Analysis

  • max time kernel
    121s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    14/02/2024, 17:31 UTC

General

  • Target

    Neptune-main/README.md

  • Size

    4KB

  • MD5

    b001dbcd4c3cd4464b36e6e9a10e1f93

  • SHA1

    ff5b7796746ec65ed6026a394284f1270ef154fb

  • SHA256

    998da992199418e7aa51f49b6ac6ba520ae4d0157254f141b7079d4aec4afb32

  • SHA512

    4e8a847f8ee7845ccd12654c75be0abad16950f1bcb0104804bda120a7d0e6bbfa35a689adc710f7d5a45b6c36dd06992ca938f6b7e601eb2e19dd52665e0733

  • SSDEEP

    96:2IcK6pgsUNNPw+ocZet+m8W7OuwCgFEXv234CmEinY:2hisypw+ocZet+mN7Ouwjavej0Y

Score
3/10

Malware Config

Signatures

  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • Modifies registry class 9 IoCs
  • Suspicious behavior: GetForegroundWindowSpam 1 IoCs
  • Suspicious use of SetWindowsHookEx 2 IoCs
  • Suspicious use of WriteProcessMemory 7 IoCs

Processes

  • C:\Windows\system32\cmd.exe
    cmd /c C:\Users\Admin\AppData\Local\Temp\Neptune-main\README.md
    1⤵
    • Suspicious use of WriteProcessMemory
    PID:2416
    • C:\Windows\system32\rundll32.exe
      "C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Neptune-main\README.md
      2⤵
      • Modifies registry class
      • Suspicious use of WriteProcessMemory
      PID:2876
      • C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe
        "C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Neptune-main\README.md"
        3⤵
        • Suspicious behavior: GetForegroundWindowSpam
        • Suspicious use of SetWindowsHookEx
        PID:2296

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Roaming\Adobe\Acrobat\9.0\SharedDataEvents

    Filesize

    3KB

    MD5

    a95138a9e8588c2b023f07822314d7ba

    SHA1

    2b8dad30090dbe5a66e4b626607efd26f17503aa

    SHA256

    7f1703765070de904ebe6f14f30b8083f0e2b02092a2712aa097de98213d66d1

    SHA512

    0c6d32b6fc9241b778f53ccb3ced56589f79f7916a09662b3a80141cac86f8b07f059c8f176ce1792733afa0f7eb633e6e64f3c67e120ced7ed587c166b84a40

We care about your privacy.

This website stores cookies on your computer. These cookies are used to improve your website experience and provide more personalized services to you, both on this website and through other media. To find out more about the cookies we use, see our Privacy Policy.