Analysis

  • max time kernel
    146s
  • max time network
    153s
  • platform
    windows10-2004_x64
  • resource
    win10v2004-20230915-en
  • resource tags

    arch:x64arch:x86image:win10v2004-20230915-enlocale:en-usos:windows10-2004-x64system
  • submitted
    11/10/2023, 15:31

General

  • Target

    bammmmm.bat

  • Size

    43KB

  • MD5

    639471e9137a027add73bbce592488e0

  • SHA1

    fd3a525cb2cd166e16d6076244f46c780b32ea32

  • SHA256

    45c2244b2097278212976508faf7c0e510ea5758093ced905e2e2c6efdf638a1

  • SHA512

    c603cf30578ebcbac9e453692df2f755338135cb146501dbc4443fb9284a179105abeddc735e8a5388aa9da3b44b13db7bb61ca362ea5fced3b3f012c7fdecf6

  • SSDEEP

    192:ZyM906rXArtDiVBNc0qwnmN4yP9JV32yZSvZSoZSUZSpZSrZSSZSGZSxZSFZSMZ7:mhoIdBScfr6GZ1e

Score
1/10

Malware Config

Signatures

  • Suspicious use of WriteProcessMemory 2 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    C:\Windows\system32\cmd.exe /c "C:\Users\Admin\AppData\Local\Temp\bammmmm.bat"
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:4540
    • C:\Windows\system32\mode.com
      mode 1000
      2⤵
        PID:4492

    Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads