Analysis
-
max time kernel
148s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20240802-en -
resource tags
arch:x64arch:x86image:win10v2004-20240802-enlocale:en-usos:windows10-2004-x64system -
submitted
27-08-2024 18:24
Static task
static1
Behavioral task
behavioral1
Sample
asdf.exe
Resource
win7-20240704-en
Behavioral task
behavioral2
Sample
asdf.exe
Resource
win10v2004-20240802-en
General
-
Target
asdf.exe
-
Size
161KB
-
MD5
d1df32e403d1424daa322e21dd1e4d19
-
SHA1
6d3db4569fde0a3ee6e65828ebc7a638b22dc001
-
SHA256
5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486
-
SHA512
b758651295081b33299691bf337af4b57f6feb86796a628ac154c0ddbb9d1172c0eb4ce398618060a340e06079e28b3924c5f737be42016a82b0f6f8d4efa9cc
-
SSDEEP
3072:YduKWsRRjHRvsfdO3Q+rSBPJasYIeuvUaEkZSc5:bYjHiqrrTzWUc5
Malware Config
Extracted
C:\ProgramData\Adobe\Setup\INC-README.txt
inc_ransom
http://incblog6qu4y4mm4zvw5nrmue6qbwtgjsxpw6b7ixzssu36tsajldoad.onion/
http://incblog7vmuq7rktic73r4ha4j757m3ptym37tyvifzp2roedyyzzxid.onion/
http://incapt.su/
https://twitter.com/hashtag/incransom?f=live
http://incpaykabjqc2mtdxq6c23nqh4x6m5dkps5fr6vgdkgzp5njssx6qkid.onion/
Extracted
C:\ProgramData\Adobe\Setup\{AC76BA86-7AD7-1033-7B44-AC0F074E4100}\INC-README.html
https://twitter.com/hashtag/incransom?f=live</span>
Signatures
-
INC Ransomware
INC Ransom is a ransomware that emerged in July 2023.
-
Renames multiple (306) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: asdf.exe File opened (read-only) \??\Z: asdf.exe File opened (read-only) \??\G: asdf.exe File opened (read-only) \??\L: asdf.exe File opened (read-only) \??\P: asdf.exe File opened (read-only) \??\S: asdf.exe File opened (read-only) \??\N: asdf.exe File opened (read-only) \??\R: asdf.exe File opened (read-only) \??\U: asdf.exe File opened (read-only) \??\V: asdf.exe File opened (read-only) \??\F: asdf.exe File opened (read-only) \??\H: asdf.exe File opened (read-only) \??\J: asdf.exe File opened (read-only) \??\K: asdf.exe File opened (read-only) \??\Y: asdf.exe File opened (read-only) \??\B: asdf.exe File opened (read-only) \??\E: asdf.exe File opened (read-only) \??\M: asdf.exe File opened (read-only) \??\T: asdf.exe File opened (read-only) \??\X: asdf.exe File opened (read-only) \??\A: asdf.exe File opened (read-only) \??\I: asdf.exe File opened (read-only) \??\O: asdf.exe File opened (read-only) \??\Q: asdf.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\system32\spool\PRINTERS\00002.SPL asdf.exe File created C:\Windows\system32\spool\PRINTERS\00003.SPL asdf.exe File created C:\Windows\system32\spool\PRINTERS\PPwtqio4fpi7m3mpqob88tasdi.TMP printfilterpipelinesvc.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4182098368-2521458979-3782681353-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\background-image.jpg" asdf.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language asdf.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ONENOTE.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU ONENOTE.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS ONENOTE.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 6092 ONENOTE.EXE 6092 ONENOTE.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 4456 asdf.exe Token: SeTakeOwnershipPrivilege 4456 asdf.exe Token: SeTakeOwnershipPrivilege 4456 asdf.exe Token: SeTakeOwnershipPrivilege 4456 asdf.exe Token: SeTakeOwnershipPrivilege 4456 asdf.exe Token: SeTakeOwnershipPrivilege 4456 asdf.exe Token: SeTakeOwnershipPrivilege 4456 asdf.exe Token: SeTakeOwnershipPrivilege 4456 asdf.exe Token: SeTakeOwnershipPrivilege 4456 asdf.exe Token: SeTakeOwnershipPrivilege 4456 asdf.exe Token: SeTakeOwnershipPrivilege 4456 asdf.exe Token: SeTakeOwnershipPrivilege 4456 asdf.exe Token: SeTakeOwnershipPrivilege 4456 asdf.exe Token: SeTakeOwnershipPrivilege 4456 asdf.exe Token: SeTakeOwnershipPrivilege 4456 asdf.exe Token: SeTakeOwnershipPrivilege 4456 asdf.exe Token: SeTakeOwnershipPrivilege 4456 asdf.exe Token: SeTakeOwnershipPrivilege 4456 asdf.exe Token: SeTakeOwnershipPrivilege 4456 asdf.exe Token: SeTakeOwnershipPrivilege 4456 asdf.exe Token: SeTakeOwnershipPrivilege 4456 asdf.exe Token: SeTakeOwnershipPrivilege 4456 asdf.exe Token: SeTakeOwnershipPrivilege 4456 asdf.exe Token: SeTakeOwnershipPrivilege 4456 asdf.exe Token: SeTakeOwnershipPrivilege 4456 asdf.exe Token: SeTakeOwnershipPrivilege 4456 asdf.exe Token: SeTakeOwnershipPrivilege 4456 asdf.exe Token: SeTakeOwnershipPrivilege 4456 asdf.exe Token: SeTakeOwnershipPrivilege 4456 asdf.exe Token: SeTakeOwnershipPrivilege 4456 asdf.exe Token: SeTakeOwnershipPrivilege 4456 asdf.exe Token: SeTakeOwnershipPrivilege 4456 asdf.exe Token: SeTakeOwnershipPrivilege 4456 asdf.exe Token: SeTakeOwnershipPrivilege 4456 asdf.exe Token: SeTakeOwnershipPrivilege 4456 asdf.exe Token: SeTakeOwnershipPrivilege 4456 asdf.exe Token: SeTakeOwnershipPrivilege 4456 asdf.exe Token: SeTakeOwnershipPrivilege 4456 asdf.exe Token: SeTakeOwnershipPrivilege 4456 asdf.exe Token: SeTakeOwnershipPrivilege 4456 asdf.exe Token: SeTakeOwnershipPrivilege 4456 asdf.exe Token: SeTakeOwnershipPrivilege 4456 asdf.exe Token: SeTakeOwnershipPrivilege 4456 asdf.exe Token: SeTakeOwnershipPrivilege 4456 asdf.exe Token: SeTakeOwnershipPrivilege 4456 asdf.exe Token: SeTakeOwnershipPrivilege 4456 asdf.exe Token: SeTakeOwnershipPrivilege 4456 asdf.exe Token: SeTakeOwnershipPrivilege 4456 asdf.exe Token: SeTakeOwnershipPrivilege 4456 asdf.exe Token: SeTakeOwnershipPrivilege 4456 asdf.exe Token: SeTakeOwnershipPrivilege 4456 asdf.exe Token: SeTakeOwnershipPrivilege 4456 asdf.exe Token: SeTakeOwnershipPrivilege 4456 asdf.exe Token: SeTakeOwnershipPrivilege 4456 asdf.exe Token: SeTakeOwnershipPrivilege 4456 asdf.exe Token: SeTakeOwnershipPrivilege 4456 asdf.exe Token: SeTakeOwnershipPrivilege 4456 asdf.exe Token: SeTakeOwnershipPrivilege 4456 asdf.exe Token: SeTakeOwnershipPrivilege 4456 asdf.exe Token: SeTakeOwnershipPrivilege 4456 asdf.exe Token: SeTakeOwnershipPrivilege 4456 asdf.exe Token: SeTakeOwnershipPrivilege 4456 asdf.exe Token: SeTakeOwnershipPrivilege 4456 asdf.exe Token: SeTakeOwnershipPrivilege 4456 asdf.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 6092 ONENOTE.EXE 6092 ONENOTE.EXE 6092 ONENOTE.EXE 6092 ONENOTE.EXE 6092 ONENOTE.EXE 6092 ONENOTE.EXE 6092 ONENOTE.EXE 6092 ONENOTE.EXE 6092 ONENOTE.EXE 6092 ONENOTE.EXE 6092 ONENOTE.EXE 6092 ONENOTE.EXE 6092 ONENOTE.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 5852 wrote to memory of 6092 5852 printfilterpipelinesvc.exe 98 PID 5852 wrote to memory of 6092 5852 printfilterpipelinesvc.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\asdf.exe"C:\Users\Admin\AppData\Local\Temp\asdf.exe"1⤵
- Enumerates connected drives
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4456
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:5656
-
C:\Windows\system32\printfilterpipelinesvc.exeC:\Windows\system32\printfilterpipelinesvc.exe -Embedding1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5852 -
C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE/insertdoc "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\{3560C883-52AD-493F-8AB3-D73EB010A20E}.xps" 1336925670001500002⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:6092
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD55a6172f2b871ef4696625d381732302e
SHA1dffc38dbd49a451f7f064d1836458280e5d5cc00
SHA256616e24f1fc0ff31ddbe26321f6dba1b665652f017a966afa3dd16d630ce1d201
SHA512d4e9ab8322371a19577d845a6540a8875232282586dbd785cf06730d2d94f57dc18cfe821e5e91fd6f86ab8d1da3f5b4ff763ce22d700de2215e9041b5a39ab4
-
Filesize
8KB
MD5bc7b54e804ba2d052146e9f5b2999f90
SHA1720f020a595a1c238d813033241a4e2e06cb2390
SHA256bcad856842ff5fecf7e009cbab191f8b3dcedf14abf0dded801fe33160c4e31e
SHA5126b4947fec5548e31b4ebde18bacf04c085745ad80d505c4263f21b18274ddc86fcb691f2f26189dbd41202ef51a536fdde006230cc48f15e2905827600cf3e99
-
Filesize
64KB
MD5fcd6bcb56c1689fcef28b57c22475bad
SHA11adc95bebe9eea8c112d40cd04ab7a8d75c4f961
SHA256de2f256064a0af797747c2b97505dc0b9f3df0de4f489eac731c23ae9ca9cc31
SHA51273e4153936dab198397b74ee9efc26093dda721eaab2f8d92786891153b45b04265a161b169c988edb0db2c53124607b6eaaa816559c5ce54f3dbc9fa6a7a4b2
-
Filesize
4KB
MD59b1e17ce38221dd5c9e1db3e542d2378
SHA113904b4d7813e5646314bed6fa5850ac5b68ff1f
SHA256f784209bbecda1c9dfed0db2cc10a45356267b4c2ce41cf48c83743d8f6edb3a
SHA512a39f8d20fea88ecee04a552bdc273d6098f245e83cdb2cd2578faf541dff4fceb3da7b3dd26b9a173ca5d4d661b40eaab9035f3d5aad2bef2eff4c71834c26de
-
Filesize
4KB
MD5b1687764903aa1085d358487eb4de6cd
SHA181cda797cc71817d40d1a4343749bf51933e3a27
SHA2563b5e2b3b2fbf7f634c8e1bee109a3cf06b7fcf2eca38cee5e4179ff1ac452e58
SHA51284577129dc0a44b7c10dfe22dbfc41f15ea08428f78880a805480c457032fe6aaa8347afc9614f003cb6b6bbccc3c06fbec45f06f2789862b2a95b75b5783fb6