.bat" "C:\Users\admin\AppData\Local\Temp\Rar$EXa2856.39794\REQUEST FOR INVITATION TO QUOTE.exe" "C:\Windows\system32\cmd.exeREQUEST FOR INVITATION TO QUOTE.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Command Processor
Exit code:
1
Version:
6.1.7601.17514 (win7sp1_rtm.101119-1850)
Modules
Images
c:\windows\system32\cmd.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\winbrand.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
2856"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\G3C0XS49\REQUEST FOR INVITATION TO QUOTE pdf.arj"C:\Program Files\WinRAR\WinRAR.exe
OUTLOOK.EXE
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.60.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
3268"C:\Users\admin\AppData\Local\Temp\Rar$EXa2856.39794\REQUEST FOR INVITATION TO QUOTE.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa2856.39794\REQUEST FOR INVITATION TO QUOTE.exeWinRAR.exe
User:
admin
Company:
Umawa
Integrity Level:
MEDIUM
Exit code:
0
Version:
1.08.0002
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa2856.39794\request for invitation to quote.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvbvm60.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\usp10.dll
4028C:\Users\admin\AppData\Local\Temp\Rar$EXa2856.39794\REQUEST FOR INVITATION TO QUOTE.exe" C:\Users\admin\AppData\Local\Temp\Rar$EXa2856.39794\REQUEST FOR INVITATION TO QUOTE.exe
REQUEST FOR INVITATION TO QUOTE.exe
User:
admin
Company:
Umawa
Integrity Level:
MEDIUM
Exit code:
0
Version:
1.08.0002
Modules
Images
c:\users\admin\appdata\local\temp\rar$exa2856.39794\request for invitation to quote.exe
c:\systemroot\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvbvm60.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
Total events
2 502
Read events
2 049
Write events
433
Delete events
20

Modification events

(PID) Process:(2680) OUTLOOK.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1033
Value:
Off
(PID) Process:(2680) OUTLOOK.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Common\LanguageResources\EnabledLanguages
Operation:writeName:1033
Value:
On
(PID) Process:(2680) OUTLOOK.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Outlook\Resiliency\StartupItems
Operation:writeName:b*:
Value:
622A3A00780A0000010000000000000000000000
(PID) Process:(2680) OUTLOOK.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Outlook
Operation:writeName:MTTT
Value:
780A0000BA91BF5E35F3D40100000000
(PID) Process:(2680) OUTLOOK.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Outlook\SQM
Operation:writeName:SQMSessionNumber
Value:
0
(PID) Process:(2680) OUTLOOK.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Office\14.0\Outlook\SQM
Operation:writeName:SQMSessionDate
Value:
219996000
(PID) Process:(2680) OUTLOOK.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\NoMail\0a0d020000000000c000000000000046
Operation:writeName:00030429
Value:
03000000
(PID) Process:(2680) OUTLOOK.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\NoMail\9375CFF0413111d3B88A00104B2A6676
Operation:writeName:{ED475418-B0D6-11D2-8C3B-00104B2A6676}
Value:
(PID) Process:(2680) OUTLOOK.EXEKey:HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles\NoMail\9375CFF0413111d3B88A00104B2A6676
Operation:writeName:LastChangeVer
Value:
1200000000000000
(PID) Process:(2680) OUTLOOK.EXEKey:HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Installer\UserData\S-1-5-18\Products\00004109A10090400000000000F01FEC\Usage
Operation:writeName:OutlookMAPI2Intl_1033
Value:
1317994517
Executable files
1
Suspicious files
3
Text files
25
Unknown types
3

Dropped files

PID
Process
Filename
Type
2680OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\CVR62D3.tmp.cvr
MD5:
SHA256:
2680OUTLOOK.EXEC:\Users\admin\AppData\Local\Temp\tmp6506.tmp
MD5:
SHA256:
2680OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Outlook\G3C0XS49\REQUEST FOR INVITATION TO QUOTE pdf (2).arj\:Zone.Identifier:$DATA
MD5:
SHA256:
2680OUTLOOK.EXEC:\Users\admin\Documents\Outlook Files\~Outlook Data File - NoMail.pst.tmp
MD5:
SHA256:
2680OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Content.Word\~WRS{6DCDAA74-462E-4A21-BF2F-E042BF891784}.tmp
MD5:
SHA256:
2680OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Outlook\mapisvc.inftext
MD5:48DD6CAE43CE26B992C35799FCD76898
SHA256:7BFE1F3691E2B4FB4D61FBF5E9F7782FBE49DA1342DBD32201C2CC8E540DBD1A
2680OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Outlook\RoamCache\Stream_WorkHours_1_764676248E12BE48ADD354B73C70038B.datxml
MD5:807EF0FC900FEB3DA82927990083D6E7
SHA256:4411E7DC978011222764943081500FFF0E43CBF7CCD44264BD1AB6306CA68913
2680OUTLOOK.EXEC:\Users\admin\AppData\Roaming\Microsoft\Outlook\NoMail.srssrs
MD5:
SHA256:
2680OUTLOOK.EXEC:\Users\admin\AppData\Roaming\Microsoft\Templates\~$rmalEmail.dotmpgc
MD5:
SHA256:
2680OUTLOOK.EXEC:\Users\admin\AppData\Local\Microsoft\Outlook\RoamCache\Stream_AvailabilityOptions_2_BD37D9DAF2E5034DB4D100CEC7F3063D.datxml
MD5:EEAA832C12F20DE6AAAA9C7B77626E72
SHA256:C4C9A90F2C961D9EE79CF08FBEE647ED7DE0202288E876C7BAAD00F4CA29CA16
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
1
TCP/UDP connections
1
DNS requests
5
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
2680
OUTLOOK.EXE
GET
64.4.26.155:80
http://config.messenger.msn.com/config/msgrconfig.asmx?op=GetOlcConfig
US
whitelisted
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
2680
OUTLOOK.EXE
64.4.26.155:80
config.messenger.msn.com
Microsoft Corporation
US
whitelisted

DNS requests

Domain
IP
Reputation
config.messenger.msn.com
  • 64.4.26.155
whitelisted
bravestking.borsodchern.us
malicious

Threats

No threats detected
No debug info