Analysis
-
max time kernel
147s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 11:25
Static task
static1
Behavioral task
behavioral1
Sample
7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe
Resource
win10v2004-20241007-en
General
-
Target
7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe
-
Size
161KB
-
MD5
e402c9df4aab1d1cff83ec8ba11a4bc7
-
SHA1
9b7e46195d23b5efcd9f176c278e7a873138f6f5
-
SHA256
7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51
-
SHA512
86f0ecb80a8655f9e4d297ae0eb04644a61b2de210d0ceccd2dbf2498ce68e603f3e659621175785f533ac66d798cf6d947669cc5302c32898999f1241a42295
-
SSDEEP
3072:YduKWsRRjHRvsfdO3Q+rSBPJasYIeuvnaEkZSc5:bYjHiqrrTwWUc5
Malware Config
Extracted
C:\ProgramData\Adobe\INC-README.txt
inc_ransom
http://incblog6qu4y4mm4zvw5nrmue6qbwtgjsxpw6b7ixzssu36tsajldoad.onion/
http://incblog7vmuq7rktic73r4ha4j757m3ptym37tyvifzp2roedyyzzxid.onion/
http://incapt.su/
https://twitter.com/hashtag/incransom?f=live
http://incpaykabjqc2mtdxq6c23nqh4x6m5dkps5fr6vgdkgzp5njssx6qkid.onion/
Extracted
C:\ProgramData\Adobe\INC-README.html
https://twitter.com/hashtag/incransom?f=live</span>
Signatures
-
INC Ransomware
INC Ransom is a ransomware that emerged in July 2023.
-
Inc_ransom family
-
Renames multiple (291) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\N: 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe File opened (read-only) \??\O: 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe File opened (read-only) \??\Y: 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe File opened (read-only) \??\B: 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe File opened (read-only) \??\E: 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe File opened (read-only) \??\K: 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe File opened (read-only) \??\M: 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe File opened (read-only) \??\X: 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe File opened (read-only) \??\F: 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe File opened (read-only) \??\I: 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe File opened (read-only) \??\Q: 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe File opened (read-only) \??\V: 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe File opened (read-only) \??\Z: 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe File opened (read-only) \??\A: 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe File opened (read-only) \??\H: 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe File opened (read-only) \??\S: 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe File opened (read-only) \??\T: 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe File opened (read-only) \??\R: 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe File opened (read-only) \??\U: 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe File opened (read-only) \??\W: 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe File opened (read-only) \??\G: 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe File opened (read-only) \??\J: 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe File opened (read-only) \??\L: 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe File opened (read-only) \??\P: 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\system32\spool\PRINTERS\00002.SPL 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe File created C:\Windows\system32\spool\PRINTERS\00003.SPL 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe File created C:\Windows\system32\spool\PRINTERS\PPablkh0bk_q6vkyn05tzllhbce.TMP printfilterpipelinesvc.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\background-image.jpg" 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ONENOTE.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU ONENOTE.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5600 ONENOTE.EXE 5600 ONENOTE.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 5088 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe Token: SeTakeOwnershipPrivilege 5088 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe Token: SeTakeOwnershipPrivilege 5088 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe Token: SeTakeOwnershipPrivilege 5088 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe Token: SeTakeOwnershipPrivilege 5088 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe Token: SeTakeOwnershipPrivilege 5088 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe Token: SeTakeOwnershipPrivilege 5088 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe Token: SeTakeOwnershipPrivilege 5088 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe Token: SeTakeOwnershipPrivilege 5088 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe Token: SeTakeOwnershipPrivilege 5088 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe Token: SeTakeOwnershipPrivilege 5088 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe Token: SeTakeOwnershipPrivilege 5088 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe Token: SeTakeOwnershipPrivilege 5088 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe Token: SeTakeOwnershipPrivilege 5088 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe Token: SeTakeOwnershipPrivilege 5088 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe Token: SeTakeOwnershipPrivilege 5088 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe Token: SeTakeOwnershipPrivilege 5088 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe Token: SeTakeOwnershipPrivilege 5088 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe Token: SeTakeOwnershipPrivilege 5088 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe Token: SeTakeOwnershipPrivilege 5088 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe Token: SeTakeOwnershipPrivilege 5088 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe Token: SeTakeOwnershipPrivilege 5088 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe Token: SeTakeOwnershipPrivilege 5088 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe Token: SeTakeOwnershipPrivilege 5088 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe Token: SeTakeOwnershipPrivilege 5088 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe Token: SeTakeOwnershipPrivilege 5088 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe Token: SeTakeOwnershipPrivilege 5088 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe Token: SeTakeOwnershipPrivilege 5088 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe Token: SeTakeOwnershipPrivilege 5088 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe Token: SeTakeOwnershipPrivilege 5088 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe Token: SeTakeOwnershipPrivilege 5088 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe Token: SeTakeOwnershipPrivilege 5088 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe Token: SeTakeOwnershipPrivilege 5088 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe Token: SeTakeOwnershipPrivilege 5088 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe Token: SeTakeOwnershipPrivilege 5088 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe Token: SeTakeOwnershipPrivilege 5088 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe Token: SeTakeOwnershipPrivilege 5088 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe Token: SeTakeOwnershipPrivilege 5088 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe Token: SeTakeOwnershipPrivilege 5088 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe Token: SeTakeOwnershipPrivilege 5088 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe Token: SeTakeOwnershipPrivilege 5088 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe Token: SeTakeOwnershipPrivilege 5088 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe Token: SeTakeOwnershipPrivilege 5088 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe Token: SeTakeOwnershipPrivilege 5088 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe Token: SeTakeOwnershipPrivilege 5088 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe Token: SeTakeOwnershipPrivilege 5088 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe Token: SeTakeOwnershipPrivilege 5088 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe Token: SeTakeOwnershipPrivilege 5088 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe Token: SeTakeOwnershipPrivilege 5088 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe Token: SeTakeOwnershipPrivilege 5088 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe Token: SeTakeOwnershipPrivilege 5088 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe Token: SeTakeOwnershipPrivilege 5088 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe Token: SeTakeOwnershipPrivilege 5088 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe Token: SeTakeOwnershipPrivilege 5088 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe Token: SeTakeOwnershipPrivilege 5088 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe Token: SeTakeOwnershipPrivilege 5088 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe Token: SeTakeOwnershipPrivilege 5088 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe Token: SeTakeOwnershipPrivilege 5088 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe Token: SeTakeOwnershipPrivilege 5088 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe Token: SeTakeOwnershipPrivilege 5088 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe Token: SeTakeOwnershipPrivilege 5088 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe Token: SeTakeOwnershipPrivilege 5088 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe Token: SeTakeOwnershipPrivilege 5088 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe Token: SeTakeOwnershipPrivilege 5088 7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 5600 ONENOTE.EXE 5600 ONENOTE.EXE 5600 ONENOTE.EXE 5600 ONENOTE.EXE 5600 ONENOTE.EXE 5600 ONENOTE.EXE 5600 ONENOTE.EXE 5600 ONENOTE.EXE 5600 ONENOTE.EXE 5600 ONENOTE.EXE 5600 ONENOTE.EXE 5600 ONENOTE.EXE 5600 ONENOTE.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 5464 wrote to memory of 5600 5464 printfilterpipelinesvc.exe 100 PID 5464 wrote to memory of 5600 5464 printfilterpipelinesvc.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe"C:\Users\Admin\AppData\Local\Temp\7f104a3dfda3a7fbdd9b910d00b0169328c5d2facc10dc17b4378612ffa82d51.exe"1⤵
- Enumerates connected drives
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5088
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:5324
-
C:\Windows\system32\printfilterpipelinesvc.exeC:\Windows\system32\printfilterpipelinesvc.exe -Embedding1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5464 -
C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE/insertdoc "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\{1AEEF062-383E-4965-93D3-37FA009F99C0}.xps" 1337657555419300002⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5600
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD54096dbdbbff573fdf472e3c6d70c1daf
SHA1e70f1260b7e1b8eca895cb96ba7410061f94c92c
SHA2564d256d894148797dd3f60f1f73cdc08a25b61e93735e86ffab23ed3c3e151263
SHA512e76bd7be11d6f5085f48052df10591b3ccc49521360acdde0c46f10f3affffeebdbfb98af6021f34eb55457c841face34302511d9604c69c75f865ed620f7285
-
Filesize
3KB
MD5622ffd191512c6f11b45ee104564af47
SHA13b69fd2d7eca66b77dce132c6aa87088434f1024
SHA256d7dd8f79b36aedfe2d0be9f6e95d094d7e71aaba33c09ee914df8b438fc080d2
SHA5122bc5d84d1fe5585407bb3d55643364aaf670737813d182e63a880454a4806dcc01ba70c994a6cc40c5fb50f8d4ab29775d5302b954e50893bdfa452208f0996d
-
Filesize
4KB
MD58d58c926d05810649b7c82f30eb96eea
SHA167d0a062bfef4a2e0b11b96fc12c260ba5b0036c
SHA2562f7cc97e10fcd0463e80597f53350439fded929155d3665d6d42fd4c37736354
SHA512e4981c9d62b8e6bff5135b1c7797924a35b86037a2b0229e033a5e4a7c091f29266fdf70caf1c3d9171c2b2665b908bc39850c9dc52e3ad01299fcba69eaf5be
-
Filesize
4KB
MD5605afd51f12be5528039b7085c686d1b
SHA1dac02a05002601b79a891777ee4bb6e3ae0a79ce
SHA25629859fce021c9164e58f667adc62540a7e805af48921f240c2ff0b867e07bb15
SHA512c16bb5df574efaba2a5e77230484c0af2469b6fb2ca64bd5b379b13469ff69bfd11cc88e9d7ec13a84bd0e6e0915c24b09510d0da94d916b311b48ed783cd172