Analysis
-
max time kernel
149s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 11:21
Static task
static1
Behavioral task
behavioral1
Sample
7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe
Resource
win10v2004-20241007-en
General
-
Target
7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe
-
Size
161KB
-
MD5
248617dcee576b8f42b3a80ecd172c41
-
SHA1
e8300c27d362fbf25c1e00fbb6c13fce3e261108
-
SHA256
7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0
-
SHA512
6717dc831e2c0466ecc1b69837b90b029169f37eebeaef4a4cab4186d1feae0809ec2b3eb6a438b50e0a9d99bb447acc0be594bdf79ea84d56ff6cc41f9abae7
-
SSDEEP
3072:YduKWsRRjHRvsfdO3Q+rSBPJasYIeuvDaEkZSc5:bYjHiqrrTQWUc5
Malware Config
Extracted
C:\ProgramData\Adobe\Setup\INC-README.html
https://twitter.com/hashtag/incransom?f=live</span>
Extracted
C:\ProgramData\Adobe\Setup\INC-README.txt
inc_ransom
http://incblog6qu4y4mm4zvw5nrmue6qbwtgjsxpw6b7ixzssu36tsajldoad.onion/
http://incblog7vmuq7rktic73r4ha4j757m3ptym37tyvifzp2roedyyzzxid.onion/
http://incapt.su/
https://twitter.com/hashtag/incransom?f=live
http://incpaykabjqc2mtdxq6c23nqh4x6m5dkps5fr6vgdkgzp5njssx6qkid.onion/
Signatures
-
INC Ransomware
INC Ransom is a ransomware that emerged in July 2023.
-
Inc_ransom family
-
Renames multiple (309) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe File opened (read-only) \??\G: 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe File opened (read-only) \??\I: 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe File opened (read-only) \??\M: 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe File opened (read-only) \??\R: 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe File opened (read-only) \??\U: 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe File opened (read-only) \??\W: 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe File opened (read-only) \??\X: 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe File opened (read-only) \??\Z: 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe File opened (read-only) \??\A: 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe File opened (read-only) \??\B: 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe File opened (read-only) \??\J: 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe File opened (read-only) \??\K: 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe File opened (read-only) \??\Q: 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe File opened (read-only) \??\S: 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe File opened (read-only) \??\T: 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe File opened (read-only) \??\V: 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe File opened (read-only) \??\E: 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe File opened (read-only) \??\H: 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe File opened (read-only) \??\L: 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe File opened (read-only) \??\N: 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe File opened (read-only) \??\O: 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe File opened (read-only) \??\P: 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe File opened (read-only) \??\Y: 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\system32\spool\PRINTERS\00002.SPL 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe File created C:\Windows\system32\spool\PRINTERS\00003.SPL 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe File created C:\Windows\system32\spool\PRINTERS\PPk451xpnvdf5w_yjr6o3k0uvzd.TMP printfilterpipelinesvc.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\background-image.jpg" 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ONENOTE.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ONENOTE.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU ONENOTE.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5892 ONENOTE.EXE 5892 ONENOTE.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2520 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe Token: SeTakeOwnershipPrivilege 2520 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe Token: SeTakeOwnershipPrivilege 2520 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe Token: SeTakeOwnershipPrivilege 2520 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe Token: SeTakeOwnershipPrivilege 2520 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe Token: SeTakeOwnershipPrivilege 2520 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe Token: SeTakeOwnershipPrivilege 2520 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe Token: SeTakeOwnershipPrivilege 2520 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe Token: SeTakeOwnershipPrivilege 2520 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe Token: SeTakeOwnershipPrivilege 2520 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe Token: SeTakeOwnershipPrivilege 2520 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe Token: SeTakeOwnershipPrivilege 2520 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe Token: SeTakeOwnershipPrivilege 2520 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe Token: SeTakeOwnershipPrivilege 2520 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe Token: SeTakeOwnershipPrivilege 2520 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe Token: SeTakeOwnershipPrivilege 2520 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe Token: SeTakeOwnershipPrivilege 2520 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe Token: SeTakeOwnershipPrivilege 2520 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe Token: SeTakeOwnershipPrivilege 2520 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe Token: SeTakeOwnershipPrivilege 2520 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe Token: SeTakeOwnershipPrivilege 2520 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe Token: SeTakeOwnershipPrivilege 2520 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe Token: SeTakeOwnershipPrivilege 2520 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe Token: SeTakeOwnershipPrivilege 2520 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe Token: SeTakeOwnershipPrivilege 2520 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe Token: SeTakeOwnershipPrivilege 2520 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe Token: SeTakeOwnershipPrivilege 2520 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe Token: SeTakeOwnershipPrivilege 2520 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe Token: SeTakeOwnershipPrivilege 2520 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe Token: SeTakeOwnershipPrivilege 2520 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe Token: SeTakeOwnershipPrivilege 2520 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe Token: SeTakeOwnershipPrivilege 2520 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe Token: SeTakeOwnershipPrivilege 2520 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe Token: SeTakeOwnershipPrivilege 2520 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe Token: SeTakeOwnershipPrivilege 2520 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe Token: SeTakeOwnershipPrivilege 2520 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe Token: SeTakeOwnershipPrivilege 2520 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe Token: SeTakeOwnershipPrivilege 2520 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe Token: SeTakeOwnershipPrivilege 2520 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe Token: SeTakeOwnershipPrivilege 2520 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe Token: SeTakeOwnershipPrivilege 2520 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe Token: SeTakeOwnershipPrivilege 2520 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe Token: SeTakeOwnershipPrivilege 2520 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe Token: SeTakeOwnershipPrivilege 2520 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe Token: SeTakeOwnershipPrivilege 2520 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe Token: SeTakeOwnershipPrivilege 2520 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe Token: SeTakeOwnershipPrivilege 2520 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe Token: SeTakeOwnershipPrivilege 2520 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe Token: SeTakeOwnershipPrivilege 2520 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe Token: SeTakeOwnershipPrivilege 2520 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe Token: SeTakeOwnershipPrivilege 2520 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe Token: SeTakeOwnershipPrivilege 2520 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe Token: SeTakeOwnershipPrivilege 2520 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe Token: SeTakeOwnershipPrivilege 2520 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe Token: SeTakeOwnershipPrivilege 2520 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe Token: SeTakeOwnershipPrivilege 2520 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe Token: SeTakeOwnershipPrivilege 2520 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe Token: SeTakeOwnershipPrivilege 2520 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe Token: SeTakeOwnershipPrivilege 2520 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe Token: SeTakeOwnershipPrivilege 2520 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe Token: SeTakeOwnershipPrivilege 2520 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe Token: SeTakeOwnershipPrivilege 2520 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe Token: SeTakeOwnershipPrivilege 2520 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe Token: SeTakeOwnershipPrivilege 2520 7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 5892 ONENOTE.EXE 5892 ONENOTE.EXE 5892 ONENOTE.EXE 5892 ONENOTE.EXE 5892 ONENOTE.EXE 5892 ONENOTE.EXE 5892 ONENOTE.EXE 5892 ONENOTE.EXE 5892 ONENOTE.EXE 5892 ONENOTE.EXE 5892 ONENOTE.EXE 5892 ONENOTE.EXE 5892 ONENOTE.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 5748 wrote to memory of 5892 5748 printfilterpipelinesvc.exe 95 PID 5748 wrote to memory of 5892 5748 printfilterpipelinesvc.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe"C:\Users\Admin\AppData\Local\Temp\7ccea71dcec6042d83692ea9e1348f249b970af2d73c83af3f9d67c4434b2dd0.exe"1⤵
- Enumerates connected drives
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2520
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:5668
-
C:\Windows\system32\printfilterpipelinesvc.exeC:\Windows\system32\printfilterpipelinesvc.exe -Embedding1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5748 -
C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE/insertdoc "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\{D83A490E-F6C9-4932-8F44-50A38CCCFEAB}.xps" 1337657528568000002⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5892
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD539ceb74895eee3141466efaa71e38aae
SHA1c07f74905f56e534ad227bb5701fd5a7f99d5023
SHA256f5c6e9911c10b749daf848c13e896ce4d39143b17450c771d39f8b10f6348051
SHA51268d4571729351f3f143e43d9428861c6cab7d0ed23cc9f28c5e2a3ab6a5419d96b5de9c51637eb55fe285b774e1dc1782ebf91bc5b5c383f5f4a77aa1936abd0
-
Filesize
3KB
MD592983e74be7521eb96934f231567a0ef
SHA1fe28e113ce525682f2d7bcbf9ebe0d0e869aaf73
SHA2567457d712471d62c589e3e366395236c1a8fe87da7196d45afe74e852e95382e5
SHA512a975b4b04f4b98894304c3dca1c259b461362ead5def9404f51940dd7d0a4be782d323e323db761d100d7d7d7c4e3ca6e4db7775cf9367c95a25814cb84f87f3
-
Filesize
64KB
MD5fcd6bcb56c1689fcef28b57c22475bad
SHA11adc95bebe9eea8c112d40cd04ab7a8d75c4f961
SHA256de2f256064a0af797747c2b97505dc0b9f3df0de4f489eac731c23ae9ca9cc31
SHA51273e4153936dab198397b74ee9efc26093dda721eaab2f8d92786891153b45b04265a161b169c988edb0db2c53124607b6eaaa816559c5ce54f3dbc9fa6a7a4b2
-
Filesize
4KB
MD5edeb958b19aebd952161febfe4045258
SHA15810c4f9f2f643b8a80f6d0d98e7d9cd410f2b90
SHA2567975ef4cc86cdd09cc7754c7b57a592222700fc53fc6b71f975644a69ec9a522
SHA51283a83daaee79b248e368737faa313d583e739a218fa620f27ddd7eb61aa7f2f79b41a80913e74017f0e7d8ff07ecc094fdf48e51e01ef05d35f1b4a6e04d721e
-
Filesize
4KB
MD510d27d820d1eae3ad09b04bfea5d1a56
SHA154fc980b68c81856845f11665e69e97a96144eef
SHA25664097978d5947d632aeb8ec789582152e6ef707e8696c01c77e06e32feef3b45
SHA512f7ed503507f7ee82f689110c05760c245fb7c9d20b5b59fa8de03272ec81daa1696690504d2e898e7a19264591a42fc0c7427e041ded18b43bc0ba6e0ea30b34