Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 11:24
Static task
static1
Behavioral task
behavioral1
Sample
02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe
Resource
win10v2004-20241007-en
General
-
Target
02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe
-
Size
161KB
-
MD5
eb215362b9c55128414c13e22eeeb806
-
SHA1
f38d574940ba7f7a5ad067ea8f6c03ea7e6c457a
-
SHA256
02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a
-
SHA512
97cf7b07986af695461638f401f94e0a58e2eaa78934766a62f8ea2a1c86a5ae941d9b6766c2515ad805db97977cd284343d3a33f0dd0d368c4e3357c1f7c74c
-
SSDEEP
3072:YduKWsRRjHRvsfdO3Q+rSBPJasYIeuvFaEkZSc5:bYjHiqrrT6WUc5
Malware Config
Extracted
C:\ProgramData\Adobe\Setup\INC-README.html
https://twitter.com/hashtag/incransom?f=live</span>
Extracted
C:\ProgramData\Adobe\Setup\INC-README.txt
inc_ransom
http://incblog6qu4y4mm4zvw5nrmue6qbwtgjsxpw6b7ixzssu36tsajldoad.onion/
http://incblog7vmuq7rktic73r4ha4j757m3ptym37tyvifzp2roedyyzzxid.onion/
http://incapt.su/
https://twitter.com/hashtag/incransom?f=live
http://incpaykabjqc2mtdxq6c23nqh4x6m5dkps5fr6vgdkgzp5njssx6qkid.onion/
Signatures
-
INC Ransomware
INC Ransom is a ransomware that emerged in July 2023.
-
Inc_ransom family
-
Renames multiple (312) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\W: 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe File opened (read-only) \??\F: 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe File opened (read-only) \??\H: 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe File opened (read-only) \??\J: 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe File opened (read-only) \??\K: 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe File opened (read-only) \??\O: 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe File opened (read-only) \??\U: 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe File opened (read-only) \??\A: 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe File opened (read-only) \??\G: 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe File opened (read-only) \??\Z: 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe File opened (read-only) \??\E: 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe File opened (read-only) \??\L: 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe File opened (read-only) \??\M: 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe File opened (read-only) \??\P: 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe File opened (read-only) \??\R: 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe File opened (read-only) \??\V: 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe File opened (read-only) \??\X: 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe File opened (read-only) \??\Y: 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe File opened (read-only) \??\B: 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe File opened (read-only) \??\I: 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe File opened (read-only) \??\N: 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe File opened (read-only) \??\Q: 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe File opened (read-only) \??\S: 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe File opened (read-only) \??\T: 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\system32\spool\PRINTERS\00003.SPL 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe File created C:\Windows\system32\spool\PRINTERS\PPytvwcb07negkj_39gv4vg1_6.TMP printfilterpipelinesvc.exe File created C:\Windows\system32\spool\PRINTERS\00002.SPL 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3756129449-3121373848-4276368241-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\background-image.jpg" 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ONENOTE.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU ONENOTE.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily ONENOTE.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 6048 ONENOTE.EXE 6048 ONENOTE.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 4040 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe Token: SeTakeOwnershipPrivilege 4040 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe Token: SeTakeOwnershipPrivilege 4040 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe Token: SeTakeOwnershipPrivilege 4040 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe Token: SeTakeOwnershipPrivilege 4040 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe Token: SeTakeOwnershipPrivilege 4040 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe Token: SeTakeOwnershipPrivilege 4040 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe Token: SeTakeOwnershipPrivilege 4040 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe Token: SeTakeOwnershipPrivilege 4040 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe Token: SeTakeOwnershipPrivilege 4040 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe Token: SeTakeOwnershipPrivilege 4040 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe Token: SeTakeOwnershipPrivilege 4040 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe Token: SeTakeOwnershipPrivilege 4040 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe Token: SeTakeOwnershipPrivilege 4040 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe Token: SeTakeOwnershipPrivilege 4040 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe Token: SeTakeOwnershipPrivilege 4040 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe Token: SeTakeOwnershipPrivilege 4040 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe Token: SeTakeOwnershipPrivilege 4040 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe Token: SeTakeOwnershipPrivilege 4040 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe Token: SeTakeOwnershipPrivilege 4040 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe Token: SeTakeOwnershipPrivilege 4040 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe Token: SeTakeOwnershipPrivilege 4040 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe Token: SeTakeOwnershipPrivilege 4040 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe Token: SeTakeOwnershipPrivilege 4040 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe Token: SeTakeOwnershipPrivilege 4040 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe Token: SeTakeOwnershipPrivilege 4040 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe Token: SeTakeOwnershipPrivilege 4040 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe Token: SeTakeOwnershipPrivilege 4040 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe Token: SeTakeOwnershipPrivilege 4040 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe Token: SeTakeOwnershipPrivilege 4040 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe Token: SeTakeOwnershipPrivilege 4040 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe Token: SeTakeOwnershipPrivilege 4040 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe Token: SeTakeOwnershipPrivilege 4040 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe Token: SeTakeOwnershipPrivilege 4040 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe Token: SeTakeOwnershipPrivilege 4040 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe Token: SeTakeOwnershipPrivilege 4040 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe Token: SeTakeOwnershipPrivilege 4040 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe Token: SeTakeOwnershipPrivilege 4040 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe Token: SeTakeOwnershipPrivilege 4040 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe Token: SeTakeOwnershipPrivilege 4040 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe Token: SeTakeOwnershipPrivilege 4040 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe Token: SeTakeOwnershipPrivilege 4040 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe Token: SeTakeOwnershipPrivilege 4040 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe Token: SeTakeOwnershipPrivilege 4040 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe Token: SeTakeOwnershipPrivilege 4040 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe Token: SeTakeOwnershipPrivilege 4040 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe Token: SeTakeOwnershipPrivilege 4040 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe Token: SeTakeOwnershipPrivilege 4040 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe Token: SeTakeOwnershipPrivilege 4040 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe Token: SeTakeOwnershipPrivilege 4040 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe Token: SeTakeOwnershipPrivilege 4040 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe Token: SeTakeOwnershipPrivilege 4040 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe Token: SeTakeOwnershipPrivilege 4040 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe Token: SeTakeOwnershipPrivilege 4040 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe Token: SeTakeOwnershipPrivilege 4040 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe Token: SeTakeOwnershipPrivilege 4040 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe Token: SeTakeOwnershipPrivilege 4040 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe Token: SeTakeOwnershipPrivilege 4040 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe Token: SeTakeOwnershipPrivilege 4040 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe Token: SeTakeOwnershipPrivilege 4040 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe Token: SeTakeOwnershipPrivilege 4040 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe Token: SeTakeOwnershipPrivilege 4040 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe Token: SeTakeOwnershipPrivilege 4040 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe Token: SeTakeOwnershipPrivilege 4040 02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 6048 ONENOTE.EXE 6048 ONENOTE.EXE 6048 ONENOTE.EXE 6048 ONENOTE.EXE 6048 ONENOTE.EXE 6048 ONENOTE.EXE 6048 ONENOTE.EXE 6048 ONENOTE.EXE 6048 ONENOTE.EXE 6048 ONENOTE.EXE 6048 ONENOTE.EXE 6048 ONENOTE.EXE 6048 ONENOTE.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 5848 wrote to memory of 6048 5848 printfilterpipelinesvc.exe 93 PID 5848 wrote to memory of 6048 5848 printfilterpipelinesvc.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe"C:\Users\Admin\AppData\Local\Temp\02f451f99b241e6ba22cc794a91129c59593bf291f265b863bc8962c55a1017a.exe"1⤵
- Enumerates connected drives
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4040
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:5684
-
C:\Windows\system32\printfilterpipelinesvc.exeC:\Windows\system32\printfilterpipelinesvc.exe -Embedding1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5848 -
C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE/insertdoc "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\{C89ED17B-D7A4-47AB-B275-51E66C052006}.xps" 1337657547213600002⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:6048
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD59988fb12d4bc19db9c2f117976cc28b2
SHA11544fdcb46b1410fe3576882308a263597716aaa
SHA256bcfaf2aa469cea42b5f585d8924c35d26e5dc46232cda46147f8889609673b10
SHA512a1c9268d8a409730943759a79aa9118b398162d25d4ed36d32608c9460cc0b6813176b8ffed619a31e2f81f95f5c0e1f2790a286b99be01585145a700f563564
-
Filesize
3KB
MD52d698b500fbc6ae73096884808dfbf27
SHA16cf32046344c2f3f3adb38a9387a9ae2a8a48b39
SHA2560ede0e234dacd43ff03ce4d2d3fb7101fb1a8ce1498abc932950d729354fd44e
SHA51235f91387c09ea59a28e7970a247585d631bd0f3bd4872693c79ab95627f49f37a5ef7ea90b47b165a279d616db24d15d2fadfb8da6887f470b322eb301751fa7
-
Filesize
64KB
MD5fcd6bcb56c1689fcef28b57c22475bad
SHA11adc95bebe9eea8c112d40cd04ab7a8d75c4f961
SHA256de2f256064a0af797747c2b97505dc0b9f3df0de4f489eac731c23ae9ca9cc31
SHA51273e4153936dab198397b74ee9efc26093dda721eaab2f8d92786891153b45b04265a161b169c988edb0db2c53124607b6eaaa816559c5ce54f3dbc9fa6a7a4b2
-
Filesize
4KB
MD51032db8a0788df5c24277c9b6e4da651
SHA1c52604ae4e78725a21e7d2be2d542797d6f06e64
SHA256404d6801932314027bdeece9b36ecdb1e0025457a0de4ab3f3d2a77b92cd1489
SHA512dd6f1dee5532b410dfc711f74260d7703e6c1914ae902dfc7fe9469adec495a4562d3e6403ae9272eef34f7947654ad2fcfe94b91a91562a4658f07f1fd15fc9
-
Filesize
4KB
MD50251b7c6dcfbc4e452089ab9fe570a4f
SHA18842fc9a8ac0bd509f4ff53dfba511a3fea6256a
SHA256884d2b502bb6b2a476a7452dd911ead63ad29c903304670050d463f2e6c91fc8
SHA512d33304c0a953346da3d766caaa502f8c3944b36462be3935f9be161e77519b0e0f3d7323ef9989d58d905e7e8b48fb43764d93bdbf99b3979c5bd0de24f69e49