Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 02:57
Static task
static1
Behavioral task
behavioral1
Sample
81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe
Resource
win10v2004-20241007-en
General
-
Target
81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe
-
Size
161KB
-
MD5
80a8727d4f1d05e17521b11b24de326f
-
SHA1
4e565920019cf04347c98a9098c6a28161c4c3f9
-
SHA256
81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8
-
SHA512
588783ff781de133fba94a64865899a9cc91b79211f0bb33baa830cb490e53febfafd28a3436af19b771fe01d3916a9bfa26b9f80a5b66abb1dade523e88a5f4
-
SSDEEP
3072:YduKWsRRjHRvsfdO3Q+rSBPJasYIeuvsaEkZSc5:bYjHiqrrT3WUc5
Malware Config
Extracted
C:\ProgramData\Adobe\Setup\INC-README.html
https://twitter.com/hashtag/incransom?f=live</span>
Extracted
F:\INC-README.txt
inc_ransom
http://incblog6qu4y4mm4zvw5nrmue6qbwtgjsxpw6b7ixzssu36tsajldoad.onion/
http://incblog7vmuq7rktic73r4ha4j757m3ptym37tyvifzp2roedyyzzxid.onion/
http://incapt.su/
https://twitter.com/hashtag/incransom?f=live
http://incpaykabjqc2mtdxq6c23nqh4x6m5dkps5fr6vgdkgzp5njssx6qkid.onion/
Signatures
-
INC Ransomware
INC Ransom is a ransomware that emerged in July 2023.
-
Inc_ransom family
-
Renames multiple (302) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Q: 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe File opened (read-only) \??\T: 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe File opened (read-only) \??\U: 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe File opened (read-only) \??\V: 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe File opened (read-only) \??\H: 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe File opened (read-only) \??\P: 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe File opened (read-only) \??\N: 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe File opened (read-only) \??\O: 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe File opened (read-only) \??\R: 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe File opened (read-only) \??\X: 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe File opened (read-only) \??\F: 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe File opened (read-only) \??\E: 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe File opened (read-only) \??\S: 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe File opened (read-only) \??\Z: 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe File opened (read-only) \??\J: 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe File opened (read-only) \??\L: 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe File opened (read-only) \??\G: 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe File opened (read-only) \??\I: 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe File opened (read-only) \??\K: 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe File opened (read-only) \??\M: 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe File opened (read-only) \??\W: 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe File opened (read-only) \??\Y: 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe File opened (read-only) \??\A: 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe File opened (read-only) \??\B: 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\system32\spool\PRINTERS\00002.SPL 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe File created C:\Windows\system32\spool\PRINTERS\00003.SPL 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe File created C:\Windows\system32\spool\PRINTERS\PPs31svharssqny620dcn0070k.TMP printfilterpipelinesvc.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\background-image.jpg" 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ONENOTE.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU ONENOTE.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5664 ONENOTE.EXE 5664 ONENOTE.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 4564 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe Token: SeTakeOwnershipPrivilege 4564 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe Token: SeTakeOwnershipPrivilege 4564 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe Token: SeTakeOwnershipPrivilege 4564 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe Token: SeTakeOwnershipPrivilege 4564 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe Token: SeTakeOwnershipPrivilege 4564 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe Token: SeTakeOwnershipPrivilege 4564 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe Token: SeTakeOwnershipPrivilege 4564 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe Token: SeTakeOwnershipPrivilege 4564 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe Token: SeTakeOwnershipPrivilege 4564 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe Token: SeTakeOwnershipPrivilege 4564 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe Token: SeTakeOwnershipPrivilege 4564 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe Token: SeTakeOwnershipPrivilege 4564 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe Token: SeTakeOwnershipPrivilege 4564 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe Token: SeTakeOwnershipPrivilege 4564 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe Token: SeTakeOwnershipPrivilege 4564 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe Token: SeTakeOwnershipPrivilege 4564 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe Token: SeTakeOwnershipPrivilege 4564 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe Token: SeTakeOwnershipPrivilege 4564 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe Token: SeTakeOwnershipPrivilege 4564 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe Token: SeTakeOwnershipPrivilege 4564 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe Token: SeTakeOwnershipPrivilege 4564 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe Token: SeTakeOwnershipPrivilege 4564 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe Token: SeTakeOwnershipPrivilege 4564 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe Token: SeTakeOwnershipPrivilege 4564 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe Token: SeTakeOwnershipPrivilege 4564 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe Token: SeTakeOwnershipPrivilege 4564 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe Token: SeTakeOwnershipPrivilege 4564 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe Token: SeTakeOwnershipPrivilege 4564 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe Token: SeTakeOwnershipPrivilege 4564 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe Token: SeTakeOwnershipPrivilege 4564 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe Token: SeTakeOwnershipPrivilege 4564 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe Token: SeTakeOwnershipPrivilege 4564 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe Token: SeTakeOwnershipPrivilege 4564 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe Token: SeTakeOwnershipPrivilege 4564 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe Token: SeTakeOwnershipPrivilege 4564 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe Token: SeTakeOwnershipPrivilege 4564 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe Token: SeTakeOwnershipPrivilege 4564 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe Token: SeTakeOwnershipPrivilege 4564 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe Token: SeTakeOwnershipPrivilege 4564 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe Token: SeTakeOwnershipPrivilege 4564 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe Token: SeTakeOwnershipPrivilege 4564 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe Token: SeTakeOwnershipPrivilege 4564 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe Token: SeTakeOwnershipPrivilege 4564 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe Token: SeTakeOwnershipPrivilege 4564 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe Token: SeTakeOwnershipPrivilege 4564 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe Token: SeTakeOwnershipPrivilege 4564 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe Token: SeTakeOwnershipPrivilege 4564 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe Token: SeTakeOwnershipPrivilege 4564 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe Token: SeTakeOwnershipPrivilege 4564 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe Token: SeTakeOwnershipPrivilege 4564 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe Token: SeTakeOwnershipPrivilege 4564 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe Token: SeTakeOwnershipPrivilege 4564 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe Token: SeTakeOwnershipPrivilege 4564 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe Token: SeTakeOwnershipPrivilege 4564 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe Token: SeTakeOwnershipPrivilege 4564 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe Token: SeTakeOwnershipPrivilege 4564 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe Token: SeTakeOwnershipPrivilege 4564 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe Token: SeTakeOwnershipPrivilege 4564 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe Token: SeTakeOwnershipPrivilege 4564 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe Token: SeTakeOwnershipPrivilege 4564 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe Token: SeTakeOwnershipPrivilege 4564 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe Token: SeTakeOwnershipPrivilege 4564 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe Token: SeTakeOwnershipPrivilege 4564 81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 5664 ONENOTE.EXE 5664 ONENOTE.EXE 5664 ONENOTE.EXE 5664 ONENOTE.EXE 5664 ONENOTE.EXE 5664 ONENOTE.EXE 5664 ONENOTE.EXE 5664 ONENOTE.EXE 5664 ONENOTE.EXE 5664 ONENOTE.EXE 5664 ONENOTE.EXE 5664 ONENOTE.EXE 5664 ONENOTE.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 6120 wrote to memory of 5664 6120 printfilterpipelinesvc.exe 103 PID 6120 wrote to memory of 5664 6120 printfilterpipelinesvc.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe"C:\Users\Admin\AppData\Local\Temp\81f0cbb2544e3e4ccbaf582c80297cbfafdf9e8e95b137dc810c535d2cd4b1f8.exe"1⤵
- Enumerates connected drives
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4564
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:5880
-
C:\Windows\system32\printfilterpipelinesvc.exeC:\Windows\system32\printfilterpipelinesvc.exe -Embedding1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:6120 -
C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE/insertdoc "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\{B6D8409F-BEF2-43CA-BBFF-8B45A4AADBCD}.xps" 1337654507763900002⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5664
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5b523a27aebe05a1c4baff90c0708e0ae
SHA1a061a83537253a369aa276e568d3e45abfc5be4c
SHA256c538f49fdf681d08324a08f6df442b6d6b4de240f893f0d89dc0850273c279c1
SHA5123ee9a390d1a9e704b38caf7ef06c3f5ec4826d22c56afddc37ee682f5892326cfec6737d71d066f1f63fa77e0a98f16f42a28214e997aa7cbebaed67fefad512
-
Filesize
4KB
MD5dd004d95e82da80390b11ac8b7622764
SHA15f33b857dcebdb90bc58924a6c1e023a17a53911
SHA25623076d2fd068da2d6c81712c55399ed787fc78404555f5ea51d21d1759c94e41
SHA512e6918d130337a436fd3ecc81d789bce747ab365cb2294e8046435275cba5ea8f0c02ca90d7fb89532db01fa5064cdffd1dd7c9782db48c039dca5c727a3b674f
-
Filesize
4KB
MD56040d0dad585677da4c3749440cc8f7d
SHA173399467553c53870ceb1c36c78433b5a8bd1b93
SHA256d6faea49f39076bb23bb9249b9cd5d9eac2e63dfac51c7c2270552ab088b0e78
SHA51273cfe13c34843cf43f570180a3b8451cd915f012c3fc6877a74eff92e914e2d037071c46f07dc505a6c0062825296417d840ab8d821c8b19153f04b3afcd4a66
-
Filesize
3KB
MD527bb03c0c73a0c3ea599cb6d0849f5e9
SHA1306a8c78812f661a64903875e4803bb3c7f5a3ee
SHA256e718dade64ebb3156b641342e4f6680369c1b306abee38c1bd560feb062e02c8
SHA51287759ec3b391c7f66895bffc02a0b529255feab1c6388a674389c8aa71701b937b38d5bb228677e83632020d2964ddb44f66e6a89b6a3474279e87ce4fc50552