Overview
overview
10Static
static
10Neptune-Ma...der.py
windows7-x64
3Neptune-Ma...der.py
windows10-2004-x64
3Neptune-Ma...ler.py
windows7-x64
3Neptune-Ma...ler.py
windows10-2004-x64
3Neptune-Ma...ll.bat
windows7-x64
1Neptune-Ma...ll.bat
windows10-2004-x64
1Neptune-Ma...ne.exe
windows7-x64
7Neptune-Ma...ne.exe
windows10-2004-x64
9Neptune-Ma...ber.py
windows7-x64
3Neptune-Ma...ber.py
windows10-2004-x64
3Neptune-Ma...ies.py
windows7-x64
3Neptune-Ma...ies.py
windows10-2004-x64
3Neptune-Ma...64.dll
windows7-x64
1Neptune-Ma...64.dll
windows10-2004-x64
1Neptune-Ma...isc.py
windows7-x64
3Neptune-Ma...isc.py
windows10-2004-x64
3Neptune-Ma...ber.py
windows7-x64
3Neptune-Ma...ber.py
windows10-2004-x64
3Neptune-Ma...ons.py
windows7-x64
3Neptune-Ma...ons.py
windows10-2004-x64
3Neptune-Ma...rol.py
windows7-x64
3Neptune-Ma...rol.py
windows10-2004-x64
3Neptune-Ma...put.py
windows7-x64
3Neptune-Ma...put.py
windows10-2004-x64
3Neptune-Ma...sod.py
windows7-x64
3Neptune-Ma...sod.py
windows10-2004-x64
3Neptune-Ma...per.py
windows7-x64
3Neptune-Ma...per.py
windows10-2004-x64
3Neptune-Ma...ing.py
windows7-x64
3Neptune-Ma...ing.py
windows10-2004-x64
3Neptune-Ma...ion.py
windows7-x64
3Neptune-Ma...ion.py
windows10-2004-x64
3Analysis
-
max time kernel
104s -
max time network
20s -
platform
windows7_x64 -
resource
win7-20240704-en -
resource tags
arch:x64arch:x86image:win7-20240704-enlocale:en-usos:windows7-x64system -
submitted
10/08/2024, 13:47
Behavioral task
behavioral1
Sample
Neptune-Malware-main/builder.py
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
Neptune-Malware-main/builder.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral3
Sample
Neptune-Malware-main/compiler.py
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
Neptune-Malware-main/compiler.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral5
Sample
Neptune-Malware-main/install.bat
Resource
win7-20240704-en
Behavioral task
behavioral6
Sample
Neptune-Malware-main/install.bat
Resource
win10v2004-20240802-en
Behavioral task
behavioral7
Sample
Neptune-Malware-main/neptune.exe
Resource
win7-20240705-en
Behavioral task
behavioral8
Sample
Neptune-Malware-main/neptune.exe
Resource
win10v2004-20240802-en
Behavioral task
behavioral9
Sample
Neptune-Malware-main/resources/discord_token_grabber.py
Resource
win7-20240704-en
Behavioral task
behavioral10
Sample
Neptune-Malware-main/resources/discord_token_grabber.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral11
Sample
Neptune-Malware-main/resources/get_cookies.py
Resource
win7-20240705-en
Behavioral task
behavioral12
Sample
Neptune-Malware-main/resources/get_cookies.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral13
Sample
Neptune-Malware-main/resources/libopus-0.x64.dll
Resource
win7-20240729-en
Behavioral task
behavioral14
Sample
Neptune-Malware-main/resources/libopus-0.x64.dll
Resource
win10v2004-20240802-en
Behavioral task
behavioral15
Sample
Neptune-Malware-main/resources/misc.py
Resource
win7-20240708-en
Behavioral task
behavioral16
Sample
Neptune-Malware-main/resources/misc.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral17
Sample
Neptune-Malware-main/resources/passwords_grabber.py
Resource
win7-20240708-en
Behavioral task
behavioral18
Sample
Neptune-Malware-main/resources/passwords_grabber.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral19
Sample
Neptune-Malware-main/resources/protections.py
Resource
win7-20240708-en
Behavioral task
behavioral20
Sample
Neptune-Malware-main/resources/protections.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral21
Sample
Neptune-Malware-main/resources/source_code/audio_control.py
Resource
win7-20240704-en
Behavioral task
behavioral22
Sample
Neptune-Malware-main/resources/source_code/audio_control.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral23
Sample
Neptune-Malware-main/resources/source_code/block_input.py
Resource
win7-20240729-en
Behavioral task
behavioral24
Sample
Neptune-Malware-main/resources/source_code/block_input.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral25
Sample
Neptune-Malware-main/resources/source_code/bsod.py
Resource
win7-20240708-en
Behavioral task
behavioral26
Sample
Neptune-Malware-main/resources/source_code/bsod.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral27
Sample
Neptune-Malware-main/resources/source_code/crypto_clipper.py
Resource
win7-20240705-en
Behavioral task
behavioral28
Sample
Neptune-Malware-main/resources/source_code/crypto_clipper.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral29
Sample
Neptune-Malware-main/resources/source_code/file_downloading.py
Resource
win7-20240704-en
Behavioral task
behavioral30
Sample
Neptune-Malware-main/resources/source_code/file_downloading.py
Resource
win10v2004-20240802-en
Behavioral task
behavioral31
Sample
Neptune-Malware-main/resources/source_code/file_encryption.py
Resource
win7-20240729-en
Behavioral task
behavioral32
Sample
Neptune-Malware-main/resources/source_code/file_encryption.py
Resource
win10v2004-20240802-en
General
-
Target
Neptune-Malware-main/resources/source_code/file_downloading.py
-
Size
4KB
-
MD5
a6a8f66dc948fccabdff769ac0391051
-
SHA1
46e4c36f9a1f1e9f55d666a4aa131df3d90c2d95
-
SHA256
dcfdcfa7be30268674eac8180b7574701da96f14e960851e9482380bbb5965ef
-
SHA512
4fb0fba56a7c697ade439c94b6f05d7cd61dd631539caf132012c409b605d7e801ae271a2d6af09adbabb3e25742c028a46c204cbaf96ebbdc8bb89066f65479
-
SSDEEP
48:+U/gQQpTta/hFWuMjfG/m1tN4GIdfwmMtaT6n/hytavhMqyQtaPhL:p/I+/hjM7Ge/CGIdfwmnoZ9vhMZPhL
Malware Config
Signatures
-
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language AcroRd32.exe -
Modifies registry class 9 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_Classes\Local Settings rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\py_auto_file\ rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\py_auto_file rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\.py rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\.py\ = "py_auto_file" rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\py_auto_file\shell\Read rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\py_auto_file\shell rundll32.exe Key created \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\py_auto_file\shell\Read\command rundll32.exe Set value (str) \REGISTRY\USER\S-1-5-21-2212144002-1172735686-1556890956-1000_CLASSES\py_auto_file\shell\Read\command\ = "\"C:\\Program Files (x86)\\Adobe\\Reader 9.0\\Reader\\AcroRd32.exe\" \"%1\"" rundll32.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 2864 AcroRd32.exe -
Suspicious use of SetWindowsHookEx 2 IoCs
pid Process 2864 AcroRd32.exe 2864 AcroRd32.exe -
Suspicious use of WriteProcessMemory 7 IoCs
description pid Process procid_target PID 2960 wrote to memory of 2828 2960 cmd.exe 31 PID 2960 wrote to memory of 2828 2960 cmd.exe 31 PID 2960 wrote to memory of 2828 2960 cmd.exe 31 PID 2828 wrote to memory of 2864 2828 rundll32.exe 32 PID 2828 wrote to memory of 2864 2828 rundll32.exe 32 PID 2828 wrote to memory of 2864 2828 rundll32.exe 32 PID 2828 wrote to memory of 2864 2828 rundll32.exe 32
Processes
-
C:\Windows\system32\cmd.execmd /c C:\Users\Admin\AppData\Local\Temp\Neptune-Malware-main\resources\source_code\file_downloading.py1⤵
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Windows\system32\rundll32.exe"C:\Windows\system32\rundll32.exe" C:\Windows\system32\shell32.dll,OpenAs_RunDLL C:\Users\Admin\AppData\Local\Temp\Neptune-Malware-main\resources\source_code\file_downloading.py2⤵
- Modifies registry class
- Suspicious use of WriteProcessMemory
PID:2828 -
C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe"C:\Program Files (x86)\Adobe\Reader 9.0\Reader\AcroRd32.exe" "C:\Users\Admin\AppData\Local\Temp\Neptune-Malware-main\resources\source_code\file_downloading.py"3⤵
- System Location Discovery: System Language Discovery
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of SetWindowsHookEx
PID:2864
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD575d0cb72b0f06df31b431fa2ec581ca6
SHA1e66260f31469ec0bb5fe023b28ebe39900f127f9
SHA2567f0ac047318a0a701267c650a352453a1bb8467c2b88d533d72b829dbcaa7a7a
SHA51289d58e60a04e382e480aca5dcd96b34e80334424873f9b0305c847046223f4da96ca47dc0877dbb5b3d332347476915bd11e4735752ab81ba709a001016f4e09