Analysis
-
max time kernel
150s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 11:22
Static task
static1
Behavioral task
behavioral1
Sample
e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe
Resource
win10v2004-20241007-en
General
-
Target
e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe
-
Size
161KB
-
MD5
cdf99b5e56d59aa1b1b04758729a702a
-
SHA1
0394aaba2d7fb99ad936fba3610ffd59c98638b5
-
SHA256
e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261
-
SHA512
b59fe7cce71e2f9ba2933d22cb423d0f4060d4660bbeaa8ddc0a491e3e1b359b541b78fb3fa0268586f992621a001c9bb27165d4344e690b67dbab2bd442b6cb
-
SSDEEP
3072:YduKWsRRjHRvsfdO3Q+rSBPJasYIeuvgaEkZSc5:bYjHiqrrTnWUc5
Malware Config
Extracted
F:\INC-README.txt
inc_ransom
http://incblog6qu4y4mm4zvw5nrmue6qbwtgjsxpw6b7ixzssu36tsajldoad.onion/
http://incblog7vmuq7rktic73r4ha4j757m3ptym37tyvifzp2roedyyzzxid.onion/
http://incapt.su/
https://twitter.com/hashtag/incransom?f=live
http://incpaykabjqc2mtdxq6c23nqh4x6m5dkps5fr6vgdkgzp5njssx6qkid.onion/
Extracted
C:\ProgramData\Adobe\Setup\INC-README.html
https://twitter.com/hashtag/incransom?f=live</span>
Signatures
-
INC Ransomware
INC Ransom is a ransomware that emerged in July 2023.
-
Inc_ransom family
-
Renames multiple (315) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe File opened (read-only) \??\Q: e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe File opened (read-only) \??\R: e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe File opened (read-only) \??\F: e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe File opened (read-only) \??\A: e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe File opened (read-only) \??\B: e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe File opened (read-only) \??\G: e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe File opened (read-only) \??\L: e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe File opened (read-only) \??\S: e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe File opened (read-only) \??\U: e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe File opened (read-only) \??\X: e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe File opened (read-only) \??\E: e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe File opened (read-only) \??\H: e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe File opened (read-only) \??\I: e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe File opened (read-only) \??\O: e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe File opened (read-only) \??\M: e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe File opened (read-only) \??\T: e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe File opened (read-only) \??\V: e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe File opened (read-only) \??\W: e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe File opened (read-only) \??\J: e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe File opened (read-only) \??\K: e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe File opened (read-only) \??\N: e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe File opened (read-only) \??\Y: e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe File opened (read-only) \??\Z: e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\system32\spool\PRINTERS\PP0ghtncj60hheu9riy5u40rf6.TMP printfilterpipelinesvc.exe File created C:\Windows\system32\spool\PRINTERS\00002.SPL e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe File created C:\Windows\system32\spool\PRINTERS\00003.SPL e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\background-image.jpg" e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ONENOTE.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 ONENOTE.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU ONENOTE.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 6096 ONENOTE.EXE 6096 ONENOTE.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 3996 e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe Token: SeTakeOwnershipPrivilege 3996 e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe Token: SeTakeOwnershipPrivilege 3996 e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe Token: SeTakeOwnershipPrivilege 3996 e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe Token: SeTakeOwnershipPrivilege 3996 e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe Token: SeTakeOwnershipPrivilege 3996 e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe Token: SeTakeOwnershipPrivilege 3996 e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe Token: SeTakeOwnershipPrivilege 3996 e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe Token: SeTakeOwnershipPrivilege 3996 e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe Token: SeTakeOwnershipPrivilege 3996 e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe Token: SeTakeOwnershipPrivilege 3996 e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe Token: SeTakeOwnershipPrivilege 3996 e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe Token: SeTakeOwnershipPrivilege 3996 e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe Token: SeTakeOwnershipPrivilege 3996 e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe Token: SeTakeOwnershipPrivilege 3996 e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe Token: SeTakeOwnershipPrivilege 3996 e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe Token: SeTakeOwnershipPrivilege 3996 e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe Token: SeTakeOwnershipPrivilege 3996 e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe Token: SeTakeOwnershipPrivilege 3996 e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe Token: SeTakeOwnershipPrivilege 3996 e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe Token: SeTakeOwnershipPrivilege 3996 e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe Token: SeTakeOwnershipPrivilege 3996 e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe Token: SeTakeOwnershipPrivilege 3996 e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe Token: SeTakeOwnershipPrivilege 3996 e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe Token: SeTakeOwnershipPrivilege 3996 e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe Token: SeTakeOwnershipPrivilege 3996 e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe Token: SeTakeOwnershipPrivilege 3996 e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe Token: SeTakeOwnershipPrivilege 3996 e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe Token: SeTakeOwnershipPrivilege 3996 e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe Token: SeTakeOwnershipPrivilege 3996 e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe Token: SeTakeOwnershipPrivilege 3996 e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe Token: SeTakeOwnershipPrivilege 3996 e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe Token: SeTakeOwnershipPrivilege 3996 e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe Token: SeTakeOwnershipPrivilege 3996 e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe Token: SeTakeOwnershipPrivilege 3996 e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe Token: SeTakeOwnershipPrivilege 3996 e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe Token: SeTakeOwnershipPrivilege 3996 e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe Token: SeTakeOwnershipPrivilege 3996 e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe Token: SeTakeOwnershipPrivilege 3996 e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe Token: SeTakeOwnershipPrivilege 3996 e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe Token: SeTakeOwnershipPrivilege 3996 e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe Token: SeTakeOwnershipPrivilege 3996 e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe Token: SeTakeOwnershipPrivilege 3996 e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe Token: SeTakeOwnershipPrivilege 3996 e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe Token: SeTakeOwnershipPrivilege 3996 e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe Token: SeTakeOwnershipPrivilege 3996 e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe Token: SeTakeOwnershipPrivilege 3996 e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe Token: SeTakeOwnershipPrivilege 3996 e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe Token: SeTakeOwnershipPrivilege 3996 e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe Token: SeTakeOwnershipPrivilege 3996 e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe Token: SeTakeOwnershipPrivilege 3996 e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe Token: SeTakeOwnershipPrivilege 3996 e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe Token: SeTakeOwnershipPrivilege 3996 e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe Token: SeTakeOwnershipPrivilege 3996 e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe Token: SeTakeOwnershipPrivilege 3996 e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe Token: SeTakeOwnershipPrivilege 3996 e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe Token: SeTakeOwnershipPrivilege 3996 e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe Token: SeTakeOwnershipPrivilege 3996 e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe Token: SeTakeOwnershipPrivilege 3996 e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe Token: SeTakeOwnershipPrivilege 3996 e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe Token: SeTakeOwnershipPrivilege 3996 e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe Token: SeTakeOwnershipPrivilege 3996 e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe Token: SeTakeOwnershipPrivilege 3996 e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe Token: SeTakeOwnershipPrivilege 3996 e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 6096 ONENOTE.EXE 6096 ONENOTE.EXE 6096 ONENOTE.EXE 6096 ONENOTE.EXE 6096 ONENOTE.EXE 6096 ONENOTE.EXE 6096 ONENOTE.EXE 6096 ONENOTE.EXE 6096 ONENOTE.EXE 6096 ONENOTE.EXE 6096 ONENOTE.EXE 6096 ONENOTE.EXE 6096 ONENOTE.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 4340 wrote to memory of 6096 4340 printfilterpipelinesvc.exe 93 PID 4340 wrote to memory of 6096 4340 printfilterpipelinesvc.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe"C:\Users\Admin\AppData\Local\Temp\e17c601551dfded76ab99a233957c5c4acf0229b46cd7fc2175ead7fe1e3d261.exe"1⤵
- Enumerates connected drives
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3996
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:5916
-
C:\Windows\system32\printfilterpipelinesvc.exeC:\Windows\system32\printfilterpipelinesvc.exe -Embedding1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:4340 -
C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE/insertdoc "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\{7A611B6D-7E21-4C56-BBEE-62D6ABF46465}.xps" 1337657534931000002⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:6096
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5bf1b058b589a8ffb4ac802769eff7f00
SHA1752db366b0b2c9d741d655c78ceae9dd2d2c75ca
SHA256e497fad844d6583fa9b9feb198323e737f62ac501a5ea1cd9822190d564fd91b
SHA51240ff9feca0e880b306138443fe230fedc3383201a00cb797f31464875cfbb66c75d987d2dc4f4b0705918d9e8abb92ee3667380c97d66074b41b6dc00124055b
-
Filesize
4KB
MD5b7791121b110a32595437cf16d5a3748
SHA1dc59a46ddc7386cfcba4251444e298320e3f8017
SHA256c1db2ea5861cfe2f0e4888d16820757f705043a7d6fd9254a69601d6c2d8b70c
SHA51264ca48c2bc5ffcdb8babf5e5b2c6c7fe6d6448bcd0db9844966a79dea9470ea5334e0cd1818a9bcb22302dc23a9c0a387e34a001b2b3ef88fb13986855092317
-
Filesize
4KB
MD5e4de5144aa8a82291acafe924458d6e0
SHA120f5f4e329b185dea1b76cce4d54b7667a85fba1
SHA256864578aff72026178e2a386a728c154e9473044226d5a72aefaa53709244d7ee
SHA512ea54f140875b26f8f1944d591abfbdc8988f50235409256f6a819905e620999d3b02d58d6d4758077ceb606ca761cf0dc3be528bd3007aa055e81f48c5ef8419
-
Filesize
3KB
MD561351444980e7e2ad82580c36cb1d507
SHA1f487d31ddcca56666fb4a7fc7020890425984c95
SHA2562bc7f38fcca0bcb0d21adbb627d17d4c9fa73b2382cd57e7d464636e9bce2698
SHA51226d7b58bb4d7aabba7918885caf4f90d49bf7a63e572126216c109fde9353cb915850dff595c87067f514b0ae4f1e0545cd7488705bf703a7890aa30f8c89d43