Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Overview
overview
3Static
static
1Neptune-main.zip
windows7-x64
1Neptune-main.zip
windows10-2004-x64
1Neptune-ma...DME.md
windows7-x64
3Neptune-ma...DME.md
windows10-2004-x64
3Neptune-ma...wnload
windows7-x64
1Neptune-ma...wnload
windows10-2004-x64
1Neptune-ma...une.py
windows7-x64
3Neptune-ma...une.py
windows10-2004-x64
3Neptune-ma...ts.txt
windows7-x64
1Neptune-ma...ts.txt
windows10-2004-x64
1Neptune-ma...up.bat
windows7-x64
1Neptune-ma...up.bat
windows10-2004-x64
1Analysis
-
max time kernel
148s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20240221-en -
resource tags
arch:x64arch:x86image:win10v2004-20240221-enlocale:en-usos:windows10-2004-x64system -
submitted
21/02/2024, 21:13
Static task
static1
Behavioral task
behavioral1
Sample
Neptune-main.zip
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
Neptune-main.zip
Resource
win10v2004-20240221-en
Behavioral task
behavioral3
Sample
Neptune-main/README.md
Resource
win7-20240221-en
Behavioral task
behavioral4
Sample
Neptune-main/README.md
Resource
win10v2004-20240221-en
Behavioral task
behavioral5
Sample
Neptune-main/demonstration file only do not download
Resource
win7-20240221-en
Behavioral task
behavioral6
Sample
Neptune-main/demonstration file only do not download
Resource
win10v2004-20240221-en
Behavioral task
behavioral7
Sample
Neptune-main/neptune.py
Resource
win7-20240220-en
Behavioral task
behavioral8
Sample
Neptune-main/neptune.py
Resource
win10v2004-20240221-en
Behavioral task
behavioral9
Sample
Neptune-main/requirements.txt
Resource
win7-20240221-en
Behavioral task
behavioral10
Sample
Neptune-main/requirements.txt
Resource
win10v2004-20240221-en
Behavioral task
behavioral11
Sample
Neptune-main/setup.bat
Resource
win7-20240221-en
Behavioral task
behavioral12
Sample
Neptune-main/setup.bat
Resource
win10v2004-20240221-en
General
-
Target
Neptune-main/README.md
-
Size
4KB
-
MD5
83519edaca1f61757602622728d37af8
-
SHA1
eb7815d3dc7aede027da74b78448a6c277e5bd01
-
SHA256
c4e063c5787ed226803035c8d21ca3016148e8d4842450a3b7d5398c374976f4
-
SHA512
f83b719b3b62faf2ea9bea16a3ea6f14a77fa3a038fb9cb8276d04ad0dd7f556aa2a185c5d118b5a0c71414b945ce0dd6093c4e788ee2ea45fb3f0589f81055b
-
SSDEEP
96:2IcK6tAsUNNPw+ocZet+m8W7OuwCgFEXv234CmEinY:2hisypw+ocZet+mN7Ouwjavej0Y
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Modifies registry class 2 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2828415587-3732861812-1919322417-1000_Classes\Local Settings cmd.exe Key created \REGISTRY\USER\S-1-5-21-2828415587-3732861812-1919322417-1000_Classes\Local Settings OpenWith.exe -
Suspicious use of SetWindowsHookEx 1 IoCs
pid Process 4012 OpenWith.exe