Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 11:20
Static task
static1
Behavioral task
behavioral1
Sample
1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe
Resource
win10v2004-20241007-en
General
-
Target
1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe
-
Size
161KB
-
MD5
ab65a026cf2c33485960d52de4884fd3
-
SHA1
adafa060ea04b3d812e975fff6d8b39074ba2e3b
-
SHA256
1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169
-
SHA512
0a95b03bb9ddae32e0b3b76f0e6176ac464e291607633f6f320b92d781936ed7774294addf83cca5d9354b61ff4678d381cd5819dcfd1a1374605aad96ee9436
-
SSDEEP
3072:YduKWsRRjHRvsfdO3Q+rSBPJasYIeuvdaEkZSc5:bYjHiqrrTKWUc5
Malware Config
Extracted
C:\ProgramData\Adobe\INC-README.txt
inc_ransom
http://incblog6qu4y4mm4zvw5nrmue6qbwtgjsxpw6b7ixzssu36tsajldoad.onion/
http://incblog7vmuq7rktic73r4ha4j757m3ptym37tyvifzp2roedyyzzxid.onion/
http://incapt.su/
https://twitter.com/hashtag/incransom?f=live
http://incpaykabjqc2mtdxq6c23nqh4x6m5dkps5fr6vgdkgzp5njssx6qkid.onion/
Extracted
C:\ProgramData\Adobe\INC-README.html
https://twitter.com/hashtag/incransom?f=live</span>
Signatures
-
INC Ransomware
INC Ransom is a ransomware that emerged in July 2023.
-
Inc_ransom family
-
Renames multiple (312) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe File opened (read-only) \??\E: 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe File opened (read-only) \??\G: 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe File opened (read-only) \??\H: 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe File opened (read-only) \??\I: 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe File opened (read-only) \??\L: 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe File opened (read-only) \??\S: 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe File opened (read-only) \??\W: 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe File opened (read-only) \??\A: 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe File opened (read-only) \??\K: 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe File opened (read-only) \??\M: 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe File opened (read-only) \??\N: 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe File opened (read-only) \??\V: 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe File opened (read-only) \??\J: 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe File opened (read-only) \??\O: 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe File opened (read-only) \??\Q: 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe File opened (read-only) \??\T: 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe File opened (read-only) \??\F: 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe File opened (read-only) \??\B: 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe File opened (read-only) \??\P: 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe File opened (read-only) \??\R: 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe File opened (read-only) \??\U: 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe File opened (read-only) \??\Y: 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe File opened (read-only) \??\Z: 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\system32\spool\PRINTERS\00002.SPL 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe File created C:\Windows\system32\spool\PRINTERS\00003.SPL 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe File created C:\Windows\system32\spool\PRINTERS\PP78bwmf4koejv0sr0xf9h1c61d.TMP printfilterpipelinesvc.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\background-image.jpg" 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ONENOTE.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU ONENOTE.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5988 ONENOTE.EXE 5988 ONENOTE.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 4384 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4384 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4384 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4384 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4384 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4384 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4384 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4384 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4384 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4384 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4384 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4384 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4384 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4384 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4384 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4384 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4384 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4384 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4384 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4384 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4384 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4384 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4384 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4384 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4384 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4384 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4384 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4384 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4384 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4384 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4384 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4384 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4384 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4384 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4384 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4384 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4384 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4384 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4384 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4384 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4384 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4384 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4384 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4384 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4384 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4384 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4384 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4384 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4384 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4384 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4384 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4384 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4384 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4384 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4384 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4384 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4384 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4384 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4384 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4384 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4384 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4384 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4384 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4384 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 5988 ONENOTE.EXE 5988 ONENOTE.EXE 5988 ONENOTE.EXE 5988 ONENOTE.EXE 5988 ONENOTE.EXE 5988 ONENOTE.EXE 5988 ONENOTE.EXE 5988 ONENOTE.EXE 5988 ONENOTE.EXE 5988 ONENOTE.EXE 5988 ONENOTE.EXE 5988 ONENOTE.EXE 5988 ONENOTE.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 5784 wrote to memory of 5988 5784 printfilterpipelinesvc.exe 101 PID 5784 wrote to memory of 5988 5784 printfilterpipelinesvc.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe"C:\Users\Admin\AppData\Local\Temp\1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe"1⤵
- Enumerates connected drives
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4384
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:5536
-
C:\Windows\system32\printfilterpipelinesvc.exeC:\Windows\system32\printfilterpipelinesvc.exe -Embedding1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5784 -
C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE/insertdoc "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\{5F97C557-3FA0-4F41-B429-FD0E182BC6F1}.xps" 1337657522030800002⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5988
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5dd6e91db842265b4ff022dad172d65ff
SHA1afdb1ee1df839be1b044bf01aa75e2f132c5391c
SHA256f711d1f92e60b51079985fbb8f36d86145f3c7d77ed6b0912ddbb8555b3a6be1
SHA512854f658e7d6d2b1c01eb53f4f48749b589d415233a8747f5a6390c904de3f2970c3629fdd5cb681ee3392509c3416e03d950f4c28e245d2ad153272bf0f2120b
-
Filesize
3KB
MD55b4305c63d66f44752d5fa815deacb91
SHA12490af8f78d483a8cf65d3089908dfc976e6a686
SHA2569524d2a1ce3d7c111bdb8eb877c9b626f2cb21ae8e593866630bbc6227131748
SHA512ea0a61d493018fcc5bbb06a2b6387bbf9cae637e609bdbb3ea0507f8f9b43bc6d496f3f55d7f603b07a554dfe32910e1422d7184334244ca59366c9fc7257b3d
-
Filesize
4KB
MD54b9c5013d4ee4496ee1f69e4c451eabd
SHA1bab59c3f82f69505b7e757cf84db55377bf06b5d
SHA256023525d53965bc78ef3f27ddd0f65726c5b00d4c837f09da3250483ff4b040fc
SHA512a8bc4709447172432bdb924120b526728335694b4de1bc4bb183265ee2f4bf7fa0469cb0549f02c1116cb443ce4a5d44f6cca57b39a4bd4863a32c6d65aef566
-
Filesize
4KB
MD55e987455e6a236957eabd60832fe80fb
SHA11e3356d5d5fa6308d6764e19cb2e66f34c3e22ab
SHA2565e4330b5dd91431ddd8a247fed1190ffc8182981735ba4c9efa265c1e332c603
SHA512ee45c0811222f95fcec6dac1d127b65878c9c84cc4e609e146ec16c45c7460e4d17bf81381f70261cea2c3edf08948013dbfb028a932633cfd3ee392ec971413