Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 11:22
Static task
static1
Behavioral task
behavioral1
Sample
c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe
Resource
win10v2004-20241007-en
General
-
Target
c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe
-
Size
161KB
-
MD5
14889a7e231c4884f28aefd592e61398
-
SHA1
002ee090f71fce5363ba5d2036fae288e7b03aab
-
SHA256
c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090
-
SHA512
04b3437c09ba328e0e0697f969c613beefd4eec6c70c7bb9e0b5b7a6bb5d3303360d1d7b471d9307efd2ad60dcd078276b35546d5207939485c77c2d87a648e2
-
SSDEEP
3072:YduKWsRRjHRvsfdO3Q+rSBPJasYIeuv4aEkZSc5:bYjHiqrrTnWUc5
Malware Config
Extracted
C:\ProgramData\Adobe\Setup\INC-README.html
https://twitter.com/hashtag/incransom?f=live</span>
Extracted
F:\INC-README.txt
inc_ransom
http://incblog6qu4y4mm4zvw5nrmue6qbwtgjsxpw6b7ixzssu36tsajldoad.onion/
http://incblog7vmuq7rktic73r4ha4j757m3ptym37tyvifzp2roedyyzzxid.onion/
http://incapt.su/
https://twitter.com/hashtag/incransom?f=live
http://incpaykabjqc2mtdxq6c23nqh4x6m5dkps5fr6vgdkgzp5njssx6qkid.onion/
Signatures
-
INC Ransomware
INC Ransom is a ransomware that emerged in July 2023.
-
Inc_ransom family
-
Renames multiple (318) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe File opened (read-only) \??\L: c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe File opened (read-only) \??\U: c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe File opened (read-only) \??\V: c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe File opened (read-only) \??\F: c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe File opened (read-only) \??\G: c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe File opened (read-only) \??\N: c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe File opened (read-only) \??\Q: c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe File opened (read-only) \??\R: c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe File opened (read-only) \??\X: c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe File opened (read-only) \??\A: c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe File opened (read-only) \??\E: c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe File opened (read-only) \??\I: c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe File opened (read-only) \??\M: c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe File opened (read-only) \??\S: c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe File opened (read-only) \??\T: c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe File opened (read-only) \??\Z: c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe File opened (read-only) \??\B: c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe File opened (read-only) \??\H: c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe File opened (read-only) \??\K: c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe File opened (read-only) \??\O: c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe File opened (read-only) \??\P: c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe File opened (read-only) \??\W: c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe File opened (read-only) \??\Y: c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\system32\spool\PRINTERS\00002.SPL c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe File created C:\Windows\system32\spool\PRINTERS\00003.SPL c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe File created C:\Windows\system32\spool\PRINTERS\PP1sl00mow6091d_dobb0atztbe.TMP printfilterpipelinesvc.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\background-image.jpg" c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ONENOTE.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU ONENOTE.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5664 ONENOTE.EXE 5664 ONENOTE.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 1168 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 1168 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 1168 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 1168 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 1168 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 1168 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 1168 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 1168 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 1168 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 1168 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 1168 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 1168 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 1168 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 1168 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 1168 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 1168 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 1168 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 1168 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 1168 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 1168 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 1168 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 1168 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 1168 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 1168 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 1168 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 1168 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 1168 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 1168 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 1168 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 1168 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 1168 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 1168 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 1168 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 1168 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 1168 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 1168 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 1168 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 1168 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 1168 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 1168 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 1168 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 1168 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 1168 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 1168 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 1168 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 1168 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 1168 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 1168 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 1168 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 1168 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 1168 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 1168 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 1168 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 1168 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 1168 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 1168 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 1168 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 1168 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 1168 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 1168 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 1168 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 1168 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 1168 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 1168 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 5664 ONENOTE.EXE 5664 ONENOTE.EXE 5664 ONENOTE.EXE 5664 ONENOTE.EXE 5664 ONENOTE.EXE 5664 ONENOTE.EXE 5664 ONENOTE.EXE 5664 ONENOTE.EXE 5664 ONENOTE.EXE 5664 ONENOTE.EXE 5664 ONENOTE.EXE 5664 ONENOTE.EXE 5664 ONENOTE.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 5460 wrote to memory of 5664 5460 printfilterpipelinesvc.exe 103 PID 5460 wrote to memory of 5664 5460 printfilterpipelinesvc.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe"C:\Users\Admin\AppData\Local\Temp\c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe"1⤵
- Enumerates connected drives
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1168
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:5228
-
C:\Windows\system32\printfilterpipelinesvc.exeC:\Windows\system32\printfilterpipelinesvc.exe -Embedding1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5460 -
C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE/insertdoc "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\{384ACAB2-DA0A-4AF8-ABA0-8EF55D3474BD}.xps" 1337657534546400002⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5664
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5498f0989511dd5bb1c18ef64cc2efc71
SHA1186b7ec10cd98d449b6dc89d0a943349f927e696
SHA256ff18b423865ef9d2ffc3670d7d23c6c127e887e0bc75ad59e557944634497324
SHA5129345c1695e0018b0aa6ea1764b860bd1abd828edc3ad2eb6fcd0939f0633b89f94f1667bbc041937b1d9082358ce3b51cebb9626b8bd40924b50741402101f33
-
Filesize
64KB
MD5fcd6bcb56c1689fcef28b57c22475bad
SHA11adc95bebe9eea8c112d40cd04ab7a8d75c4f961
SHA256de2f256064a0af797747c2b97505dc0b9f3df0de4f489eac731c23ae9ca9cc31
SHA51273e4153936dab198397b74ee9efc26093dda721eaab2f8d92786891153b45b04265a161b169c988edb0db2c53124607b6eaaa816559c5ce54f3dbc9fa6a7a4b2
-
Filesize
4KB
MD58f807d1684f88eabfeaf2c08213c50b1
SHA17c16341df535ff1ba08d8713a8fcf081eced5b38
SHA256538939ea85baa5976a76c3010c20ea45f9056139659a85b943601c6920d6f1de
SHA5128c4e21fb68f7ee48492eb39c12395b1fcc3648873b55ccabbe8af3824cbdb005af1cfdb60ba80fc619380efa1e034f0e1f510aa4bf59184682e0cdc182316279
-
Filesize
4KB
MD50876a685324f8477c6a439a95f43daa9
SHA1b7e2e19f5ef982a4b9ca795924c1184533a63051
SHA2565d06f58d0a217792995d58476bbf01091ddf067ff0529c65b790498c6555173d
SHA512e49cf42c587c11185990ea9f9f266af9ee116fe7fd6a10a6e7241b0de048644f3220af975c9abc5172c4cd779d0516cb4b6d21d9b854fa2db966f600d907beb1
-
Filesize
3KB
MD53d226c5f42d41a2da38bd29d5d007cf2
SHA1a1ce273185f889fba831f0a4a5f04e8727b4976a
SHA256287ef4614fc3d09d9d39735e57ae8d3fb55c7b22de1b83364b5f62a9e3f1a5ee
SHA512e72f075eb9418a6f7b53d7fc827ac8eca138ecf4c2ac863db85b91fed0213672d0be48e96c50b2c8703445ac6da0a2bb02ff3ff33a936eb9f3d0456f2a993972