Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    92s
  • max time network
    96s
  • platform
    windows11-21h2_x64
  • resource
    win11-20240802-en
  • resource tags

    arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system
  • submitted
    04/10/2024, 17:45

General

  • Target

    Launcher Blue/PepperFlash/pepflashplayer32.dll

  • Size

    15.8MB

  • MD5

    5d49f01ec104f87a9102935717748588

  • SHA1

    d38595832bdd8c6cf660532f1cd500d19ac7cec6

  • SHA256

    70bd415d95e42f41f5c722168e75b91821b2cb9f51be4f3a09d40a1cb6b2aa62

  • SHA512

    bec4a9378fc43057c896af6cce44874b27c5e126727c6fd21e35b40680fb85e2ba20e40149572af2b5df11b946cc21865a1a17658e556baf9beb4ff55e3ca26d

  • SSDEEP

    393216:1HCvcIjr3PQMPdqYvhjrW+XEE5awPkSEm/lzZjG9ZlfVSC1pA584LdYC8r:1ivcIjjozY5jrW+XEFwPVE21aZlfVR15

Score
3/10

Malware Config

Signatures

  • System Location Discovery: System Language Discovery 1 TTPs 1 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of WriteProcessMemory 3 IoCs

Processes

  • C:\Windows\system32\rundll32.exe
    rundll32.exe "C:\Users\Admin\AppData\Local\Temp\Launcher Blue\PepperFlash\pepflashplayer32.dll",#1
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:5056
    • C:\Windows\SysWOW64\rundll32.exe
      rundll32.exe "C:\Users\Admin\AppData\Local\Temp\Launcher Blue\PepperFlash\pepflashplayer32.dll",#1
      2⤵
      • System Location Discovery: System Language Discovery
      PID:2572

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads