Analysis
-
max time kernel
149s -
max time network
153s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 11:26
Static task
static1
Behavioral task
behavioral1
Sample
36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe
Resource
win10v2004-20241007-en
General
-
Target
36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe
-
Size
161KB
-
MD5
485573e162551f66f776923126e5b5ff
-
SHA1
c1f4507c3f8eb24279e0b47a1523500e62cb0764
-
SHA256
36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e
-
SHA512
b26706dd0fc92019f85b287fb778d34d163fbcda987477f9a3635863e4ff7bd412782fac961ea03616a7687a08deaeec23e26c3ff6a97deacd460030c7700de3
-
SSDEEP
3072:+dBK6dRsjHRvsGWO3G+gSB9ssYIeuV0lbGkZSQ5:2ajHOuVg9w0R5UQ5
Malware Config
Extracted
F:\INC-README.txt
inc_ransom
http://incblog7vmuq7rktic73r4ha4j757m3ptym37tyvifzp2roedyyzzxid.onion/
http://incapt.su/
https://twitter.com/hashtag/incransom?f=live
http://incpaysp74dphcbjyvg2eepxnl3tkgt5mq5vd4tnjusoissz342bdnad.onion/
Extracted
C:\ProgramData\Adobe\Setup\INC-README.html
https://twitter.com/hashtag/incransom?f=live</span>
Signatures
-
INC Ransomware
INC Ransom is a ransomware that emerged in July 2023.
-
Inc_ransom family
-
Renames multiple (338) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\F: 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe File opened (read-only) \??\G: 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe File opened (read-only) \??\H: 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe File opened (read-only) \??\O: 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe File opened (read-only) \??\R: 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe File opened (read-only) \??\S: 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe File opened (read-only) \??\X: 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe File opened (read-only) \??\Z: 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe File opened (read-only) \??\B: 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe File opened (read-only) \??\I: 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe File opened (read-only) \??\K: 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe File opened (read-only) \??\M: 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe File opened (read-only) \??\Q: 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe File opened (read-only) \??\W: 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe File opened (read-only) \??\Y: 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe File opened (read-only) \??\J: 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe File opened (read-only) \??\L: 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe File opened (read-only) \??\N: 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe File opened (read-only) \??\P: 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe File opened (read-only) \??\T: 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe File opened (read-only) \??\U: 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe File opened (read-only) \??\V: 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe File opened (read-only) \??\A: 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe File opened (read-only) \??\E: 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\system32\spool\PRINTERS\00003.SPL 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe File created C:\Windows\system32\spool\PRINTERS\PP7ew96yr3cxt2o172kfk4roe4d.TMP printfilterpipelinesvc.exe File created C:\Windows\system32\spool\PRINTERS\00002.SPL 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\background-image.jpg" 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ONENOTE.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU ONENOTE.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5276 ONENOTE.EXE 5276 ONENOTE.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 4280 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 4280 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 4280 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 4280 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 4280 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 4280 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 4280 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 4280 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 4280 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 4280 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 4280 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 4280 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 4280 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 4280 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 4280 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 4280 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 4280 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 4280 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 4280 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 4280 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 4280 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 4280 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 4280 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 4280 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 4280 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 4280 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 4280 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 4280 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 4280 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 4280 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 4280 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 4280 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 4280 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 4280 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 4280 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 4280 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 4280 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 4280 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 4280 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 4280 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 4280 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 4280 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 4280 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 4280 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 4280 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 4280 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 4280 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 4280 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 4280 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 4280 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 4280 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 4280 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 4280 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 4280 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 4280 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 4280 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 4280 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 4280 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 4280 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 4280 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 4280 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 4280 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 4280 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 4280 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 5276 ONENOTE.EXE 5276 ONENOTE.EXE 5276 ONENOTE.EXE 5276 ONENOTE.EXE 5276 ONENOTE.EXE 5276 ONENOTE.EXE 5276 ONENOTE.EXE 5276 ONENOTE.EXE 5276 ONENOTE.EXE 5276 ONENOTE.EXE 5276 ONENOTE.EXE 5276 ONENOTE.EXE 5276 ONENOTE.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 6024 wrote to memory of 5276 6024 printfilterpipelinesvc.exe 102 PID 6024 wrote to memory of 5276 6024 printfilterpipelinesvc.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe"C:\Users\Admin\AppData\Local\Temp\36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe"1⤵
- Enumerates connected drives
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4280
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:5816
-
C:\Windows\system32\printfilterpipelinesvc.exeC:\Windows\system32\printfilterpipelinesvc.exe -Embedding1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:6024 -
C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE/insertdoc "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\{7EF128B9-6440-4B4D-8E3D-38029CC0B69B}.xps" 1337657558652300002⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5276
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5293b6073872df4f3492c483cece06514
SHA1d48f6bcf0d6f47ade74b5e16e103f6f6decf3a18
SHA256e2300a37a0b2a0d9d93806d14539b074bd77d85d3777dedd33c4f15f8356d4e9
SHA512965e318ff415b43ae0a73dcfbe9d5b853a7fb308712e111b261d3e6284f391f9428a5c43e1eba42be7565b7f35a8f1dbe16041bc6f4e4809f085fa76af89deba
-
Filesize
4KB
MD569ed4857e1bf51075eefafcafca4ef5c
SHA12a55ce53d54b4c122ee88895b3093846a65e22b3
SHA256a1dd62b6a4d7eab2419b7799924bfee3b3318977c8c12df482ef358f5ce1d08e
SHA512f8dd6c6456a5dc9ef543bdbd5638e2fe5ab7a20411a7c40be81caf158936636f76c3aded677ba0fd69db4d416249b73b907d499a4e4ad81b10fec5a836341dbf
-
Filesize
4KB
MD56ec58ce725832c2776b789b15c4b838e
SHA13a8dd45be32c6a268cd061c5e861ba80801a8ff6
SHA256b9e1b0ea9f833c6747d92c3b9a895bc8e558e4086ccbf02fcb446ae558cc8eed
SHA512a27c3655768d16ea40beca99d3d51f1ce04e7cc92aaee877e9b35c89fa749df926f67ced6f2bc392688b586c36802e97129428d933c04af633317b803b2a9d72
-
Filesize
3KB
MD5d8c35d7979b3f670ca9d154168cf9181
SHA18b8575a4993a5e2805ee0691a046d2cc675c0f77
SHA256bb3e30c1aab5af9e400f290f26eded5d91757a347b4587f4f5f617ee6d8d9c90
SHA5127bd407b16960ffe6cc73cef3bc1d3a82667b030a4208a35c2320aa6194053a1a78488e27554e223435b3cca69e3aa75aa9d4c58123d85f5add4c449483539b0e