File name:

Gen.Heur.PonyStealer.4.7z

Full analysis: https://app.any.run/tasks/4f24695a-1495-47cb-a984-edcfb8ef2ac7
Verdict: Malicious activity
Analysis date: November 20, 2023, 19:14:33
OS: Windows 7 Professional Service Pack 1 (build: 7601, 32 bit)
Indicators:
MIME: application/x-7z-compressed
File info: 7-zip archive data, version 0.4
MD5:

3CDEFC17F658FE68242A489D1526CD53

SHA1:

A74FB9F87855E399C5DCA208EC9F2E65D8647804

SHA256:

9FB54D7E9E5E01EA93007A6AE9681E9EEA02443CADAE1584248F3E52B113792D

SSDEEP:

12288:vARp77VoGj/FNV3Lgub6+BOwNZfGvU4dppvZDkmmgIv3h:4RR7VoG7ffbzOwNZfGM4dpphDkmmg43h

ANY.RUN is an interactive service which provides full access to the guest system. Information in this report could be distorted by user actions and is provided for user acknowledgement as it is. ANY.RUN does not guarantee maliciousness or safety of the content.
  • MALICIOUS

    • Uses Task Scheduler to run other applications

      • 4e87a0794bf73d06ac1ce4a37e33eb832ff4c89fb9e4266490c7cef9229d27a7.exe (PID: 756)
    • Drops the executable file immediately after the start

      • 4e87a0794bf73d06ac1ce4a37e33eb832ff4c89fb9e4266490c7cef9229d27a7.exe (PID: 756)
  • SUSPICIOUS

    • Application launched itself

      • taskmgr.exe (PID: 3228)
      • Kip1.exe (PID: 1852)
    • Reads the Internet Settings

      • taskmgr.exe (PID: 3228)
      • 4e87a0794bf73d06ac1ce4a37e33eb832ff4c89fb9e4266490c7cef9229d27a7.exe (PID: 756)
    • The process executes via Task Scheduler

      • Kip1.exe (PID: 1852)
    • The process checks if it is being run in the virtual environment

      • Kip1.exe (PID: 1032)
  • INFO

    • Checks supported languages

      • 4e87a0794bf73d06ac1ce4a37e33eb832ff4c89fb9e4266490c7cef9229d27a7.exe (PID: 756)
      • Kip1.exe (PID: 1852)
      • Kip1.exe (PID: 1032)
      • wmpnscfg.exe (PID: 1116)
      • wmpnscfg.exe (PID: 536)
    • Manual execution by a user

      • 4e87a0794bf73d06ac1ce4a37e33eb832ff4c89fb9e4266490c7cef9229d27a7.exe (PID: 756)
      • taskmgr.exe (PID: 3228)
      • wmpnscfg.exe (PID: 1116)
      • wmpnscfg.exe (PID: 536)
    • Drops the executable file immediately after the start

      • WinRAR.exe (PID: 3128)
    • Reads the computer name

      • 4e87a0794bf73d06ac1ce4a37e33eb832ff4c89fb9e4266490c7cef9229d27a7.exe (PID: 756)
      • Kip1.exe (PID: 1032)
      • wmpnscfg.exe (PID: 1116)
      • wmpnscfg.exe (PID: 536)
    • Creates files in the program directory

      • 4e87a0794bf73d06ac1ce4a37e33eb832ff4c89fb9e4266490c7cef9229d27a7.exe (PID: 756)
    • Create files in a temporary directory

      • Kip1.exe (PID: 1032)
    • Application launched itself

      • iexplore.exe (PID: 1892)
    • Reads the machine GUID from the registry

      • Kip1.exe (PID: 1032)
      • wmpnscfg.exe (PID: 1116)
      • wmpnscfg.exe (PID: 536)
Find more information about signature artifacts and mapping to MITRE ATT&CK™ MATRIX at the full report
No Malware configuration.

TRiD

.7z | 7-Zip compressed archive (v0.4) (57.1)
.7z | 7-Zip compressed archive (gen) (42.8)
No data.
screenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshotscreenshot
All screenshots are available in the full report
All screenshots are available in the full report
Total processes
59
Monitored processes
12
Malicious processes
1
Suspicious processes
2

Behavior graph

Click at the process to see the details
start winrar.exe no specs taskmgr.exe no specs taskmgr.exe 4e87a0794bf73d06ac1ce4a37e33eb832ff4c89fb9e4266490c7cef9229d27a7.exe schtasks.exe no specs schtasks.exe no specs kip1.exe no specs kip1.exe iexplore.exe iexplore.exe wmpnscfg.exe no specs wmpnscfg.exe no specs

Process information

PID
CMD
Path
Indicators
Parent process
536"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\ole32.dll
756"C:\Users\admin\Desktop\4e87a0794bf73d06ac1ce4a37e33eb832ff4c89fb9e4266490c7cef9229d27a7.exe" C:\Users\admin\Desktop\4e87a0794bf73d06ac1ce4a37e33eb832ff4c89fb9e4266490c7cef9229d27a7.exe
explorer.exe
User:
admin
Company:
SAMSUnG
Integrity Level:
HIGH
Description:
SAMSUnG
Exit code:
0
Version:
3.04.0001
Modules
Images
c:\users\admin\desktop\4e87a0794bf73d06ac1ce4a37e33eb832ff4c89fb9e4266490c7cef9229d27a7.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvbvm60.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
908"C:\Windows\System32\schtasks.exe" /run /tn "Eburin"C:\Windows\System32\schtasks.exe4e87a0794bf73d06ac1ce4a37e33eb832ff4c89fb9e4266490c7cef9229d27a7.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Manages scheduled tasks
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\ole32.dll
916"C:\Windows\System32\schtasks.exe" /Create /SC MINUTE /TN "Eburin" /TR "\"C:\ProgramData\Kip1.exe\""C:\Windows\System32\schtasks.exe4e87a0794bf73d06ac1ce4a37e33eb832ff4c89fb9e4266490c7cef9229d27a7.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
HIGH
Description:
Manages scheduled tasks
Exit code:
0
Version:
6.1.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\windows\system32\schtasks.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\ole32.dll
1032C:\ProgramData\Kip1.exe C:\ProgramData\Kip1.exe
Kip1.exe
User:
admin
Company:
SAMSUnG
Integrity Level:
MEDIUM
Description:
SAMSUnG
Exit code:
3221225477
Version:
3.04.0001
Modules
Images
c:\programdata\kip1.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\shlwapi.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\user32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
1116"C:\Program Files\Windows Media Player\wmpnscfg.exe"C:\Program Files\Windows Media Player\wmpnscfg.exeexplorer.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Windows Media Player Network Sharing Service Configuration Application
Exit code:
0
Version:
12.0.7600.16385 (win7_rtm.090713-1255)
Modules
Images
c:\program files\windows media player\wmpnscfg.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\sspicli.dll
c:\windows\system32\ole32.dll
1356"C:\Program Files\Internet Explorer\iexplore.exe" SCODEF:1892 CREDAT:267521 /prefetch:2C:\Program Files\Internet Explorer\iexplore.exe
iexplore.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
LOW
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
1852C:\ProgramData\Kip1.exe C:\ProgramData\Kip1.exetaskeng.exe
User:
admin
Company:
SAMSUnG
Integrity Level:
MEDIUM
Description:
SAMSUnG
Exit code:
0
Version:
3.04.0001
Modules
Images
c:\programdata\kip1.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvbvm60.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
1892"C:\Program Files\Internet Explorer\iexplore.exe" -EmbeddingC:\Program Files\Internet Explorer\iexplore.exe
svchost.exe
User:
admin
Company:
Microsoft Corporation
Integrity Level:
MEDIUM
Description:
Internet Explorer
Exit code:
0
Version:
11.00.9600.16428 (winblue_gdr.131013-1700)
Modules
Images
c:\program files\internet explorer\iexplore.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\api-ms-win-downlevel-advapi32-l1-1-0.dll
c:\windows\system32\advapi32.dll
c:\windows\system32\sechost.dll
c:\windows\system32\rpcrt4.dll
c:\windows\system32\iertutil.dll
3128"C:\Program Files\WinRAR\WinRAR.exe" "C:\Users\admin\AppData\Local\Temp\Gen.Heur.PonyStealer.4.7z"C:\Program Files\WinRAR\WinRAR.exeexplorer.exe
User:
admin
Company:
Alexander Roshal
Integrity Level:
MEDIUM
Description:
WinRAR archiver
Exit code:
0
Version:
5.91.0
Modules
Images
c:\program files\winrar\winrar.exe
c:\windows\system32\ntdll.dll
c:\windows\system32\kernel32.dll
c:\windows\system32\kernelbase.dll
c:\windows\system32\user32.dll
c:\windows\system32\gdi32.dll
c:\windows\system32\lpk.dll
c:\windows\system32\usp10.dll
c:\windows\system32\msvcrt.dll
c:\windows\system32\comdlg32.dll
Total events
14 133
Read events
14 035
Write events
90
Delete events
8

Modification events

(PID) Process:(3128) WinRAR.exeKey:HKEY_CLASSES_ROOT\Local Settings\MuiCache\17A\52C64B7E
Operation:writeName:LanguageList
Value:
en-US
(PID) Process:(3128) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:2
Value:
C:\Users\admin\Desktop\virtio_ivshmem_master_build.zip
(PID) Process:(3128) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:1
Value:
C:\Users\admin\Desktop\Win7-KB3191566-x86.zip
(PID) Process:(3128) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\ArcHistory
Operation:writeName:0
Value:
C:\Users\admin\Desktop\phacker.zip
(PID) Process:(3128) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:name
Value:
120
(PID) Process:(3128) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:size
Value:
80
(PID) Process:(3128) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:type
Value:
120
(PID) Process:(3128) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\FileList\FileColumnWidths
Operation:writeName:mtime
Value:
100
(PID) Process:(3128) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\Interface\MainWin
Operation:writeName:Placement
Value:
2C0000000000000001000000FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFF42000000420000000204000037020000
(PID) Process:(3128) WinRAR.exeKey:HKEY_CURRENT_USER\Software\WinRAR\General
Operation:writeName:LastFolder
Value:
C:\Users\admin\Desktop
Executable files
2
Suspicious files
26
Text files
20
Unknown types
0

Dropped files

PID
Process
Filename
Type
1356iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\57C8EDB95DF3F0AD4EE2DC2B8CFD4157binary
MD5:03415E519A8043D3F51316A5244CB9F0
SHA256:FA414E78A7D0B80C3FA0EC5D32923CDBB28EAD746D47A517854AEB024BA0C216
3128WinRAR.exeC:\Users\admin\AppData\Local\Temp\Rar$DRa3128.16748\Gen.Heur.PonyStealer.4\4e87a0794bf73d06ac1ce4a37e33eb832ff4c89fb9e4266490c7cef9229d27a7.exe.bakexecutable
MD5:11CF5CA49A6C354EB005FB24BDF6B1F0
SHA256:4E87A0794BF73D06AC1CE4A37E33EB832FF4C89FB9E4266490C7CEF9229D27A7
7564e87a0794bf73d06ac1ce4a37e33eb832ff4c89fb9e4266490c7cef9229d27a7.exeC:\ProgramData\Kip1.exeexecutable
MD5:B211348F8784EA450E1364C053046A6C
SHA256:CA11B8FFBC782DF697F34A26DF930970B1CED2EFBF89A34C506AE80A1CDC43BF
1356iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\57C8EDB95DF3F0AD4EE2DC2B8CFD4157compressed
MD5:1BFE591A4FE3D91B03CDF26EAACD8F89
SHA256:9CF94355051BF0F4A45724CA20D1CC02F76371B963AB7D1E38BD8997737B13D8
1356iexplore.exeC:\Users\admin\AppData\Local\Microsoft\Windows\Temporary Internet Files\Low\Content.IE5\5IWPIAR9\px[1].jstext
MD5:D2183968F9080B37BABFEBA3CCF10DF2
SHA256:4D9B83714539F82372E1E0177924BCB5180B75148E22D6725468FD2FB6F96BCC
1356iexplore.exeC:\Users\admin\AppData\Roaming\Microsoft\Windows\Cookies\Low\2MIALA7Y.txttext
MD5:072B866C9D70C42790B110778844794C
SHA256:BCB28DAFB09E9ECEFD98FD1CD32FF1F53CCCDAAB360DEC46E5C46D181A460B08
1356iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\F2DDCD2B5F37625B82E81F4976CEE400_8FF5BE4204C5F704E3914BEF4952C317binary
MD5:E5B9CD833FC898634A7423D66BE26BB3
SHA256:890BEA85B914EB5C41149A1DEB76816EDFE7D3AA97399C1FE34DF0DABD4331EF
1356iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BC2602F5489CFE3E69F81C6328A4C17C_849A9AE095E451B9FFDF6A58F3A98E26binary
MD5:D083B4D2644309E27E84F8FF78C028DD
SHA256:EF7839B2D7F88CAC982D932D2BD3E5288B3FFDCF11AD14A6CB0EF47AB95E87FE
1356iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\E87CE99F124623F95572A696C80EFCAF_D855A42D6DB34DB801FA37B51C1634EFbinary
MD5:6684C376149AA4ABF5DD6896F1EBD63B
SHA256:660FC2BCC218ED166851264392C2B57AF8873D0B1C3816DE319964DA2CA202F9
1356iexplore.exeC:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\E87CE99F124623F95572A696C80EFCAF_D855A42D6DB34DB801FA37B51C1634EFder
MD5:BB5CB0FAB540E07FC895216C2C78D79F
SHA256:88B623C87A2DE0FB83570364AAF55C0EA39C2D3E4024B9D253BB37730310EE13
Download PCAP, analyze network streams, HTTP content and a lot more at the full report
HTTP(S) requests
15
TCP/UDP connections
25
DNS requests
15
Threats
0

HTTP requests

PID
Process
Method
HTTP Code
IP
URL
CN
Type
Size
Reputation
1356
iexplore.exe
GET
200
3.33.243.145:80
http://ww1.seeyouonlineservice.com/px.js?ch=2&abp=1
unknown
text
476 b
unknown
1356
iexplore.exe
GET
200
142.250.74.195:80
http://ocsp.pki.goog/gtsr1/ME4wTDBKMEgwRjAJBgUrDgMCGgUABBQwkcLWD4LqGJ7bE7B1XZsEbmfwUAQU5K8rJnEaK0gnhS9SZizv8IkTcT4CDQIDvFNZazTHGPUBUGY%3D
unknown
binary
724 b
unknown
1356
iexplore.exe
GET
200
142.250.74.195:80
http://ocsp.pki.goog/gsr1/MFEwTzBNMEswSTAJBgUrDgMCGgUABBS3V7W2nAf4FiMTjpDJKg6%2BMgGqMQQUYHtmGkUNl8qJUC99BM00qP%2F8%2FUsCEHe9DWzbNvka6iEPxPBY0w0%3D
unknown
binary
1.41 Kb
unknown
1356
iexplore.exe
GET
200
8.241.11.254:80
http://ctldl.windowsupdate.com/msdownload/update/v3/static/trustedr/en/disallowedcertstl.cab?82eb57de9b37ba1f
unknown
compressed
4.66 Kb
unknown
1356
iexplore.exe
GET
302
5.79.79.211:80
http://seeyouonlineservice.com/config.php
unknown
text
11 b
unknown
1356
iexplore.exe
GET
200
142.250.74.195:80
http://ocsp.pki.goog/gts1c3/MFIwUDBOMEwwSjAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCEQCLPpgizFvtXApe3cL6kC3u
unknown
binary
472 b
unknown
1356
iexplore.exe
GET
200
3.33.243.145:80
http://ww1.seeyouonlineservice.com/
unknown
html
1.15 Kb
unknown
1356
iexplore.exe
GET
200
3.33.243.145:80
http://ww1.seeyouonlineservice.com/px.js?ch=1&abp=1
unknown
text
476 b
unknown
1356
iexplore.exe
GET
200
192.124.249.41:80
http://ocsp.starfieldtech.com//MEQwQjBAMD4wPDAJBgUrDgMCGgUABBSLwZ6EW5gdYc9UaSEaaLjjETNtkAQUv1%2B30c7dH4b0W1Ws3NcQwg6piOcCAzkUhA%3D%3D
unknown
binary
2.01 Kb
unknown
1356
iexplore.exe
GET
200
142.250.74.195:80
http://ocsp.pki.goog/gts1c3/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTHLnmK3f9hNLO67UdCuLvGwCQHYwQUinR%2Fr4XN7pXNPZzQ4kYU83E1HScCEF2rtEA6xK7GEl4nbt8ZZfk%3D
unknown
binary
471 b
unknown
Download PCAP, analyze network streams, HTTP content and a lot more at the full report

Connections

PID
Process
IP
Domain
ASN
CN
Reputation
4
System
192.168.100.255:138
whitelisted
4
System
192.168.100.255:137
whitelisted
1080
svchost.exe
224.0.0.252:5355
unknown
2588
svchost.exe
239.255.255.250:1900
whitelisted
1356
iexplore.exe
172.217.23.110:443
google.com
GOOGLE
US
whitelisted
1356
iexplore.exe
5.79.79.211:80
seeyouonlineservice.com
LeaseWeb Netherlands B.V.
NL
unknown
1356
iexplore.exe
8.241.11.254:80
ctldl.windowsupdate.com
LEVEL3
US
unknown
1356
iexplore.exe
142.250.74.195:80
ocsp.pki.goog
GOOGLE
US
whitelisted
1356
iexplore.exe
3.33.243.145:80
ww1.seeyouonlineservice.com
AMAZON-02
US
unknown
1356
iexplore.exe
142.250.185.196:443
www.google.com
GOOGLE
US
whitelisted

DNS requests

Domain
IP
Reputation
google.com
  • 172.217.23.110
whitelisted
seeyouonlineservice.com
  • 5.79.79.211
whitelisted
ctldl.windowsupdate.com
  • 8.241.11.254
  • 8.241.123.254
  • 8.253.95.249
  • 8.253.207.120
  • 67.27.157.126
whitelisted
ocsp.pki.goog
  • 142.250.74.195
whitelisted
api.bing.com
  • 13.107.5.80
whitelisted
www.bing.com
  • 13.107.21.200
  • 204.79.197.200
whitelisted
ww1.seeyouonlineservice.com
  • 3.33.243.145
  • 15.197.204.56
unknown
www.google.com
  • 142.250.185.196
whitelisted
img1.wsimg.com
  • 2.19.97.58
  • 2.22.61.133
whitelisted
ocsp.starfieldtech.com
  • 192.124.249.41
  • 192.124.249.36
  • 192.124.249.24
  • 192.124.249.23
  • 192.124.249.22
whitelisted

Threats

No threats detected
No debug info