Overview
overview
10Static
static
10Court Proj...IO.exe
windows7-x64
7Court Proj...IO.exe
windows10-2004-x64
7Court Proj...ct.exe
windows7-x64
7Court Proj...ct.exe
windows10-2004-x64
9Court Proj...fo.exe
windows7-x64
1Court Proj...fo.exe
windows10-2004-x64
1Court Proj...ing.py
windows7-x64
3Court Proj...ing.py
windows10-2004-x64
3Court Proj...ker.py
ubuntu-18.04-amd64
1Court Proj...ker.py
debian-9-armhf
1Court Proj...ker.py
debian-9-mips
Court Proj...ker.py
debian-9-mipsel
Court Proj...mer.py
windows7-x64
3Court Proj...mer.py
windows10-2004-x64
3Court Proj...up.exe
windows7-x64
7Court Proj...up.exe
windows10-2004-x64
7Court Proj...one.py
windows7-x64
3Court Proj...one.py
windows10-2004-x64
3Court Proj...pic.py
windows7-x64
3Court Proj...pic.py
windows10-2004-x64
3Resubmissions
25-12-2024 11:40
241225-ns1f3ssmct 1020-06-2024 01:12
240620-bk1qnavdrk 1001-06-2024 22:28
240601-2d43lsgh7s 10Analysis
-
max time kernel
118s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20240508-en -
resource tags
arch:x64arch:x86image:win7-20240508-enlocale:en-usos:windows7-x64system -
submitted
01-06-2024 22:28
Behavioral task
behavioral1
Sample
Court Project V1.1/AIO.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
Court Project V1.1/AIO.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral3
Sample
Court Project V1.1/Court Project.exe
Resource
win7-20240508-en
Behavioral task
behavioral4
Sample
Court Project V1.1/Court Project.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
Court Project V1.1/Doxinfo.exe
Resource
win7-20231129-en
Behavioral task
behavioral6
Sample
Court Project V1.1/Doxinfo.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
Court Project V1.1/Doxing.py
Resource
win7-20240419-en
Behavioral task
behavioral8
Sample
Court Project V1.1/Doxing.py
Resource
win10v2004-20240508-en
Behavioral task
behavioral9
Sample
Court Project V1.1/Doxtracker.py
Resource
ubuntu1804-amd64-20240508-en
Behavioral task
behavioral10
Sample
Court Project V1.1/Doxtracker.py
Resource
debian9-armhf-20240226-en
Behavioral task
behavioral11
Sample
Court Project V1.1/Doxtracker.py
Resource
debian9-mipsbe-20240226-en
Behavioral task
behavioral12
Sample
Court Project V1.1/Doxtracker.py
Resource
debian9-mipsel-20240418-en
Behavioral task
behavioral13
Sample
Court Project V1.1/GmailSpammer.py
Resource
win7-20240508-en
Behavioral task
behavioral14
Sample
Court Project V1.1/GmailSpammer.py
Resource
win10v2004-20240426-en
Behavioral task
behavioral15
Sample
Court Project V1.1/iplookup.exe
Resource
win7-20240508-en
Behavioral task
behavioral16
Sample
Court Project V1.1/iplookup.exe
Resource
win10v2004-20240426-en
Behavioral task
behavioral17
Sample
Court Project V1.1/phone.py
Resource
win7-20240508-en
Behavioral task
behavioral18
Sample
Court Project V1.1/phone.py
Resource
win10v2004-20240508-en
Behavioral task
behavioral19
Sample
Court Project V1.1/reversepic.py
Resource
win7-20231129-en
Behavioral task
behavioral20
Sample
Court Project V1.1/reversepic.py
Resource
win10v2004-20240426-en
General
-
Target
Court Project V1.1/Court Project.exe
-
Size
75.3MB
-
MD5
237a78a3b4b36d749f0e46d26dbc965b
-
SHA1
f73af65ad456feb2bf5159161ff4b9ace5202598
-
SHA256
26cf8403cb6124796a98eb4644b3d75569bea2ba156456d0dd1b0b04ad3b3572
-
SHA512
7223a6692a131c47c7aade3a0ddd7a1fb3dbb420e824921b508565d7363185229d419e3df9e4dd3abf96200945ad076c592712fecf68f47b7e7d9105c59eac89
-
SSDEEP
1572864:ivFUQpjkuwSk8IpG7V+VPhqS0E7WZRjRH2PRQvS6f97PyhonB08yfXWulZvFVN:ivFUqA7SkB05awSgZRdW2S6f9jnB08Qd
Malware Config
Signatures
-
Executes dropped EXE 3 IoCs
pid Process 2332 PHONE LINK.EXE 2876 PHONE LINK.EXE 1196 Process not Found -
Loads dropped DLL 4 IoCs
pid Process 3068 Court Project.exe 2332 PHONE LINK.EXE 2876 PHONE LINK.EXE 1196 Process not Found -
resource yara_rule behavioral3/files/0x000400000001d388-1278.dat upx behavioral3/memory/2876-1280-0x000007FEF5B50000-0x000007FEF5FBE000-memory.dmp upx -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of WriteProcessMemory 15 IoCs
description pid Process procid_target PID 3068 wrote to memory of 2460 3068 Court Project.exe 28 PID 3068 wrote to memory of 2460 3068 Court Project.exe 28 PID 3068 wrote to memory of 2460 3068 Court Project.exe 28 PID 3068 wrote to memory of 2460 3068 Court Project.exe 28 PID 2460 wrote to memory of 2360 2460 cmd.exe 30 PID 2460 wrote to memory of 2360 2460 cmd.exe 30 PID 2460 wrote to memory of 2360 2460 cmd.exe 30 PID 2460 wrote to memory of 2360 2460 cmd.exe 30 PID 3068 wrote to memory of 2332 3068 Court Project.exe 31 PID 3068 wrote to memory of 2332 3068 Court Project.exe 31 PID 3068 wrote to memory of 2332 3068 Court Project.exe 31 PID 3068 wrote to memory of 2332 3068 Court Project.exe 31 PID 2332 wrote to memory of 2876 2332 PHONE LINK.EXE 32 PID 2332 wrote to memory of 2876 2332 PHONE LINK.EXE 32 PID 2332 wrote to memory of 2876 2332 PHONE LINK.EXE 32
Processes
-
C:\Users\Admin\AppData\Local\Temp\Court Project V1.1\Court Project.exe"C:\Users\Admin\AppData\Local\Temp\Court Project V1.1\Court Project.exe"1⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:3068 -
C:\Windows\SysWOW64\cmd.execmd /c ""C:\Users\Admin\AppData\Local\Temp\COURT PROJECT.BAT" "2⤵
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Windows\SysWOW64\chcp.comchcp 650013⤵PID:2360
-
-
-
C:\Users\Admin\AppData\Local\Temp\PHONE LINK.EXE"C:\Users\Admin\AppData\Local\Temp\PHONE LINK.EXE"2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\PHONE LINK.EXE"C:\Users\Admin\AppData\Local\Temp\PHONE LINK.EXE"3⤵
- Executes dropped EXE
- Loads dropped DLL
PID:2876
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
2KB
MD54b79c671ac1da07985c8d8b4f18005f7
SHA1ef81a3c16e46c18eecab45fa57a0dc3f42370bcc
SHA256203a80db0214a96de01c1bed84170b507565397ecc5fae047b7d2a005a7e9511
SHA512681238af8f8bf83ec8ad0a57f50af08f93bca7b01d0a3b7c7d4592375ff8bbae3ac1b617eb7ab2f4b7ae4fb3470ab0c3dee6840275747a1f1c42907e49f30710
-
Filesize
1.4MB
MD5178a0f45fde7db40c238f1340a0c0ec0
SHA1dcd2d3d14e06da3e8d7dc91a69b5fd785768b5fe
SHA2569fcb5ad15bd33dd72122a171a5d950e8e47ceda09372f25df828010cde24b8ed
SHA5124b790046787e57b9414a796838a026b1530f497a75c8e62d62b56f8c16a0cbedbefad3d4be957bc18379f64374d8d3bf62d3c64b53476c7c5005a7355acd2cee