Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 11:21
Static task
static1
Behavioral task
behavioral1
Sample
508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe
Resource
win10v2004-20241007-en
General
-
Target
508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe
-
Size
161KB
-
MD5
c6b6543ef258058049b0322ca8b59fd5
-
SHA1
1410c2f60840066d34f48a4be5e7e0a8126117ab
-
SHA256
508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef
-
SHA512
ff48724190a84dc39392dd69c2ead7f2180b95d9a85df22fa9967d228f1c0913de3a5fd592624a224e562d6794188183c9a23eed40b28c8afa397a1b7a480eb2
-
SSDEEP
3072:+dBK6dRsjHRvsGWO3G+gSB9ssYIeuV0lCGkZSQ5:2ajHOuVg9w0U5UQ5
Malware Config
Extracted
C:\ProgramData\Adobe\Setup\INC-README.html
https://twitter.com/hashtag/incransom?f=live</span>
Extracted
F:\INC-README.txt
inc_ransom
http://incblog7vmuq7rktic73r4ha4j757m3ptym37tyvifzp2roedyyzzxid.onion/
http://incapt.su/
https://twitter.com/hashtag/incransom?f=live
http://incpaysp74dphcbjyvg2eepxnl3tkgt5mq5vd4tnjusoissz342bdnad.onion/
Signatures
-
INC Ransomware
INC Ransom is a ransomware that emerged in July 2023.
-
Inc_ransom family
-
Renames multiple (306) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe File opened (read-only) \??\E: 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe File opened (read-only) \??\S: 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe File opened (read-only) \??\U: 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe File opened (read-only) \??\G: 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe File opened (read-only) \??\M: 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe File opened (read-only) \??\N: 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe File opened (read-only) \??\L: 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe File opened (read-only) \??\O: 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe File opened (read-only) \??\Q: 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe File opened (read-only) \??\V: 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe File opened (read-only) \??\F: 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe File opened (read-only) \??\H: 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe File opened (read-only) \??\J: 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe File opened (read-only) \??\K: 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe File opened (read-only) \??\T: 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe File opened (read-only) \??\W: 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe File opened (read-only) \??\X: 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe File opened (read-only) \??\Y: 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe File opened (read-only) \??\B: 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe File opened (read-only) \??\I: 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe File opened (read-only) \??\P: 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe File opened (read-only) \??\R: 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe File opened (read-only) \??\Z: 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\system32\spool\PRINTERS\PPj3s3482shtk5p1pkr2ne8p6_d.TMP printfilterpipelinesvc.exe File created C:\Windows\system32\spool\PRINTERS\00002.SPL 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe File created C:\Windows\system32\spool\PRINTERS\00003.SPL 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\background-image.jpg" 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ONENOTE.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ONENOTE.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU ONENOTE.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5436 ONENOTE.EXE 5436 ONENOTE.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 4044 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4044 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4044 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4044 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4044 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4044 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4044 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4044 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4044 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4044 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4044 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4044 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4044 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4044 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4044 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4044 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4044 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4044 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4044 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4044 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4044 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4044 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4044 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4044 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4044 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4044 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4044 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4044 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4044 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4044 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4044 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4044 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4044 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4044 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4044 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4044 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4044 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4044 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4044 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4044 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4044 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4044 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4044 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4044 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4044 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4044 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4044 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4044 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4044 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4044 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4044 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4044 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4044 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4044 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4044 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4044 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4044 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4044 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4044 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4044 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4044 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4044 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4044 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4044 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 5436 ONENOTE.EXE 5436 ONENOTE.EXE 5436 ONENOTE.EXE 5436 ONENOTE.EXE 5436 ONENOTE.EXE 5436 ONENOTE.EXE 5436 ONENOTE.EXE 5436 ONENOTE.EXE 5436 ONENOTE.EXE 5436 ONENOTE.EXE 5436 ONENOTE.EXE 5436 ONENOTE.EXE 5436 ONENOTE.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 5284 wrote to memory of 5436 5284 printfilterpipelinesvc.exe 101 PID 5284 wrote to memory of 5436 5284 printfilterpipelinesvc.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe"C:\Users\Admin\AppData\Local\Temp\508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe"1⤵
- Enumerates connected drives
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4044
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:6080
-
C:\Windows\system32\printfilterpipelinesvc.exeC:\Windows\system32\printfilterpipelinesvc.exe -Embedding1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5284 -
C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE/insertdoc "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\{BB20E36B-875B-4087-A76A-90A46E00F906}.xps" 1337657528633400002⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5436
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD589adbf65371b89f1a1b641cd0ed59aa3
SHA10625b876a80a4520b1363affa12adc48cbafc861
SHA256e9ac28128aa563cac2ba7355c539893518215a8c47aa4a3aa3d4dba810f2a1a5
SHA512f936cc18e5e77a0b6bbac4c7c5621431a7093174708ca102d49069a4a7ab65de904ea7e53f784c6779aa99e433f76139a42bf867bc3f1cd0866de0771455c639
-
Filesize
64KB
MD5fcd6bcb56c1689fcef28b57c22475bad
SHA11adc95bebe9eea8c112d40cd04ab7a8d75c4f961
SHA256de2f256064a0af797747c2b97505dc0b9f3df0de4f489eac731c23ae9ca9cc31
SHA51273e4153936dab198397b74ee9efc26093dda721eaab2f8d92786891153b45b04265a161b169c988edb0db2c53124607b6eaaa816559c5ce54f3dbc9fa6a7a4b2
-
Filesize
4KB
MD5b54ce50f4e1e01f89172a1dc35faf0ea
SHA1a43969e583a97e20a502f004557e3961e0b35060
SHA2562a42fa539df052130b6ea29ee3a112046d6b26000edd0614e35998b1c9f7c808
SHA51295d7bf0e39800628c2b51025bc036bf3f6839099d8e78f7ec944a1bb9ba27299145d924998e647c0f38fe286c68e9230bd43abc80dcfaa77b1587b6cf603339d
-
Filesize
4KB
MD55a70241f27a17f414b94a52b11965404
SHA176fb511808df6d4bafcd0872936b371554299186
SHA2560295a74fb97eb055160df2641637b7ec7251d7424a64f6283dbfbfa1a85463c8
SHA512e8f5c4c12d0f40fd8f5a6e2551c6259045a625fc7bebda742e1c3047eb9402a4e39d1a6f42071aeea17dd62d067401c5cc1d64e50dd5a58cdfddb5d3be0c99f1
-
Filesize
3KB
MD556d11f16817d21a92d197d21074f1c01
SHA13c6d5f9ab8996b9a0a0c527a6095c13412de5da1
SHA256d837d8a34e54f30bf0816ade6ba03d0d5f9c722a512b48242ca31b1b282d314c
SHA51261bb291683d551479adddba3cfaca792af3d5fcdcfd8724aa79e795c6291dd33541d507a5ed72f48223be7b5cf77574492fb96fd76d776a39c766373144b4c60