Analysis
-
max time kernel
147s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 11:38
Static task
static1
Behavioral task
behavioral1
Sample
5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe
Resource
win10v2004-20241007-en
General
-
Target
5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe
-
Size
161KB
-
MD5
d1df32e403d1424daa322e21dd1e4d19
-
SHA1
6d3db4569fde0a3ee6e65828ebc7a638b22dc001
-
SHA256
5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486
-
SHA512
b758651295081b33299691bf337af4b57f6feb86796a628ac154c0ddbb9d1172c0eb4ce398618060a340e06079e28b3924c5f737be42016a82b0f6f8d4efa9cc
-
SSDEEP
3072:YduKWsRRjHRvsfdO3Q+rSBPJasYIeuvUaEkZSc5:bYjHiqrrTzWUc5
Malware Config
Extracted
C:\ProgramData\Adobe\INC-README.html
https://twitter.com/hashtag/incransom?f=live</span>
Extracted
C:\ProgramData\Adobe\INC-README.txt
inc_ransom
http://incblog6qu4y4mm4zvw5nrmue6qbwtgjsxpw6b7ixzssu36tsajldoad.onion/
http://incblog7vmuq7rktic73r4ha4j757m3ptym37tyvifzp2roedyyzzxid.onion/
http://incapt.su/
https://twitter.com/hashtag/incransom?f=live
http://incpaykabjqc2mtdxq6c23nqh4x6m5dkps5fr6vgdkgzp5njssx6qkid.onion/
Signatures
-
INC Ransomware
INC Ransom is a ransomware that emerged in July 2023.
-
Inc_ransom family
-
Renames multiple (292) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\K: 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe File opened (read-only) \??\N: 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe File opened (read-only) \??\P: 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe File opened (read-only) \??\R: 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe File opened (read-only) \??\U: 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe File opened (read-only) \??\X: 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe File opened (read-only) \??\F: 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe File opened (read-only) \??\A: 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe File opened (read-only) \??\H: 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe File opened (read-only) \??\I: 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe File opened (read-only) \??\L: 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe File opened (read-only) \??\M: 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe File opened (read-only) \??\O: 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe File opened (read-only) \??\Y: 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe File opened (read-only) \??\V: 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe File opened (read-only) \??\Z: 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe File opened (read-only) \??\B: 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe File opened (read-only) \??\E: 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe File opened (read-only) \??\G: 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe File opened (read-only) \??\J: 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe File opened (read-only) \??\Q: 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe File opened (read-only) \??\S: 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe File opened (read-only) \??\T: 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe File opened (read-only) \??\W: 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe -
Drops file in System32 directory 16 IoCs
description ioc Process File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSStmp.log svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSSres00001.jrs svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSSres00002.jrs svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.jfm svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.dat svchost.exe File created C:\Windows\system32\spool\PRINTERS\00002.SPL 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe File created C:\Windows\system32\spool\PRINTERS\00004.SPL 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.log svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.dat svchost.exe File created C:\Windows\system32\spool\PRINTERS\00003.SPL 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.chk svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.jcp svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.jtx svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.chk svchost.exe File created C:\Windows\system32\spool\PRINTERS\PPhj3ujzm7tmli5p0j3gehi86td.TMP printfilterpipelinesvc.exe File created C:\Windows\system32\spool\PRINTERS\PPo6mwm8xp5jwq_bpid_un2xj8c.TMP printfilterpipelinesvc.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\background-image.jpg" 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ONENOTE.EXE -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU ONENOTE.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS onenoteim.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName onenoteim.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer onenoteim.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily ONENOTE.EXE -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\MuiCache onenoteim.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.office.onenote_8wekyb3d8bbwe\Internet Settings\Cache onenoteim.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.office.onenote_8wekyb3d8bbwe\Internet Settings onenoteim.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.office.onenote_8wekyb3d8bbwe\Internet Settings\Cache\Extensible Cache onenoteim.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5932 ONENOTE.EXE 5932 ONENOTE.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 3256 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3256 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3256 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3256 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3256 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3256 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3256 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3256 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3256 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3256 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3256 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3256 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3256 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3256 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3256 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3256 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3256 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3256 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3256 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3256 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3256 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3256 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3256 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3256 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3256 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3256 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3256 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3256 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3256 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3256 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3256 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3256 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3256 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3256 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3256 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3256 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3256 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3256 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3256 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3256 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3256 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3256 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3256 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3256 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3256 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3256 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3256 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3256 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3256 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3256 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3256 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3256 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3256 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3256 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3256 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3256 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3256 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3256 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3256 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3256 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3256 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3256 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3256 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 3256 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 5932 ONENOTE.EXE 5932 ONENOTE.EXE 5932 ONENOTE.EXE 5932 ONENOTE.EXE 5932 ONENOTE.EXE 5932 ONENOTE.EXE 5932 ONENOTE.EXE 5932 ONENOTE.EXE 5932 ONENOTE.EXE 5932 ONENOTE.EXE 3648 onenoteim.exe 5932 ONENOTE.EXE 5932 ONENOTE.EXE 5932 ONENOTE.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 5692 wrote to memory of 5932 5692 printfilterpipelinesvc.exe 99 PID 5692 wrote to memory of 5932 5692 printfilterpipelinesvc.exe 99
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe"C:\Users\Admin\AppData\Local\Temp\5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe"1⤵
- Enumerates connected drives
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3256
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:5564
-
C:\Windows\system32\printfilterpipelinesvc.exeC:\Windows\system32\printfilterpipelinesvc.exe -Embedding1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5692 -
C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE/insertdoc "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\{E57210D0-D6E7-446C-89C3-987060EC45B3}.xps" 1337657630717200002⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5932
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s DsSvc1⤵
- Drops file in System32 directory
PID:6068
-
C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\onenoteim.exe"C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\onenoteim.exe" -ServerName:microsoft.onenoteim.AppXxqb9ypsz6cs1w07e1pmjy4ww4dy9tpqr.mca1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:3648
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5bc7b54e804ba2d052146e9f5b2999f90
SHA1720f020a595a1c238d813033241a4e2e06cb2390
SHA256bcad856842ff5fecf7e009cbab191f8b3dcedf14abf0dded801fe33160c4e31e
SHA5126b4947fec5548e31b4ebde18bacf04c085745ad80d505c4263f21b18274ddc86fcb691f2f26189dbd41202ef51a536fdde006230cc48f15e2905827600cf3e99
-
Filesize
3KB
MD55a6172f2b871ef4696625d381732302e
SHA1dffc38dbd49a451f7f064d1836458280e5d5cc00
SHA256616e24f1fc0ff31ddbe26321f6dba1b665652f017a966afa3dd16d630ce1d201
SHA512d4e9ab8322371a19577d845a6540a8875232282586dbd785cf06730d2d94f57dc18cfe821e5e91fd6f86ab8d1da3f5b4ff763ce22d700de2215e9041b5a39ab4
-
Filesize
64KB
MD5fcd6bcb56c1689fcef28b57c22475bad
SHA11adc95bebe9eea8c112d40cd04ab7a8d75c4f961
SHA256de2f256064a0af797747c2b97505dc0b9f3df0de4f489eac731c23ae9ca9cc31
SHA51273e4153936dab198397b74ee9efc26093dda721eaab2f8d92786891153b45b04265a161b169c988edb0db2c53124607b6eaaa816559c5ce54f3dbc9fa6a7a4b2
-
Filesize
4KB
MD5881860f9690dafd7e543fab6b1b8e77c
SHA16282a33671e4c5b2fd3d5bfa85adb061f4f8de84
SHA256ebfce6773de10332ef421f36107f8cf979e6ed76990b68fbe4c7ccd4fafa6fe1
SHA5127bf86f3a3f98cccda7bd7cf20314a295d13b70f6177d8fb52ea35a19f62cf211ec1a39f6bf16c93c95574f71bf2b74ec349ddfcbbfebe551a629ccc9fe00fcee
-
Filesize
4KB
MD50333a0dee89dcf75a7eb308efce86811
SHA15980cb7755e40755a79e45f3183d2662b330c09b
SHA2561a53a39b32e0944f74a1b96c3a0299438f15ff3ac4a070ca8c9d980ee512b539
SHA512f10390294afe400cbf8fa0b902d695c4198667edd0aa8b9b90d9b6e69e24b15686c43cf636cbc88f36e5bcaf6bc8bb92e5ef32b539941c10e69378a831f52b34