Analysis
-
max time kernel
149s -
max time network
154s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 11:21
Static task
static1
Behavioral task
behavioral1
Sample
5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe
Resource
win10v2004-20241007-en
General
-
Target
5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe
-
Size
1.1MB
-
MD5
abe16faca8a21836e6d491a11ae9dde4
-
SHA1
9e63ad3be03d6acce3a7eff62c9147d3deead512
-
SHA256
5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db
-
SHA512
000a71e24007b640c3165022e569566ec8ea02533939bdae47ab04ac7631d98e9b597c0575c3e212a274ecd07a53a3538e4cdf90bf6d7462ec55eeb754e97295
-
SSDEEP
24576:RjukpdpEaAYxpD/27Ul2afYc+6MggcCxu:R7dLfxpD83awXTgga
Malware Config
Extracted
C:\ProgramData\Adobe\Setup\INC-README.html
https://twitter.com/hashtag/incransom?f=live</span>
Extracted
F:\INC-README.txt
inc_ransom
http://incblog6qu4y4mm4zvw5nrmue6qbwtgjsxpw6b7ixzssu36tsajldoad.onion/
http://incblog7vmuq7rktic73r4ha4j757m3ptym37tyvifzp2roedyyzzxid.onion/
http://incapt.su/
https://twitter.com/hashtag/incransom?f=live
http://incpaykabjqc2mtdxq6c23nqh4x6m5dkps5fr6vgdkgzp5njssx6qkid.onion/
Signatures
-
INC Ransomware
INC Ransom is a ransomware that emerged in July 2023.
-
Inc_ransom family
-
Renames multiple (296) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe File opened (read-only) \??\L: 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe File opened (read-only) \??\N: 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe File opened (read-only) \??\P: 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe File opened (read-only) \??\Q: 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe File opened (read-only) \??\R: 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe File opened (read-only) \??\S: 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe File opened (read-only) \??\T: 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe File opened (read-only) \??\X: 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe File opened (read-only) \??\Y: 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe File opened (read-only) \??\F: 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe File opened (read-only) \??\E: 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe File opened (read-only) \??\I: 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe File opened (read-only) \??\M: 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe File opened (read-only) \??\O: 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe File opened (read-only) \??\V: 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe File opened (read-only) \??\W: 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe File opened (read-only) \??\A: 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe File opened (read-only) \??\B: 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe File opened (read-only) \??\G: 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe File opened (read-only) \??\J: 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe File opened (read-only) \??\K: 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe File opened (read-only) \??\U: 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe File opened (read-only) \??\Z: 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\system32\spool\PRINTERS\00002.SPL 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe File created C:\Windows\system32\spool\PRINTERS\00003.SPL 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe File created C:\Windows\system32\spool\PRINTERS\PPbumzjgr18bu3q9350fbzkp1yc.TMP printfilterpipelinesvc.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\background-image.jpg" 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ONENOTE.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU ONENOTE.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5236 ONENOTE.EXE 5236 ONENOTE.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 4692 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 4692 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 4692 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 4692 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 4692 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 4692 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 4692 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 4692 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 4692 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 4692 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 4692 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 4692 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 4692 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 4692 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 4692 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 4692 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 4692 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 4692 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 4692 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 4692 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 4692 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 4692 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 4692 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 4692 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 4692 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 4692 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 4692 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 4692 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 4692 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 4692 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 4692 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 4692 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 4692 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 4692 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 4692 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 4692 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 4692 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 4692 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 4692 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 4692 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 4692 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 4692 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 4692 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 4692 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 4692 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 4692 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 4692 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 4692 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 4692 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 4692 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 4692 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 4692 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 4692 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 4692 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 4692 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 4692 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 4692 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 4692 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 4692 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 4692 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 4692 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 4692 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 4692 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 4692 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 5236 ONENOTE.EXE 5236 ONENOTE.EXE 5236 ONENOTE.EXE 5236 ONENOTE.EXE 5236 ONENOTE.EXE 5236 ONENOTE.EXE 5236 ONENOTE.EXE 5236 ONENOTE.EXE 5236 ONENOTE.EXE 5236 ONENOTE.EXE 5236 ONENOTE.EXE 5236 ONENOTE.EXE 5236 ONENOTE.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 5596 wrote to memory of 5236 5596 printfilterpipelinesvc.exe 93 PID 5596 wrote to memory of 5236 5596 printfilterpipelinesvc.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe"C:\Users\Admin\AppData\Local\Temp\5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe"1⤵
- Enumerates connected drives
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4692
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:5484
-
C:\Windows\system32\printfilterpipelinesvc.exeC:\Windows\system32\printfilterpipelinesvc.exe -Embedding1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5596 -
C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE/insertdoc "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\{C9927637-3075-44A0-8CF7-815152B4A1C6}.xps" 1337657528953100002⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5236
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5185052dfe73e7f806a16d8fccceab907
SHA1297b9e82de3967577b8e6807c1e2630d21f6bccc
SHA25664fd0d891e1536f4c7ebdd03ed23c44b84d902e73a96555a5fcd394c6d7a1e45
SHA512a9a26303d52cac73c9ef929541f4a6010a22a3e7e20da00d60fae02788429a47af2c4af524b62f7665ec39ce44b4c961069aba3244785c017db87e28b85cff0b
-
Filesize
4KB
MD5feb0d83a5004436c9bd15fa99c18da95
SHA17cf190d8ba98fc6468f3527a361965d63ab86488
SHA25602a4554689eaee1fc3b0f1487e833adc2ae743c4fa335d10b8ec0933052886e1
SHA512d112cf17a5baa4f260140f26840f82f149e8dc2ba1f8f25b6bbb3635060b655e9f5d3bbfc348388f65b29612e5ada31497bfdcade9ad7894c461852240c60edc
-
Filesize
3KB
MD51199e508b695d85ef8b551d76a107cfa
SHA1a43b5ba491d89c62c0a44b586de383d90d11a090
SHA25682ae87050e17230d4a155fcae387e4717b93a0b65c667fb4148b63caaaf078ac
SHA5125e7beb97dabf878aebb7f7b68d1c4efcd86b98bd378605370f26b8fdd58d308ea99caa2f06491d77ae20de552f92a1bbbc0fd53d0130edb33af681a023a2eb3b