Analysis

  • max time kernel
    117s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    07-02-2025 16:18

General

  • Target

    incore.exe

  • Size

    2.1MB

  • MD5

    03d4e131a10bf6c41d45c0918a9e3ea5

  • SHA1

    e067835a072ceb0d3cc3dd12e8a6d1a43f4d8bb7

  • SHA256

    5daab1d2ee0966832a50b6cc7635707a18d81105d51614c75d106c16ff8012c2

  • SHA512

    225ca4831acbe4a243e033dae107f92e1bbcad6430ae96f0ec8235fd4adf199b5f80f94457a036369816c6e92f5429e4bfb7cc9e5b644d5bf480816f643cefb0

  • SSDEEP

    24576:2TbBv5rUyXVxp8qWcx5AkyZrtziLafchZChMHTzC6SXYdzNyCzrgEctNjfRn5rEp:IBJXcJQLa0hs2HTbbtNhzrgZnp5rEp

Malware Config

Signatures

  • DcRat

    DarkCrystal(DC) is a new .NET RAT active since June 2019 capable of loading additional plugins.

  • Dcrat family
  • Modifies WinLogon for persistence 2 TTPs 6 IoCs
  • Process spawned unexpected child process 18 IoCs

    This typically indicates the parent process was compromised via an exploit or macro.

  • Command and Scripting Interpreter: PowerShell 1 TTPs 19 IoCs

    Run Powershell to modify Windows Defender settings to add exclusions for file extensions, paths, and processes.

  • Executes dropped EXE 2 IoCs
  • Loads dropped DLL 2 IoCs
  • Adds Run key to start application 2 TTPs 12 IoCs
  • Looks up external IP address via web service 2 IoCs

    Uses a legitimate IP lookup service to find the infected system's external IP.

  • Drops file in System32 directory 2 IoCs
  • Drops file in Windows directory 5 IoCs
  • Enumerates physical storage devices 1 TTPs

    Attempts to interact with connected storage/optical drive(s).

  • System Location Discovery: System Language Discovery 1 TTPs 3 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Modifies system certificate store 2 TTPs 2 IoCs
  • Scheduled Task/Job: Scheduled Task 1 TTPs 18 IoCs

    Schtasks is often used by malware for persistence or to perform post-infection execution.

  • Suspicious behavior: EnumeratesProcesses 64 IoCs
  • Suspicious use of AdjustPrivilegeToken 21 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs
  • Uses Task Scheduler COM API 1 TTPs

    The Task Scheduler COM API can be used to schedule applications to run on boot or at set times.

Processes

  • C:\Users\Admin\AppData\Local\Temp\incore.exe
    "C:\Users\Admin\AppData\Local\Temp\incore.exe"
    1⤵
    • System Location Discovery: System Language Discovery
    • Suspicious use of WriteProcessMemory
    PID:2252
    • C:\Windows\SysWOW64\WScript.exe
      "C:\Windows\System32\WScript.exe" "C:\fontCrtmonitor\3ZRHIxPIjsb.vbe"
      2⤵
      • System Location Discovery: System Language Discovery
      • Suspicious use of WriteProcessMemory
      PID:2332
      • C:\Windows\SysWOW64\cmd.exe
        cmd /c ""C:\fontCrtmonitor\ggooOvvNMLFpJUHeJA7JSZJLf.bat" "
        3⤵
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of WriteProcessMemory
        PID:2672
        • C:\fontCrtmonitor\hypercomCrtMonitor.exe
          "C:\fontCrtmonitor/hypercomCrtMonitor.exe"
          4⤵
          • Modifies WinLogon for persistence
          • Executes dropped EXE
          • Adds Run key to start application
          • Drops file in Windows directory
          • Suspicious behavior: EnumeratesProcesses
          • Suspicious use of AdjustPrivilegeToken
          • Suspicious use of WriteProcessMemory
          PID:2832
          • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe
            "C:\Windows\Microsoft.NET\Framework64\v4.0.30319\csc.exe" /noconfig /fullpaths @"C:\Users\Admin\AppData\Local\Temp\djugmfvh\djugmfvh.cmdline"
            5⤵
            • Drops file in System32 directory
            • Suspicious use of WriteProcessMemory
            PID:1204
            • C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe
              C:\Windows\Microsoft.NET\Framework64\v4.0.30319\cvtres.exe /NOLOGO /READONLY /MACHINE:IX86 "/OUT:C:\Users\Admin\AppData\Local\Temp\RES39E5.tmp" "c:\Windows\System32\CSC915FA7EC35E34D77968DBEE036E2D06F.TMP"
              6⤵
                PID:2888
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "powershell" -Command Add-MpPreference -ExclusionPath 'C:/'
              5⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious use of AdjustPrivilegeToken
              PID:1592
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "powershell" -Command Add-MpPreference -ExclusionPath 'C:/$Recycle.Bin/'
              5⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious use of AdjustPrivilegeToken
              PID:1932
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Documents and Settings/'
              5⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious use of AdjustPrivilegeToken
              PID:2524
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "powershell" -Command Add-MpPreference -ExclusionPath 'C:/fontCrtmonitor/'
              5⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious use of AdjustPrivilegeToken
              PID:1668
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "powershell" -Command Add-MpPreference -ExclusionPath 'C:/MSOCache/'
              5⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious use of AdjustPrivilegeToken
              PID:1824
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "powershell" -Command Add-MpPreference -ExclusionPath 'C:/PerfLogs/'
              5⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious use of AdjustPrivilegeToken
              PID:1952
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files/'
              5⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious use of AdjustPrivilegeToken
              PID:1684
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Program Files (x86)/'
              5⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious use of AdjustPrivilegeToken
              PID:1488
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "powershell" -Command Add-MpPreference -ExclusionPath 'C:/ProgramData/'
              5⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious use of AdjustPrivilegeToken
              PID:2180
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Recovery/'
              5⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious use of AdjustPrivilegeToken
              PID:680
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "powershell" -Command Add-MpPreference -ExclusionPath 'C:/System Volume Information/'
              5⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious use of AdjustPrivilegeToken
              PID:2444
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Users/'
              5⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious use of AdjustPrivilegeToken
              PID:944
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "powershell" -Command Add-MpPreference -ExclusionPath 'C:/Windows/'
              5⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious use of AdjustPrivilegeToken
              PID:2240
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\AppCompat\dllhost.exe'
              5⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious use of AdjustPrivilegeToken
              PID:1532
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Default\Links\hypercomCrtMonitor.exe'
              5⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious use of AdjustPrivilegeToken
              PID:1752
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Users\Public\Libraries\OSPPSVC.exe'
              5⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious use of AdjustPrivilegeToken
              PID:2084
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "powershell" -Command Add-MpPreference -ExclusionPath 'C:\fontCrtmonitor\lsm.exe'
              5⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious use of AdjustPrivilegeToken
              PID:1328
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "powershell" -Command Add-MpPreference -ExclusionPath 'C:\Windows\es-ES\lsm.exe'
              5⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious use of AdjustPrivilegeToken
              PID:1564
            • C:\Windows\System32\WindowsPowerShell\v1.0\powershell.exe
              "powershell" -Command Add-MpPreference -ExclusionPath 'C:\fontCrtmonitor\hypercomCrtMonitor.exe'
              5⤵
              • Command and Scripting Interpreter: PowerShell
              • Suspicious use of AdjustPrivilegeToken
              PID:1032
            • C:\Windows\System32\cmd.exe
              "C:\Windows\System32\cmd.exe" /C "C:\Users\Admin\AppData\Local\Temp\bxCB1k3pGG.bat"
              5⤵
                PID:2360
                • C:\Windows\system32\chcp.com
                  chcp 65001
                  6⤵
                    PID:2780
                  • C:\Windows\system32\w32tm.exe
                    w32tm /stripchart /computer:localhost /period:5 /dataonly /samples:2
                    6⤵
                      PID:2380
                    • C:\Users\Public\Libraries\OSPPSVC.exe
                      "C:\Users\Public\Libraries\OSPPSVC.exe"
                      6⤵
                      • Executes dropped EXE
                      • Modifies system certificate store
                      • Suspicious use of AdjustPrivilegeToken
                      PID:948
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 5 /tr "'C:\Windows\AppCompat\dllhost.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:624
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "dllhost" /sc ONLOGON /tr "'C:\Windows\AppCompat\dllhost.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2612
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "dllhostd" /sc MINUTE /mo 9 /tr "'C:\Windows\AppCompat\dllhost.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2892
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "hypercomCrtMonitorh" /sc MINUTE /mo 12 /tr "'C:\Users\Default\Links\hypercomCrtMonitor.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2096
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "hypercomCrtMonitor" /sc ONLOGON /tr "'C:\Users\Default\Links\hypercomCrtMonitor.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1256
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "hypercomCrtMonitorh" /sc MINUTE /mo 7 /tr "'C:\Users\Default\Links\hypercomCrtMonitor.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2120
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 9 /tr "'C:\Users\Public\Libraries\OSPPSVC.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1148
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "OSPPSVC" /sc ONLOGON /tr "'C:\Users\Public\Libraries\OSPPSVC.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:1420
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "OSPPSVCO" /sc MINUTE /mo 11 /tr "'C:\Users\Public\Libraries\OSPPSVC.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2116
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "lsml" /sc MINUTE /mo 9 /tr "'C:\fontCrtmonitor\lsm.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2956
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\fontCrtmonitor\lsm.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2608
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "lsml" /sc MINUTE /mo 6 /tr "'C:\fontCrtmonitor\lsm.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:268
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "lsml" /sc MINUTE /mo 8 /tr "'C:\Windows\es-ES\lsm.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2664
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "lsm" /sc ONLOGON /tr "'C:\Windows\es-ES\lsm.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2148
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "lsml" /sc MINUTE /mo 11 /tr "'C:\Windows\es-ES\lsm.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:740
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "hypercomCrtMonitorh" /sc MINUTE /mo 12 /tr "'C:\fontCrtmonitor\hypercomCrtMonitor.exe'" /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:2468
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "hypercomCrtMonitor" /sc ONLOGON /tr "'C:\fontCrtmonitor\hypercomCrtMonitor.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:836
          • C:\Windows\system32\schtasks.exe
            schtasks.exe /create /tn "hypercomCrtMonitorh" /sc MINUTE /mo 13 /tr "'C:\fontCrtmonitor\hypercomCrtMonitor.exe'" /rl HIGHEST /f
            1⤵
            • Process spawned unexpected child process
            • Scheduled Task/Job: Scheduled Task
            PID:948

          Network

          MITRE ATT&CK Enterprise v15

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\RES39E5.tmp

            Filesize

            1KB

            MD5

            f1b78ec4980b7854ab8f19f0418d4a7e

            SHA1

            02e49bf825f8ed56641c0b45aaf4e74b20a1653b

            SHA256

            a1f4898d5ad5352059cb06ae80182d88927056a3faacc9276e01dac41db56be1

            SHA512

            a462a47ebb625b10e871aaa20cd0de00ecdfd039da788ea4d4a0a66fcbffab99799eaf6cc74a4488838dbb0e7de629c63cee9718d8caf0e4e13f47b448f4dc01

          • C:\Users\Admin\AppData\Local\Temp\bxCB1k3pGG.bat

            Filesize

            213B

            MD5

            20570127e4e9b0dbe07087a1379cc947

            SHA1

            e45e8b8a2444dc8e145dc00f7ec1ed35513a092b

            SHA256

            6e7438676673a0cd1742eb680933568d98e17190c6bacffebeb195fd15866f02

            SHA512

            0d7807b493ad957fdefcafc6bb7cc5eb52b52cc89ef2b8ce1e1512769e5fd37dfd15160052cde110ddbda5c54e62725b4b9809dfbaf26aa956e286c78086c6ef

          • C:\Users\Admin\AppData\Roaming\Microsoft\Windows\Recent\CustomDestinations\2DPLM9V67WFDFUFBKV2D.temp

            Filesize

            7KB

            MD5

            41fee9101d607a805159df815e29cf85

            SHA1

            3f4c1edb3d80e7edf7bd357e6cc79932c438ed3e

            SHA256

            47fc379ac97b1248d3c2182489e6e296554ce44e01493acb74ad789d2409a5c4

            SHA512

            7c71b8534d8da77af0e6655630f430f0df65aaa4d7379833816e399f5c2750200c4fac65b983aea57a3cb6b2d60866f014b3dff5723926e9a5696fa1d25129ae

          • C:\fontCrtmonitor\3ZRHIxPIjsb.vbe

            Filesize

            218B

            MD5

            623fc76c6ffa7386cf3ba5bd07316cd0

            SHA1

            f35d0b54e393e8f9a0662d175e0e1895e47c6e05

            SHA256

            2e5e3b082cf3350781210ee9c1d404fc3b530c182b22a3a4a05c7cd6b04f5b18

            SHA512

            d44af88f6e249fb4cdc78c61db0f7020e1c9f98b0e5bb0c4ec2261ece646ef464c3a5b30df9e042da3112b8b3c8dc7f1f55ae54f3948dcd3f192cdd317f57125

          • C:\fontCrtmonitor\ggooOvvNMLFpJUHeJA7JSZJLf.bat

            Filesize

            92B

            MD5

            3b890edc86e87609973d9d0dacbb0b0a

            SHA1

            94b43c89db0ed52658e8a76dc075c40d959d1e51

            SHA256

            33c65a531e04e663ba8a9590080c1786330f6f98c32a7da57694f4df6f48aeac

            SHA512

            5d3bf328910e66aa498b7c2b49e86a2e6eb71c7710c8aa4561dc121070c44bf62b40bd65227113decaa71080ee9b2a7f978f0648401580ce02d9e869619d889d

          • \??\c:\Users\Admin\AppData\Local\Temp\djugmfvh\djugmfvh.0.cs

            Filesize

            364B

            MD5

            f7fae0cd0268134c62b007fa05c8a4a6

            SHA1

            64d68c91ae535cf59dfa58ede87222ced95a7069

            SHA256

            95b695d4801582dd12d7f221e083f2f652ebaf904dfb98a1d7b6be38ab285ee3

            SHA512

            4b457e9ccb21bf91687dc0d2eb132ec2378aebcba5c6a527357061d0c327aa26a73d43898f450fe8061c8c7fbc5ae98bd3609db04a9a4cebeb3197ed609e4c60

          • \??\c:\Users\Admin\AppData\Local\Temp\djugmfvh\djugmfvh.cmdline

            Filesize

            235B

            MD5

            7b2e751c6697bd62030a6d9fb9307d19

            SHA1

            2fe998ad9b56997c9b79795f4865ceb187c28d04

            SHA256

            5b70d2088b308b5a6a32dcc488b95c175887c98f3ebefc6462c0a52428383d18

            SHA512

            7e72596e247c62bc8f6fee50c01d0d280912edb5bce118e93e4921057e710ec17458f7561c1510da77cf7e44cbe2c18def3d5361a64bc6d367a9e906af393265

          • \??\c:\Windows\System32\CSC915FA7EC35E34D77968DBEE036E2D06F.TMP

            Filesize

            1KB

            MD5

            8c85ef91c6071d33745325a8fa351c3e

            SHA1

            e3311ceef28823eec99699cc35be27c94eca52d2

            SHA256

            8db3e3a5515da1933036688a9b1918cfc3339fc687008c5325461271904b2d41

            SHA512

            2bb89b07fe46b1c406ed6a560e88cb2b8402b1d61bb71e10887bad661751f64f1e5317fd6c1b301ea4766785b915da31b64e0475cfe36c1f950b32915b5dab7d

          • \fontCrtmonitor\hypercomCrtMonitor.exe

            Filesize

            1.8MB

            MD5

            2a6e3f3275d854bf07aba2427baa6610

            SHA1

            37d6411844b5d8a9d997f38f7718168b33cbc564

            SHA256

            4aa398eb330d666b85164e1fdc28802c585071870e09576109523cdafc10ee7b

            SHA512

            a6054ab62fc7415dafaca1dc273b42edd9680541e964b7b20d6b7ed07d65fb2ee01ea833bfedec9abc3687814449bb65f7c041ba462aed5cc44397e0ae2d4ef0

          • memory/948-147-0x00000000000B0000-0x0000000000278000-memory.dmp

            Filesize

            1.8MB

          • memory/1684-74-0x000000001B6B0000-0x000000001B992000-memory.dmp

            Filesize

            2.9MB

          • memory/2084-97-0x0000000001E20000-0x0000000001E28000-memory.dmp

            Filesize

            32KB

          • memory/2832-21-0x0000000000430000-0x000000000043C000-memory.dmp

            Filesize

            48KB

          • memory/2832-19-0x0000000000420000-0x0000000000428000-memory.dmp

            Filesize

            32KB

          • memory/2832-17-0x0000000000440000-0x000000000045C000-memory.dmp

            Filesize

            112KB

          • memory/2832-15-0x0000000000410000-0x000000000041E000-memory.dmp

            Filesize

            56KB

          • memory/2832-13-0x0000000001320000-0x00000000014E8000-memory.dmp

            Filesize

            1.8MB