Analysis
-
max time kernel
147s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 11:25
Static task
static1
Behavioral task
behavioral1
Sample
5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe
Resource
win10v2004-20241007-en
General
-
Target
5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe
-
Size
161KB
-
MD5
d1df32e403d1424daa322e21dd1e4d19
-
SHA1
6d3db4569fde0a3ee6e65828ebc7a638b22dc001
-
SHA256
5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486
-
SHA512
b758651295081b33299691bf337af4b57f6feb86796a628ac154c0ddbb9d1172c0eb4ce398618060a340e06079e28b3924c5f737be42016a82b0f6f8d4efa9cc
-
SSDEEP
3072:YduKWsRRjHRvsfdO3Q+rSBPJasYIeuvUaEkZSc5:bYjHiqrrTzWUc5
Malware Config
Extracted
F:\INC-README.txt
inc_ransom
http://incblog6qu4y4mm4zvw5nrmue6qbwtgjsxpw6b7ixzssu36tsajldoad.onion/
http://incblog7vmuq7rktic73r4ha4j757m3ptym37tyvifzp2roedyyzzxid.onion/
http://incapt.su/
https://twitter.com/hashtag/incransom?f=live
http://incpaykabjqc2mtdxq6c23nqh4x6m5dkps5fr6vgdkgzp5njssx6qkid.onion/
Extracted
C:\ProgramData\Adobe\Setup\INC-README.html
https://twitter.com/hashtag/incransom?f=live</span>
Signatures
-
INC Ransomware
INC Ransom is a ransomware that emerged in July 2023.
-
Inc_ransom family
-
Renames multiple (308) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe File opened (read-only) \??\Q: 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe File opened (read-only) \??\T: 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe File opened (read-only) \??\U: 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe File opened (read-only) \??\Y: 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe File opened (read-only) \??\I: 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe File opened (read-only) \??\E: 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe File opened (read-only) \??\G: 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe File opened (read-only) \??\K: 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe File opened (read-only) \??\P: 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe File opened (read-only) \??\W: 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe File opened (read-only) \??\X: 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe File opened (read-only) \??\A: 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe File opened (read-only) \??\B: 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe File opened (read-only) \??\H: 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe File opened (read-only) \??\J: 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe File opened (read-only) \??\M: 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe File opened (read-only) \??\N: 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe File opened (read-only) \??\O: 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe File opened (read-only) \??\V: 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe File opened (read-only) \??\F: 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe File opened (read-only) \??\Z: 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe File opened (read-only) \??\S: 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe File opened (read-only) \??\R: 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\system32\spool\PRINTERS\00002.SPL 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe File created C:\Windows\system32\spool\PRINTERS\00003.SPL 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe File created C:\Windows\system32\spool\PRINTERS\PP_01n4e1hcizrom4kpy4zvlg2c.TMP printfilterpipelinesvc.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\background-image.jpg" 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ONENOTE.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU ONENOTE.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5680 ONENOTE.EXE 5680 ONENOTE.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 3564 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3564 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3564 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3564 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3564 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3564 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3564 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3564 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3564 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3564 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3564 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3564 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3564 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3564 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3564 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3564 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3564 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3564 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3564 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3564 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3564 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3564 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3564 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3564 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3564 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3564 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3564 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3564 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3564 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3564 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3564 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3564 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3564 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3564 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3564 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3564 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3564 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3564 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3564 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3564 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3564 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3564 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3564 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3564 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3564 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3564 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3564 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3564 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3564 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3564 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3564 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3564 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3564 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3564 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3564 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3564 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3564 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3564 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3564 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3564 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3564 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3564 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3564 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3564 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 5680 ONENOTE.EXE 5680 ONENOTE.EXE 5680 ONENOTE.EXE 5680 ONENOTE.EXE 5680 ONENOTE.EXE 5680 ONENOTE.EXE 5680 ONENOTE.EXE 5680 ONENOTE.EXE 5680 ONENOTE.EXE 5680 ONENOTE.EXE 5680 ONENOTE.EXE 5680 ONENOTE.EXE 5680 ONENOTE.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 5592 wrote to memory of 5680 5592 printfilterpipelinesvc.exe 93 PID 5592 wrote to memory of 5680 5592 printfilterpipelinesvc.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe"C:\Users\Admin\AppData\Local\Temp\5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe"1⤵
- Enumerates connected drives
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3564
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:5416
-
C:\Windows\system32\printfilterpipelinesvc.exeC:\Windows\system32\printfilterpipelinesvc.exe -Embedding1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5592 -
C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE/insertdoc "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\{0F645D98-8967-4A3A-801B-61B17B4DCC91}.xps" 1337657553047700002⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5680
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5bc7b54e804ba2d052146e9f5b2999f90
SHA1720f020a595a1c238d813033241a4e2e06cb2390
SHA256bcad856842ff5fecf7e009cbab191f8b3dcedf14abf0dded801fe33160c4e31e
SHA5126b4947fec5548e31b4ebde18bacf04c085745ad80d505c4263f21b18274ddc86fcb691f2f26189dbd41202ef51a536fdde006230cc48f15e2905827600cf3e99
-
Filesize
64KB
MD504db06d1e0f4057a6766e6f6fcd2508e
SHA13a78d510153c27923717565f1b2ff689afd40d98
SHA256be494bf31e798f0f4c6f97040ee0a38f23833dfe757e63659ef170462552075a
SHA5120f8ec664a3d5c2374104384315aa9c67e57dc0f0d143ccc8f61ed48ce8d52d2983592c59b37f4de40f10d849d01759a20bfad2c4eb584d597508d1c808e83156
-
Filesize
4KB
MD5d0f826c281aa5360dd491a42bcef914f
SHA1ab4efd1d589b44cac5fb015228733900030bcc1f
SHA256bc5301fbdef834d7e2d915ee95b22740c1ae54ff3d9853e94ee7ce8dcb9a11a4
SHA512f5f1c50076bddff3eba196dcdcac33ab480b1e56a0ce8d7fb2c2a44985ddea0c22ab4801b2afd497b20361ccd32b487f0398734933d89e59cd5f00274f62f97f
-
Filesize
4KB
MD56fa14d9408b336ed88ba1d19194b254d
SHA1712e5a04c561adf09cc37f1c7cf9228b6c4f117c
SHA256e04138d4255e5c1c6f895993c7ba2afd9ab3bd4fa3dbe8275b37cbd8396b4b61
SHA512759e49dafcde276ca39353d0e7b870fa6cdfe17e77c106d04dd5ab86e93d3b50f9b976f25ffac2f6c9924d1b8b9b8b295584a3e562854fe04619097fb3eccaa3
-
Filesize
3KB
MD55a6172f2b871ef4696625d381732302e
SHA1dffc38dbd49a451f7f064d1836458280e5d5cc00
SHA256616e24f1fc0ff31ddbe26321f6dba1b665652f017a966afa3dd16d630ce1d201
SHA512d4e9ab8322371a19577d845a6540a8875232282586dbd785cf06730d2d94f57dc18cfe821e5e91fd6f86ab8d1da3f5b4ff763ce22d700de2215e9041b5a39ab4