Analysis
-
max time kernel
148s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 11:20
Static task
static1
Behavioral task
behavioral1
Sample
2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe
Resource
win10v2004-20241007-en
General
-
Target
2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe
-
Size
161KB
-
MD5
79952fdfcef93c2f65c2ff0b1c91fa35
-
SHA1
f8b1b51bb55f645e2a477509bb6f18a5b0fac8c3
-
SHA256
2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7
-
SHA512
b735c02b8823a6c6b48c9af76e33c3b2f8347e6827346cb1296f043067dea4cff54c8b7fe91bedb4152d0aa64b97f9c2818382d7f2ea9b551128cf67b82b8c84
-
SSDEEP
3072:YduKWsRRjHRvsfdO3Q+rSBPJasYIeuv3aEkZSc5:bYjHiqrrTgWUc5
Malware Config
Extracted
C:\ProgramData\Adobe\INC-README.txt
inc_ransom
http://incblog6qu4y4mm4zvw5nrmue6qbwtgjsxpw6b7ixzssu36tsajldoad.onion/
http://incblog7vmuq7rktic73r4ha4j757m3ptym37tyvifzp2roedyyzzxid.onion/
http://incapt.su/
https://twitter.com/hashtag/incransom?f=live
http://incpaykabjqc2mtdxq6c23nqh4x6m5dkps5fr6vgdkgzp5njssx6qkid.onion/
Extracted
C:\ProgramData\Adobe\INC-README.html
https://twitter.com/hashtag/incransom?f=live</span>
Signatures
-
INC Ransomware
INC Ransom is a ransomware that emerged in July 2023.
-
Inc_ransom family
-
Renames multiple (306) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\M: 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe File opened (read-only) \??\O: 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe File opened (read-only) \??\X: 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe File opened (read-only) \??\F: 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe File opened (read-only) \??\B: 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe File opened (read-only) \??\G: 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe File opened (read-only) \??\J: 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe File opened (read-only) \??\R: 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe File opened (read-only) \??\H: 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe File opened (read-only) \??\I: 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe File opened (read-only) \??\P: 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe File opened (read-only) \??\Q: 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe File opened (read-only) \??\V: 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe File opened (read-only) \??\Y: 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe File opened (read-only) \??\E: 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe File opened (read-only) \??\K: 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe File opened (read-only) \??\N: 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe File opened (read-only) \??\S: 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe File opened (read-only) \??\W: 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe File opened (read-only) \??\Z: 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe File opened (read-only) \??\A: 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe File opened (read-only) \??\L: 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe File opened (read-only) \??\T: 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe File opened (read-only) \??\U: 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\system32\spool\PRINTERS\00002.SPL 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe File created C:\Windows\system32\spool\PRINTERS\00003.SPL 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe File created C:\Windows\system32\spool\PRINTERS\PPrqecx7ak0vl4qxuqchzh3q0ob.TMP printfilterpipelinesvc.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\background-image.jpg" 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ONENOTE.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU ONENOTE.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5856 ONENOTE.EXE 5856 ONENOTE.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2328 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 2328 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 2328 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 2328 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 2328 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 2328 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 2328 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 2328 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 2328 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 2328 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 2328 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 2328 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 2328 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 2328 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 2328 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 2328 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 2328 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 2328 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 2328 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 2328 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 2328 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 2328 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 2328 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 2328 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 2328 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 2328 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 2328 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 2328 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 2328 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 2328 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 2328 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 2328 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 2328 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 2328 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 2328 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 2328 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 2328 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 2328 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 2328 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 2328 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 2328 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 2328 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 2328 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 2328 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 2328 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 2328 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 2328 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 2328 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 2328 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 2328 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 2328 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 2328 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 2328 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 2328 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 2328 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 2328 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 2328 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 2328 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 2328 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 2328 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 2328 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 2328 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 2328 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 2328 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 5856 ONENOTE.EXE 5856 ONENOTE.EXE 5856 ONENOTE.EXE 5856 ONENOTE.EXE 5856 ONENOTE.EXE 5856 ONENOTE.EXE 5856 ONENOTE.EXE 5856 ONENOTE.EXE 5856 ONENOTE.EXE 5856 ONENOTE.EXE 5856 ONENOTE.EXE 5856 ONENOTE.EXE 5856 ONENOTE.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 5740 wrote to memory of 5856 5740 printfilterpipelinesvc.exe 102 PID 5740 wrote to memory of 5856 5740 printfilterpipelinesvc.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe"C:\Users\Admin\AppData\Local\Temp\2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe"1⤵
- Enumerates connected drives
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2328
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:5496
-
C:\Windows\system32\printfilterpipelinesvc.exeC:\Windows\system32\printfilterpipelinesvc.exe -Embedding1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5740 -
C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE/insertdoc "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\{F7E1341F-BCED-40AB-87CC-8E03C2275604}.xps" 1337657522159700002⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5856
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5b563181fcd62036a3007a9a21d5a6ec4
SHA1ba45ae6e9552b6ad5a62bcdb82fe1d569e95dc84
SHA25606361a310ff0c27550674dfe8b1236347eb85e0597b9921b04c964997e75bbc7
SHA512e2fba26d22b7784e5474d482714b5f43de41952a4ff1d1b9e85156f3501c7db0fb88a7aa4798b34f862f350130eb8e1d987279e8e35cd51c5a652ad7f3920dad
-
Filesize
3KB
MD513c5917cc0b72e397c5c1c27ad8b0ea4
SHA1882bb77a501e2e8822e3f1ae43f6bbe3a312bdab
SHA256b5b31c7fe82a224147312f9e10b8ac6f57844267292d9f6b7532b8ceffcb7cf9
SHA512a4d6c8ee6d07c3aa33233dac614c9d1a8170de7b341a42ccf115e4e90ae2dd6ea7c88ef18514a132537ca4aa584680419057b0a76267c75bd402df0fcc806f09
-
Filesize
4KB
MD5333c44070dc5295dceaf905bdf868ab1
SHA1bc7f3c2ecb207c07be54c7e4a69a1bf39b04ab2a
SHA2560bc1293ae28a0f4ee04f6e22b4fe4f868606ac5c57edb29458d97c1c6425bbe3
SHA5124cfa3b26e6b472ba1b4d21a0e9ee95b8828260efc3b5538bbdae46774f84fc08a2d350e4b926fb611b7ca64b019b619ba6b3b44aa1e34077a5c70ba34ea674df
-
Filesize
4KB
MD5c51d2d24be85499913d272f34bd34553
SHA104ad1760e0bfcf0c8c0e1492059824fd7abab158
SHA256d808047789fda1b592a4a540a8f7ff744f8250cce9e4c1fb0d1354a69e99cdab
SHA5124dbb9fe300c21f2cfd317e93bdb44fe711b8e06b43b008f412e1678aaba20aefaf420463367ba86752d9976a131d0c3d306a3a644b1a0c61fa7aa3927eb4f3d0