Analysis
-
max time kernel
148s -
max time network
148s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 15:39
Static task
static1
Behavioral task
behavioral1
Sample
win.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
win.exe
Resource
win10v2004-20241007-en
General
-
Target
win.exe
-
Size
161KB
-
MD5
d18ef5a6c2bd443864132e5c7feb0c2f
-
SHA1
4a34764809f4a95d87e98abb834721be41060a6b
-
SHA256
02472036db9ec498ae565b344f099263f3218ecb785282150e8565d5cac92461
-
SHA512
dd1b3cee1145ef4332ef8c217f3d4cb3b7e74ac7a3033a467b6553e00a918940ff6c4db4c61ebd2686bc0d2424e9f2b0a207937e9b0a5b642c26a13e6a056dec
-
SSDEEP
3072:YduKWsRRjHRvsfdO3Q+rSBPJasYIeuvGaEkZSc5:bYjHiqrrT1WUc5
Malware Config
Extracted
F:\INC-README.txt
inc_ransom
http://incblog6qu4y4mm4zvw5nrmue6qbwtgjsxpw6b7ixzssu36tsajldoad.onion/
http://incblog7vmuq7rktic73r4ha4j757m3ptym37tyvifzp2roedyyzzxid.onion/
http://incapt.su/
https://twitter.com/hashtag/incransom?f=live
http://incpaykabjqc2mtdxq6c23nqh4x6m5dkps5fr6vgdkgzp5njssx6qkid.onion/
Extracted
C:\ProgramData\Adobe\Setup\INC-README.html
https://twitter.com/hashtag/incransom?f=live</span>
Signatures
-
INC Ransomware
INC Ransom is a ransomware that emerged in July 2023.
-
Inc_ransom family
-
Renames multiple (292) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: win.exe File opened (read-only) \??\G: win.exe File opened (read-only) \??\H: win.exe File opened (read-only) \??\J: win.exe File opened (read-only) \??\K: win.exe File opened (read-only) \??\M: win.exe File opened (read-only) \??\S: win.exe File opened (read-only) \??\A: win.exe File opened (read-only) \??\W: win.exe File opened (read-only) \??\Q: win.exe File opened (read-only) \??\V: win.exe File opened (read-only) \??\X: win.exe File opened (read-only) \??\L: win.exe File opened (read-only) \??\B: win.exe File opened (read-only) \??\R: win.exe File opened (read-only) \??\T: win.exe File opened (read-only) \??\Y: win.exe File opened (read-only) \??\F: win.exe File opened (read-only) \??\N: win.exe File opened (read-only) \??\O: win.exe File opened (read-only) \??\P: win.exe File opened (read-only) \??\U: win.exe File opened (read-only) \??\Z: win.exe File opened (read-only) \??\I: win.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\system32\spool\PRINTERS\00002.SPL win.exe File created C:\Windows\system32\spool\PRINTERS\00003.SPL win.exe File created C:\Windows\system32\spool\PRINTERS\PPptebvvitg53u4w10xoi8wskrc.TMP printfilterpipelinesvc.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\background-image.jpg" win.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language win.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ONENOTE.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU ONENOTE.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5792 ONENOTE.EXE 5792 ONENOTE.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 4504 win.exe Token: SeTakeOwnershipPrivilege 4504 win.exe Token: SeTakeOwnershipPrivilege 4504 win.exe Token: SeTakeOwnershipPrivilege 4504 win.exe Token: SeTakeOwnershipPrivilege 4504 win.exe Token: SeTakeOwnershipPrivilege 4504 win.exe Token: SeTakeOwnershipPrivilege 4504 win.exe Token: SeTakeOwnershipPrivilege 4504 win.exe Token: SeTakeOwnershipPrivilege 4504 win.exe Token: SeTakeOwnershipPrivilege 4504 win.exe Token: SeTakeOwnershipPrivilege 4504 win.exe Token: SeTakeOwnershipPrivilege 4504 win.exe Token: SeTakeOwnershipPrivilege 4504 win.exe Token: SeTakeOwnershipPrivilege 4504 win.exe Token: SeTakeOwnershipPrivilege 4504 win.exe Token: SeTakeOwnershipPrivilege 4504 win.exe Token: SeTakeOwnershipPrivilege 4504 win.exe Token: SeTakeOwnershipPrivilege 4504 win.exe Token: SeTakeOwnershipPrivilege 4504 win.exe Token: SeTakeOwnershipPrivilege 4504 win.exe Token: SeTakeOwnershipPrivilege 4504 win.exe Token: SeTakeOwnershipPrivilege 4504 win.exe Token: SeTakeOwnershipPrivilege 4504 win.exe Token: SeTakeOwnershipPrivilege 4504 win.exe Token: SeTakeOwnershipPrivilege 4504 win.exe Token: SeTakeOwnershipPrivilege 4504 win.exe Token: SeTakeOwnershipPrivilege 4504 win.exe Token: SeTakeOwnershipPrivilege 4504 win.exe Token: SeTakeOwnershipPrivilege 4504 win.exe Token: SeTakeOwnershipPrivilege 4504 win.exe Token: SeTakeOwnershipPrivilege 4504 win.exe Token: SeTakeOwnershipPrivilege 4504 win.exe Token: SeTakeOwnershipPrivilege 4504 win.exe Token: SeTakeOwnershipPrivilege 4504 win.exe Token: SeTakeOwnershipPrivilege 4504 win.exe Token: SeTakeOwnershipPrivilege 4504 win.exe Token: SeTakeOwnershipPrivilege 4504 win.exe Token: SeTakeOwnershipPrivilege 4504 win.exe Token: SeTakeOwnershipPrivilege 4504 win.exe Token: SeTakeOwnershipPrivilege 4504 win.exe Token: SeTakeOwnershipPrivilege 4504 win.exe Token: SeTakeOwnershipPrivilege 4504 win.exe Token: SeTakeOwnershipPrivilege 4504 win.exe Token: SeTakeOwnershipPrivilege 4504 win.exe Token: SeTakeOwnershipPrivilege 4504 win.exe Token: SeTakeOwnershipPrivilege 4504 win.exe Token: SeTakeOwnershipPrivilege 4504 win.exe Token: SeTakeOwnershipPrivilege 4504 win.exe Token: SeTakeOwnershipPrivilege 4504 win.exe Token: SeTakeOwnershipPrivilege 4504 win.exe Token: SeTakeOwnershipPrivilege 4504 win.exe Token: SeTakeOwnershipPrivilege 4504 win.exe Token: SeTakeOwnershipPrivilege 4504 win.exe Token: SeTakeOwnershipPrivilege 4504 win.exe Token: SeTakeOwnershipPrivilege 4504 win.exe Token: SeTakeOwnershipPrivilege 4504 win.exe Token: SeTakeOwnershipPrivilege 4504 win.exe Token: SeTakeOwnershipPrivilege 4504 win.exe Token: SeTakeOwnershipPrivilege 4504 win.exe Token: SeTakeOwnershipPrivilege 4504 win.exe Token: SeTakeOwnershipPrivilege 4504 win.exe Token: SeTakeOwnershipPrivilege 4504 win.exe Token: SeTakeOwnershipPrivilege 4504 win.exe Token: SeTakeOwnershipPrivilege 4504 win.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 5792 ONENOTE.EXE 5792 ONENOTE.EXE 5792 ONENOTE.EXE 5792 ONENOTE.EXE 5792 ONENOTE.EXE 5792 ONENOTE.EXE 5792 ONENOTE.EXE 5792 ONENOTE.EXE 5792 ONENOTE.EXE 5792 ONENOTE.EXE 5792 ONENOTE.EXE 5792 ONENOTE.EXE 5792 ONENOTE.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 5448 wrote to memory of 5792 5448 printfilterpipelinesvc.exe 93 PID 5448 wrote to memory of 5792 5448 printfilterpipelinesvc.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\win.exe"C:\Users\Admin\AppData\Local\Temp\win.exe"1⤵
- Enumerates connected drives
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4504
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:5500
-
C:\Windows\system32\printfilterpipelinesvc.exeC:\Windows\system32\printfilterpipelinesvc.exe -Embedding1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5448 -
C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE/insertdoc "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\{39A4DB3A-31A2-42A1-A72F-890F8E77D87D}.xps" 1337659076226600002⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5792
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5fe75098393bf7204cb97b2efdc2b3125
SHA1dd77bc4c4cf68ed563eb2c9858aecd5a6b7361e9
SHA256cbae2cba2f77cddee022999f1b1c7932999eb8695201aa8c6655d2752af89aae
SHA512cee45654469f9c375f408ebfa68162fded19ef7254da57f0970da6e4c3cc771dfa89fdb28a4d26a98b7823810459761aeb0dbf0811bee0860f3404d3e23f61a9
-
Filesize
4KB
MD5d21b86b77899cc27665a64b85ddd8999
SHA165ddcd67b50eb8cb51b740d5c144645f6ba8f19b
SHA256976ac8bc541f23e475ec0cf8c8663971f9cfb0cc34a7111b170595cab722a135
SHA512b72d7602d35a954ac7293cbbf0cc6672850113590144dbe30b5cecfa78e5fa3f7cfdff0fda3f40744a937dccd78a2ee81f1c776d4e4f599cb8d26e00ab23c8b6
-
Filesize
3KB
MD58cd444fe4738cd48735de6d254de4080
SHA101ee9698aca64c48ececaaf843783ab1fe756ccc
SHA256b0a13a45d517990ebf23ce1f8b947abe96da6a643274df8c8a038c7b95c624ec
SHA51236de1a2aabb67bb5631f16ddc4a1e6dc8d59897139874228520dac56ad24a1be6be35a80da2fd4d4720069a2883658be31138ee3cd83b39f6129c921778c3d4f