Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
91s -
max time network
94s -
platform
windows11-21h2_x64 -
resource
win11-20241007-en -
resource tags
arch:x64arch:x86image:win11-20241007-enlocale:en-usos:windows11-21h2-x64system -
submitted
10/01/2025, 00:26
Static task
static1
Behavioral task
behavioral1
Sample
Nexol.exe
Resource
win10ltsc2021-20241211-en
Behavioral task
behavioral2
Sample
Nexol.exe
Resource
win11-20241007-en
General
-
Target
Nexol.exe
-
Size
336KB
-
MD5
df6e1225e3f7742dd9acbbbd14ce246a
-
SHA1
6390796d5b6e453bed100439be5d89ef9a9066e5
-
SHA256
33ae6c44a08efb52c0c69a8f8827f2afab230cce1cf9652fc63237d2e30622a4
-
SHA512
72b2b577b7b3a59401f455079cf79fa8e9c874c6c0293f984c5f726b9fa07ef59924790093709a86654db91a14d9565682c17093ee9cdb0df17ecff71ba1686c
-
SSDEEP
6144:cVQkSbQElKYoeV4bd1FKCvaL/1vlGF0UeR5aNj7nucEqq9:0QLQEjCdbKcw9vEdbj7hA9
Malware Config
Signatures
-
Suspicious use of SetThreadContext 2 IoCs
description pid Process procid_target PID 4924 set thread context of 2340 4924 Nexol.exe 79 PID 4924 set thread context of 1416 4924 Nexol.exe 80 -
Program crash 1 IoCs
pid pid_target Process procid_target 4276 4924 WerFault.exe 77 -
System Location Discovery: System Language Discovery 1 TTPs 3 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nexol.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nexol.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Nexol.exe -
Suspicious use of WriteProcessMemory 18 IoCs
description pid Process procid_target PID 4924 wrote to memory of 2340 4924 Nexol.exe 79 PID 4924 wrote to memory of 2340 4924 Nexol.exe 79 PID 4924 wrote to memory of 2340 4924 Nexol.exe 79 PID 4924 wrote to memory of 2340 4924 Nexol.exe 79 PID 4924 wrote to memory of 2340 4924 Nexol.exe 79 PID 4924 wrote to memory of 2340 4924 Nexol.exe 79 PID 4924 wrote to memory of 2340 4924 Nexol.exe 79 PID 4924 wrote to memory of 2340 4924 Nexol.exe 79 PID 4924 wrote to memory of 2340 4924 Nexol.exe 79 PID 4924 wrote to memory of 1416 4924 Nexol.exe 80 PID 4924 wrote to memory of 1416 4924 Nexol.exe 80 PID 4924 wrote to memory of 1416 4924 Nexol.exe 80 PID 4924 wrote to memory of 1416 4924 Nexol.exe 80 PID 4924 wrote to memory of 1416 4924 Nexol.exe 80 PID 4924 wrote to memory of 1416 4924 Nexol.exe 80 PID 4924 wrote to memory of 1416 4924 Nexol.exe 80 PID 4924 wrote to memory of 1416 4924 Nexol.exe 80 PID 4924 wrote to memory of 1416 4924 Nexol.exe 80
Processes
-
C:\Users\Admin\AppData\Local\Temp\Nexol.exe"C:\Users\Admin\AppData\Local\Temp\Nexol.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:4924 -
C:\Users\Admin\AppData\Local\Temp\Nexol.exe"C:\Users\Admin\AppData\Local\Temp\Nexol.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2340
-
-
C:\Users\Admin\AppData\Local\Temp\Nexol.exe"C:\Users\Admin\AppData\Local\Temp\Nexol.exe"2⤵
- System Location Discovery: System Language Discovery
PID:1416
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4924 -s 8122⤵
- Program crash
PID:4276
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4924 -ip 49241⤵PID:1744