Analysis

  • max time kernel
    14s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    05/10/2024, 03:27

General

  • Target

    kerbprsr.dll

  • Size

    30KB

  • MD5

    dd0d289edc33ef1c48125f762271dfb3

  • SHA1

    a4a175915c9ff3cd6d376fd250ef2238b4b19c8d

  • SHA256

    50012f0fa6bbf4ea1e9d1270edaa695c5787788ddcb8251656b4926ae09e1cfc

  • SHA512

    5984bd741b577ffd7f9852b86f9e18c5d946ed80887fe1da2638535e85fe04212f338ff62cd4f0a9b93b97e2094c133e0cf3bb684049baef072114ac2498259a

  • SSDEEP

    768:UT6iwoul/bVYp7PlEKpYTdifEHglolIXx5JiItlp:zYp7PluTU3DB5JiCp

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe C:\Users\Admin\AppData\Local\Temp\kerbprsr.dll,#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2112
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe C:\Users\Admin\AppData\Local\Temp\kerbprsr.dll,#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2280

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads