Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
134s -
max time network
137s -
platform
windows10-1703_x64 -
resource
win10-20240404-en -
resource tags
arch:x64arch:x86image:win10-20240404-enlocale:en-usos:windows10-1703-x64system -
submitted
14/09/2024, 18:41
Static task
static1
Behavioral task
behavioral1
Sample
NaxTools 0.1 Alpha/NaxTools.exe
Resource
win10-20240404-en
Behavioral task
behavioral2
Sample
NaxTools 0.1 Alpha/NaxTools.exe
Resource
win10-20240404-en
Behavioral task
behavioral3
Sample
NaxTools 0.1 Alpha/files/WifiPasswordReveal.bat
Resource
win7-20240903-en
Behavioral task
behavioral4
Sample
NaxTools 0.1 Alpha/files/WifiPasswordReveal.bat
Resource
win10-20240404-en
General
-
Target
NaxTools 0.1 Alpha/NaxTools.exe
-
Size
481KB
-
MD5
f75cea7c6755c690e5b702100e6d911b
-
SHA1
c3f976b9f44df85cf69b66b85cbcdd263b58a753
-
SHA256
f24bdba43001267331f0c8ca1f601af0a2f49d7145a65636318473d5ec3fd786
-
SHA512
bc6de19e62253a8265724f9f60eb93a05cc179c0ae27a82b630cefda1b85171177873d32932355863d35f8e480a9e6247af779e6964c25d2da858eb69948c4d5
-
SSDEEP
3072:i23rbZi/8GprF3jg/oFDURnnFII/vvKc8mCLn2a8srUUYg2Y6BV8o:iKr1i/8UFJDURnnWIn/8Rh8OUfnBr
Malware Config
Signatures
-
Hide Artifacts: Hidden Files and Directories 1 TTPs 1 IoCs
pid Process 4152 cmd.exe -
System Location Discovery: System Language Discovery 1 TTPs 12 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language NaxTools.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language mode.com Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language attrib.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language cmd.exe -
Suspicious use of WriteProcessMemory 33 IoCs
description pid Process procid_target PID 4500 wrote to memory of 4984 4500 NaxTools.exe 75 PID 4500 wrote to memory of 4984 4500 NaxTools.exe 75 PID 4500 wrote to memory of 4984 4500 NaxTools.exe 75 PID 4984 wrote to memory of 3540 4984 cmd.exe 76 PID 4984 wrote to memory of 3540 4984 cmd.exe 76 PID 4984 wrote to memory of 3540 4984 cmd.exe 76 PID 4500 wrote to memory of 1872 4500 NaxTools.exe 77 PID 4500 wrote to memory of 1872 4500 NaxTools.exe 77 PID 4500 wrote to memory of 1872 4500 NaxTools.exe 77 PID 4500 wrote to memory of 1548 4500 NaxTools.exe 78 PID 4500 wrote to memory of 1548 4500 NaxTools.exe 78 PID 4500 wrote to memory of 1548 4500 NaxTools.exe 78 PID 4500 wrote to memory of 2080 4500 NaxTools.exe 79 PID 4500 wrote to memory of 2080 4500 NaxTools.exe 79 PID 4500 wrote to memory of 2080 4500 NaxTools.exe 79 PID 4500 wrote to memory of 4152 4500 NaxTools.exe 80 PID 4500 wrote to memory of 4152 4500 NaxTools.exe 80 PID 4500 wrote to memory of 4152 4500 NaxTools.exe 80 PID 4152 wrote to memory of 5096 4152 cmd.exe 81 PID 4152 wrote to memory of 5096 4152 cmd.exe 81 PID 4152 wrote to memory of 5096 4152 cmd.exe 81 PID 4500 wrote to memory of 3968 4500 NaxTools.exe 82 PID 4500 wrote to memory of 3968 4500 NaxTools.exe 82 PID 4500 wrote to memory of 3968 4500 NaxTools.exe 82 PID 4500 wrote to memory of 5044 4500 NaxTools.exe 83 PID 4500 wrote to memory of 5044 4500 NaxTools.exe 83 PID 4500 wrote to memory of 5044 4500 NaxTools.exe 83 PID 4500 wrote to memory of 1452 4500 NaxTools.exe 84 PID 4500 wrote to memory of 1452 4500 NaxTools.exe 84 PID 4500 wrote to memory of 1452 4500 NaxTools.exe 84 PID 4500 wrote to memory of 1508 4500 NaxTools.exe 85 PID 4500 wrote to memory of 1508 4500 NaxTools.exe 85 PID 4500 wrote to memory of 1508 4500 NaxTools.exe 85 -
Views/modifies file attributes 1 TTPs 1 IoCs
pid Process 5096 attrib.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\NaxTools 0.1 Alpha\NaxTools.exe"C:\Users\Admin\AppData\Local\Temp\NaxTools 0.1 Alpha\NaxTools.exe"1⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4500 -
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c mode con:cols=0120 lines=00302⤵
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4984 -
C:\Windows\SysWOW64\mode.commode con:cols=0120 lines=00303⤵
- System Location Discovery: System Language Discovery
PID:3540
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c title NaxTools2⤵
- System Location Discovery: System Language Discovery
PID:1872
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c if not exist "C:\Users\Admin\AppData\Local\Temp\myfiles" mkdir "C:\Users\Admin\AppData\Local\Temp\myfiles"2⤵
- System Location Discovery: System Language Discovery
PID:1548
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c if not exist "C:\Users\Admin\AppData\Local\Temp\wtmpd" mkdir "C:\Users\Admin\AppData\Local\Temp\wtmpd"2⤵
- System Location Discovery: System Language Discovery
PID:2080
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c attrib +h C:\Users\Admin\AppData\Local\Temp\wtmpd2⤵
- Hide Artifacts: Hidden Files and Directories
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4152 -
C:\Windows\SysWOW64\attrib.exeattrib +h C:\Users\Admin\AppData\Local\Temp\wtmpd3⤵
- System Location Discovery: System Language Discovery
- Views/modifies file attributes
PID:5096
-
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c echo:0>C:\Users\Admin\AppData\Local\Temp\i6.t2⤵
- System Location Discovery: System Language Discovery
PID:3968
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c C:\Users\Admin\AppData\Local\Temp\i6.bat2⤵
- System Location Discovery: System Language Discovery
PID:5044
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c2⤵
- System Location Discovery: System Language Discovery
PID:1452
-
-
C:\Windows\SysWOW64\cmd.exeC:\Windows\system32\cmd.exe /c pause2⤵
- System Location Discovery: System Language Discovery
PID:1508
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
173B
MD50f8f70e88009593eefaa155a8e31b1d6
SHA1eabcc3f2135e0919e9456da0a4b1084f3382d4b6
SHA256941c169c07670650fc6c6148c1cae068b69bac209e05010594e164aafc7cdf8b
SHA51294df468b963f3c9d133a25e1ffa57039fac01fe960f0f738552ca6440e6242ff48d0b410fe70dd05a62e4842c925c9f2b0220ca9eb9cb4ff5490ada443c9a750