Analysis
-
max time kernel
150s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
19-11-2024 11:21
Static task
static1
Behavioral task
behavioral1
Sample
windows.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
windows.exe
Resource
win10v2004-20241007-en
General
-
Target
windows.exe
-
Size
161KB
-
MD5
80a8727d4f1d05e17521b11b24de326f
-
SHA1
4e565920019cf04347c98a9098c6a28161c4c3f9
-
SHA256
81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8
-
SHA512
588783ff781de133fba94a64865899a9cc91b79211f0bb33baa830cb490e53febfafd28a3436af19b771fe01d3916a9bfa26b9f80a5b66abb1dade523e88a5f4
-
SSDEEP
3072:YduKWsRRjHRvsfdO3Q+rSBPJasYIeuvsaEkZSc5:bYjHiqrrT3WUc5
Malware Config
Extracted
C:\ProgramData\Adobe\INC-README.txt
inc_ransom
http://incblog6qu4y4mm4zvw5nrmue6qbwtgjsxpw6b7ixzssu36tsajldoad.onion/
http://incblog7vmuq7rktic73r4ha4j757m3ptym37tyvifzp2roedyyzzxid.onion/
http://incapt.su/
https://twitter.com/hashtag/incransom?f=live
http://incpaykabjqc2mtdxq6c23nqh4x6m5dkps5fr6vgdkgzp5njssx6qkid.onion/
Extracted
C:\ProgramData\Adobe\INC-README.html
https://twitter.com/hashtag/incransom?f=live</span>
Signatures
-
INC Ransomware
INC Ransom is a ransomware that emerged in July 2023.
-
Inc_ransom family
-
Renames multiple (315) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: windows.exe File opened (read-only) \??\J: windows.exe File opened (read-only) \??\P: windows.exe File opened (read-only) \??\T: windows.exe File opened (read-only) \??\X: windows.exe File opened (read-only) \??\A: windows.exe File opened (read-only) \??\O: windows.exe File opened (read-only) \??\S: windows.exe File opened (read-only) \??\U: windows.exe File opened (read-only) \??\W: windows.exe File opened (read-only) \??\E: windows.exe File opened (read-only) \??\K: windows.exe File opened (read-only) \??\L: windows.exe File opened (read-only) \??\N: windows.exe File opened (read-only) \??\Q: windows.exe File opened (read-only) \??\R: windows.exe File opened (read-only) \??\V: windows.exe File opened (read-only) \??\F: windows.exe File opened (read-only) \??\G: windows.exe File opened (read-only) \??\H: windows.exe File opened (read-only) \??\I: windows.exe File opened (read-only) \??\M: windows.exe File opened (read-only) \??\Y: windows.exe File opened (read-only) \??\Z: windows.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\system32\spool\PRINTERS\00002.SPL windows.exe File created C:\Windows\system32\spool\PRINTERS\00003.SPL windows.exe File created C:\Windows\system32\spool\PRINTERS\PP1gwcnbkgdgoe0esu2i435jaw.TMP printfilterpipelinesvc.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\background-image.jpg" windows.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ONENOTE.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 ONENOTE.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU ONENOTE.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS ONENOTE.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 4204 ONENOTE.EXE 4204 ONENOTE.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 3624 windows.exe Token: SeTakeOwnershipPrivilege 3624 windows.exe Token: SeTakeOwnershipPrivilege 3624 windows.exe Token: SeTakeOwnershipPrivilege 3624 windows.exe Token: SeTakeOwnershipPrivilege 3624 windows.exe Token: SeTakeOwnershipPrivilege 3624 windows.exe Token: SeTakeOwnershipPrivilege 3624 windows.exe Token: SeTakeOwnershipPrivilege 3624 windows.exe Token: SeTakeOwnershipPrivilege 3624 windows.exe Token: SeTakeOwnershipPrivilege 3624 windows.exe Token: SeTakeOwnershipPrivilege 3624 windows.exe Token: SeTakeOwnershipPrivilege 3624 windows.exe Token: SeTakeOwnershipPrivilege 3624 windows.exe Token: SeTakeOwnershipPrivilege 3624 windows.exe Token: SeTakeOwnershipPrivilege 3624 windows.exe Token: SeTakeOwnershipPrivilege 3624 windows.exe Token: SeTakeOwnershipPrivilege 3624 windows.exe Token: SeTakeOwnershipPrivilege 3624 windows.exe Token: SeTakeOwnershipPrivilege 3624 windows.exe Token: SeTakeOwnershipPrivilege 3624 windows.exe Token: SeTakeOwnershipPrivilege 3624 windows.exe Token: SeTakeOwnershipPrivilege 3624 windows.exe Token: SeTakeOwnershipPrivilege 3624 windows.exe Token: SeTakeOwnershipPrivilege 3624 windows.exe Token: SeTakeOwnershipPrivilege 3624 windows.exe Token: SeTakeOwnershipPrivilege 3624 windows.exe Token: SeTakeOwnershipPrivilege 3624 windows.exe Token: SeTakeOwnershipPrivilege 3624 windows.exe Token: SeTakeOwnershipPrivilege 3624 windows.exe Token: SeTakeOwnershipPrivilege 3624 windows.exe Token: SeTakeOwnershipPrivilege 3624 windows.exe Token: SeTakeOwnershipPrivilege 3624 windows.exe Token: SeTakeOwnershipPrivilege 3624 windows.exe Token: SeTakeOwnershipPrivilege 3624 windows.exe Token: SeTakeOwnershipPrivilege 3624 windows.exe Token: SeTakeOwnershipPrivilege 3624 windows.exe Token: SeTakeOwnershipPrivilege 3624 windows.exe Token: SeTakeOwnershipPrivilege 3624 windows.exe Token: SeTakeOwnershipPrivilege 3624 windows.exe Token: SeTakeOwnershipPrivilege 3624 windows.exe Token: SeTakeOwnershipPrivilege 3624 windows.exe Token: SeTakeOwnershipPrivilege 3624 windows.exe Token: SeTakeOwnershipPrivilege 3624 windows.exe Token: SeTakeOwnershipPrivilege 3624 windows.exe Token: SeTakeOwnershipPrivilege 3624 windows.exe Token: SeTakeOwnershipPrivilege 3624 windows.exe Token: SeTakeOwnershipPrivilege 3624 windows.exe Token: SeTakeOwnershipPrivilege 3624 windows.exe Token: SeTakeOwnershipPrivilege 3624 windows.exe Token: SeTakeOwnershipPrivilege 3624 windows.exe Token: SeTakeOwnershipPrivilege 3624 windows.exe Token: SeTakeOwnershipPrivilege 3624 windows.exe Token: SeTakeOwnershipPrivilege 3624 windows.exe Token: SeTakeOwnershipPrivilege 3624 windows.exe Token: SeTakeOwnershipPrivilege 3624 windows.exe Token: SeTakeOwnershipPrivilege 3624 windows.exe Token: SeTakeOwnershipPrivilege 3624 windows.exe Token: SeTakeOwnershipPrivilege 3624 windows.exe Token: SeTakeOwnershipPrivilege 3624 windows.exe Token: SeTakeOwnershipPrivilege 3624 windows.exe Token: SeTakeOwnershipPrivilege 3624 windows.exe Token: SeTakeOwnershipPrivilege 3624 windows.exe Token: SeTakeOwnershipPrivilege 3624 windows.exe Token: SeTakeOwnershipPrivilege 3624 windows.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 4204 ONENOTE.EXE 4204 ONENOTE.EXE 4204 ONENOTE.EXE 4204 ONENOTE.EXE 4204 ONENOTE.EXE 4204 ONENOTE.EXE 4204 ONENOTE.EXE 4204 ONENOTE.EXE 4204 ONENOTE.EXE 4204 ONENOTE.EXE 4204 ONENOTE.EXE 4204 ONENOTE.EXE 4204 ONENOTE.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 5816 wrote to memory of 4204 5816 printfilterpipelinesvc.exe 105 PID 5816 wrote to memory of 4204 5816 printfilterpipelinesvc.exe 105
Processes
-
C:\Users\Admin\AppData\Local\Temp\windows.exe"C:\Users\Admin\AppData\Local\Temp\windows.exe"1⤵
- Enumerates connected drives
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3624
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:5416
-
C:\Windows\system32\printfilterpipelinesvc.exeC:\Windows\system32\printfilterpipelinesvc.exe -Embedding1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5816 -
C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE/insertdoc "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\{C1E1CC7C-0904-45E6-AE7F-239FA8D932DE}.xps" 1337648888086100002⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:4204
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5b523a27aebe05a1c4baff90c0708e0ae
SHA1a061a83537253a369aa276e568d3e45abfc5be4c
SHA256c538f49fdf681d08324a08f6df442b6d6b4de240f893f0d89dc0850273c279c1
SHA5123ee9a390d1a9e704b38caf7ef06c3f5ec4826d22c56afddc37ee682f5892326cfec6737d71d066f1f63fa77e0a98f16f42a28214e997aa7cbebaed67fefad512
-
Filesize
3KB
MD527bb03c0c73a0c3ea599cb6d0849f5e9
SHA1306a8c78812f661a64903875e4803bb3c7f5a3ee
SHA256e718dade64ebb3156b641342e4f6680369c1b306abee38c1bd560feb062e02c8
SHA51287759ec3b391c7f66895bffc02a0b529255feab1c6388a674389c8aa71701b937b38d5bb228677e83632020d2964ddb44f66e6a89b6a3474279e87ce4fc50552
-
Filesize
64KB
MD5fcd6bcb56c1689fcef28b57c22475bad
SHA11adc95bebe9eea8c112d40cd04ab7a8d75c4f961
SHA256de2f256064a0af797747c2b97505dc0b9f3df0de4f489eac731c23ae9ca9cc31
SHA51273e4153936dab198397b74ee9efc26093dda721eaab2f8d92786891153b45b04265a161b169c988edb0db2c53124607b6eaaa816559c5ce54f3dbc9fa6a7a4b2
-
Filesize
4KB
MD527bd35bbf10638838901aadce12e6037
SHA1c47344f5332fc6f4103d86c38dcf37f2ca905fbc
SHA256b82e4a3da9bdb5ca7bbb252e905a87505842ecda34f8b2d4ee48054cf9089519
SHA5123cdc4fcec7273fcef0d4231b6baec050bfe7dcc6aa3038869d6ed7b68fb0378270c25504d8e59c3034f1c09a05c181971ef66e795ab8e5dcb7c493532a8446b0
-
Filesize
4KB
MD55b3fdb645bcfc4bf3556757bb4668c31
SHA1ab87e2e0a32e0f885b427ef82ab7be72a10eb8a7
SHA2565e593d440fb8946e649a2387f417a21e0b4e39a2ad7c0b765c00b25587e4d0a2
SHA512a7a3e395257e951d016c13bb76731f32be459be846c0cdafcaf0d9a523e220222491a861b18f6a7ac01afe318166955fa7375629bca7fb892b5c4b763174393b