| File name: | Super Facebook.bat |
| Full analysis: | https://app.any.run/tasks/adfe93d6-46f9-48e0-ac48-1a5a35ff98ac |
| Verdict: | Malicious activity |
| Threats: | Remote access trojans (RATs) are a type of malware that enables attackers to establish complete to partial control over infected computers. Such malicious programs often have a modular design, offering a wide range of functionalities for conducting illicit activities on compromised systems. Some of the most common features of RATs include access to the users’ data, webcam, and keystrokes. This malware is often distributed through phishing emails and links. |
| Analysis date: | April 01, 2023, 09:58:13 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Tags: | |
| Indicators: | |
| MIME: | text/plain |
| File info: | ASCII text, with very long lines, with CRLF line terminators |
| MD5: | 476D87590230E420D07A4D6FD677BD1D |
| SHA1: | 29A2C881B58DD4D9EA40C2208952FDC39627265D |
| SHA256: | B6EE5CED40C6A82853E8B5543E139254B0AA9C503B670943818B332297293DD2 |
| SSDEEP: | 3072:lKEN79wvVZHRTlfG+7nxmiNQuJ7Mhs6gf/Ks+vCN/MG1XLfzz6PM:ld9w7HRT/7nhiu7ks6gfSsrN/nXjzz6U |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 476 | C:\Windows\system32\cmd.exe /c ""C:\Users\admin\AppData\Local\Temp\Media_SC.bat" " | C:\Windows\System32\cmd.exe | Super Facebook.bat.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 0 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 868 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=data_decoder.mojom.DataDecoderService --field-trial-handle=1104,3935531554579494290,6012346249917066846,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=utility --mojo-platform-channel-handle=3000 /prefetch:8 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: LOW Description: Google Chrome Exit code: 0 Version: 86.0.4240.198 Modules
| |||||||||||||||
| 948 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1104,3935531554579494290,6012346249917066846,131072 --enable-features=PasswordImport --lang=en-US --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=6 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=1896 /prefetch:1 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: LOW Description: Google Chrome Exit code: 0 Version: 86.0.4240.198 Modules
| |||||||||||||||
| 952 | "C:\Windows\system32\taskmgr.exe" /4 | C:\Windows\System32\taskmgr.exe | — | explorer.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Task Manager Exit code: 1073807364 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1020 | powershell -w hidden -c # | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | cmd.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 0 Version: 10.0.14409.1005 (rs1_srvoob.161208-1155) Modules
| |||||||||||||||
| 1592 | "C:\Windows\System32\schtasks.exe" /create /f /sc minute /mo 1 /tn "Super Facebook" /tr "C:\Users\admin\AppData\Roaming\Super Facebook.bat" | C:\Windows\System32\schtasks.exe | — | Super Facebook.bat.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Manages scheduled tasks Exit code: 0 Version: 6.1.7600.16385 (win7_rtm.090713-1255) Modules
| |||||||||||||||
| 1792 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=renderer --field-trial-handle=1104,3935531554579494290,6012346249917066846,131072 --enable-features=PasswordImport --lang=en-US --instant-process --device-scale-factor=1 --num-raster-threads=2 --enable-main-frame-before-activation --renderer-client-id=5 --no-v8-untrusted-code-mitigations --mojo-platform-channel-handle=2064 /prefetch:1 | C:\Program Files\Google\Chrome\Application\chrome.exe | — | chrome.exe | |||||||||||
User: admin Company: Google LLC Integrity Level: LOW Description: Google Chrome Exit code: 0 Version: 86.0.4240.198 Modules
| |||||||||||||||
| 1872 | "C:\Program Files\Google\Chrome\Application\chrome.exe" --type=utility --utility-sub-type=network.mojom.NetworkService --field-trial-handle=1104,3935531554579494290,6012346249917066846,131072 --enable-features=PasswordImport --lang=en-US --service-sandbox-type=network --mojo-platform-channel-handle=1260 /prefetch:8 | C:\Program Files\Google\Chrome\Application\chrome.exe | chrome.exe | ||||||||||||
User: admin Company: Google LLC Integrity Level: MEDIUM Description: Google Chrome Exit code: 0 Version: 86.0.4240.198 Modules
| |||||||||||||||
| 2064 | C:\Windows\system32\cmd.exe /c ""C:\Users\admin\AppData\Local\Temp\Super Facebook.bat" " | C:\Windows\System32\cmd.exe | explorer.exe | ||||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows Command Processor Exit code: 1073807364 Version: 6.1.7601.17514 (win7sp1_rtm.101119-1850) Modules
| |||||||||||||||
| 2544 | "C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe" $a = [System.Diagnostics.Process]::GetProcessById(476);$b = $a.MainModule.FileName;$a.WaitForExit();Remove-Item -Force -Path $b; | C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe | — | Super Facebook.bat.exe | |||||||||||
User: admin Company: Microsoft Corporation Integrity Level: MEDIUM Description: Windows PowerShell Exit code: 1 Version: 10.0.14409.1005 (rs1_srvoob.161208-1155) Modules
| |||||||||||||||
| (PID) Process: | (3004) Super Facebook.bat.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (3004) Super Facebook.bat.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (3004) Super Facebook.bat.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (3004) Super Facebook.bat.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (3228) Media_SC.bat.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | ProxyBypass |
Value: 1 | |||
| (PID) Process: | (3228) Media_SC.bat.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | IntranetName |
Value: 1 | |||
| (PID) Process: | (3228) Media_SC.bat.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 1 | |||
| (PID) Process: | (3228) Media_SC.bat.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 0 | |||
| (PID) Process: | (3808) wmpnscfg.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Player NSS\3.0\Events\{43A81245-959F-4A19-9374-33B5BC485DC7}\{3EE7EBFB-27BB-4DD4-B7BE-0DF10408ECC7} |
| Operation: | delete key | Name: | (default) |
Value: | |||
| (PID) Process: | (3808) wmpnscfg.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows Media Player NSS\3.0\Events\{43A81245-959F-4A19-9374-33B5BC485DC7} |
| Operation: | delete key | Name: | (default) |
Value: | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 3004 | Super Facebook.bat.exe | C:\Users\admin\AppData\Local\Temp\Media_SC.bat | text | |
MD5:— | SHA256:— | |||
| 3004 | Super Facebook.bat.exe | C:\Users\admin\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\Super Facebook.lnk | lnk | |
MD5:— | SHA256:— | |||
| 3004 | Super Facebook.bat.exe | C:\Users\admin\AppData\Roaming\Super Facebook.bat | text | |
MD5:— | SHA256:— | |||
| 3520 | chrome.exe | C:\Users\admin\AppData\Local\Google\Chrome\User Data\BrowserMetrics\BrowserMetrics-64280078-DC0.pma | — | |
MD5:— | SHA256:— | |||
| 2544 | powershell.exe | C:\Users\admin\AppData\Local\Temp\ts3wid3p.1ef.psm1 | binary | |
MD5:C4CA4238A0B923820DCC509A6F75849B | SHA256:— | |||
| 2544 | powershell.exe | C:\Users\admin\AppData\Local\Temp\jaubr1zw.sha.ps1 | binary | |
MD5:C4CA4238A0B923820DCC509A6F75849B | SHA256:— | |||
| 3056 | powershell.exe | C:\Users\admin\AppData\Local\Temp\dnewvnyn.v3w.psm1 | binary | |
MD5:C4CA4238A0B923820DCC509A6F75849B | SHA256:— | |||
| 2064 | cmd.exe | C:\Users\admin\AppData\Local\Temp\Super Facebook.bat.exe | executable | |
MD5:EB32C070E658937AA9FA9F3AE629B2B8 | SHA256:70BA57FB0BF2F34B86426D21559F5F6D05C1268193904DE8E959D7B06CE964CE | |||
| 3004 | Super Facebook.bat.exe | C:\Users\admin\AppData\Local\Temp\h4w0u444.1tr.ps1 | binary | |
MD5:C4CA4238A0B923820DCC509A6F75849B | SHA256:— | |||
| 3004 | Super Facebook.bat.exe | C:\Users\admin\AppData\Local\Temp\cfwciayz.lsv.psm1 | binary | |
MD5:C4CA4238A0B923820DCC509A6F75849B | SHA256:— | |||
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
3228 | Media_SC.bat.exe | 108.165.242.134:34097 | — | Heymman Servers Corporation | US | malicious |
— | — | 149.154.167.220:443 | api.telegram.org | Telegram Messenger Inc | GB | malicious |
3004 | Super Facebook.bat.exe | 108.165.242.134:7000 | — | Heymman Servers Corporation | US | malicious |
1872 | chrome.exe | 142.250.186.67:443 | clientservices.googleapis.com | GOOGLE | US | whitelisted |
1872 | chrome.exe | 142.250.185.196:443 | www.google.com | GOOGLE | US | whitelisted |
1872 | chrome.exe | 142.250.185.109:443 | accounts.google.com | GOOGLE | US | suspicious |
1872 | chrome.exe | 142.250.185.193:443 | clients2.googleusercontent.com | GOOGLE | US | whitelisted |
1872 | chrome.exe | 142.250.185.138:443 | fonts.googleapis.com | GOOGLE | US | whitelisted |
1872 | chrome.exe | 142.250.186.35:443 | www.gstatic.com | GOOGLE | US | whitelisted |
1872 | chrome.exe | 172.217.16.206:443 | apis.google.com | GOOGLE | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
api.telegram.org |
| shared |
clientservices.googleapis.com |
| whitelisted |
www.google.com |
| malicious |
clients2.google.com |
| whitelisted |
accounts.google.com |
| shared |
clients2.googleusercontent.com |
| whitelisted |
fonts.googleapis.com |
| whitelisted |
www.gstatic.com |
| whitelisted |
fonts.gstatic.com |
| whitelisted |
apis.google.com |
| whitelisted |
PID | Process | Class | Message |
|---|---|---|---|
3228 | Media_SC.bat.exe | A Network Trojan was detected | ET MALWARE RedLine Stealer TCP CnC net.tcp Init |
— | — | Misc activity | ET HUNTING Telegram API Domain in DNS Lookup |
3004 | Super Facebook.bat.exe | Misc activity | ET HUNTING Observed Telegram API Domain (api .telegram .org in TLS SNI) |
3004 | Super Facebook.bat.exe | Misc activity | ET HUNTING Telegram API Certificate Observed |
3228 | Media_SC.bat.exe | A Network Trojan was detected | ET MALWARE RedLine Stealer TCP CnC net.tcp Init |
3228 | Media_SC.bat.exe | A Network Trojan was detected | ET MALWARE Redline Stealer TCP CnC Activity |
3228 | Media_SC.bat.exe | A Network Trojan was detected | ET MALWARE Redline Stealer TCP CnC - Id1Response |
3228 | Media_SC.bat.exe | A Network Trojan was detected | ET MALWARE Redline Stealer TCP CnC - Id1Response |
3228 | Media_SC.bat.exe | A Network Trojan was detected | ET MALWARE Redline Stealer TCP CnC Activity |
3228 | Media_SC.bat.exe | A Network Trojan was detected | ET MALWARE Redline Stealer TCP CnC Activity |