Analysis
-
max time kernel
149s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
20-11-2024 15:42
Static task
static1
Behavioral task
behavioral1
Sample
windows.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
windows.exe
Resource
win10v2004-20241007-en
General
-
Target
windows.exe
-
Size
161KB
-
MD5
211ea6dcca8b67e44d4e792f7f6a85b6
-
SHA1
ecbed7faec4a4af6d2289fbeca682a45444a84d4
-
SHA256
834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039
-
SHA512
b074b161dff97a3d55c635cbff36f0e88c4098d2392db4aa7860af94437bc5823bd1f60e1f6cc858c6306fba7f59ba14864c9ce0629618b613f36de1b0ba181b
-
SSDEEP
3072:YduKWsRRjHRvsfdO3Q+rSBPJasYIeuvYaEkZSc5:bYjHiqrrTvWUc5
Malware Config
Extracted
F:\INC-README.html
https://twitter.com/hashtag/incransom?f=live</span>
Extracted
F:\INC-README.txt
inc_ransom
http://incblog6qu4y4mm4zvw5nrmue6qbwtgjsxpw6b7ixzssu36tsajldoad.onion/
http://incblog7vmuq7rktic73r4ha4j757m3ptym37tyvifzp2roedyyzzxid.onion/
http://incapt.su/
https://twitter.com/hashtag/incransom?f=live
http://incpaykabjqc2mtdxq6c23nqh4x6m5dkps5fr6vgdkgzp5njssx6qkid.onion/
Signatures
-
INC Ransomware
INC Ransom is a ransomware that emerged in July 2023.
-
Inc_ransom family
-
Renames multiple (296) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: windows.exe File opened (read-only) \??\E: windows.exe File opened (read-only) \??\J: windows.exe File opened (read-only) \??\S: windows.exe File opened (read-only) \??\T: windows.exe File opened (read-only) \??\W: windows.exe File opened (read-only) \??\X: windows.exe File opened (read-only) \??\F: windows.exe File opened (read-only) \??\H: windows.exe File opened (read-only) \??\L: windows.exe File opened (read-only) \??\N: windows.exe File opened (read-only) \??\O: windows.exe File opened (read-only) \??\Q: windows.exe File opened (read-only) \??\U: windows.exe File opened (read-only) \??\V: windows.exe File opened (read-only) \??\Z: windows.exe File opened (read-only) \??\A: windows.exe File opened (read-only) \??\I: windows.exe File opened (read-only) \??\M: windows.exe File opened (read-only) \??\P: windows.exe File opened (read-only) \??\R: windows.exe File opened (read-only) \??\Y: windows.exe File opened (read-only) \??\G: windows.exe File opened (read-only) \??\K: windows.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\system32\spool\PRINTERS\00002.SPL windows.exe File created C:\Windows\system32\spool\PRINTERS\00003.SPL windows.exe File created C:\Windows\system32\spool\PRINTERS\PPozhc79ohyhkccdg5j54i8gi0.TMP printfilterpipelinesvc.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2878641211-696417878-3864914810-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\background-image.jpg" windows.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ONENOTE.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU ONENOTE.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5840 ONENOTE.EXE 5840 ONENOTE.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2276 windows.exe Token: SeTakeOwnershipPrivilege 2276 windows.exe Token: SeTakeOwnershipPrivilege 2276 windows.exe Token: SeTakeOwnershipPrivilege 2276 windows.exe Token: SeTakeOwnershipPrivilege 2276 windows.exe Token: SeTakeOwnershipPrivilege 2276 windows.exe Token: SeTakeOwnershipPrivilege 2276 windows.exe Token: SeTakeOwnershipPrivilege 2276 windows.exe Token: SeTakeOwnershipPrivilege 2276 windows.exe Token: SeTakeOwnershipPrivilege 2276 windows.exe Token: SeTakeOwnershipPrivilege 2276 windows.exe Token: SeTakeOwnershipPrivilege 2276 windows.exe Token: SeTakeOwnershipPrivilege 2276 windows.exe Token: SeTakeOwnershipPrivilege 2276 windows.exe Token: SeTakeOwnershipPrivilege 2276 windows.exe Token: SeTakeOwnershipPrivilege 2276 windows.exe Token: SeTakeOwnershipPrivilege 2276 windows.exe Token: SeTakeOwnershipPrivilege 2276 windows.exe Token: SeTakeOwnershipPrivilege 2276 windows.exe Token: SeTakeOwnershipPrivilege 2276 windows.exe Token: SeTakeOwnershipPrivilege 2276 windows.exe Token: SeTakeOwnershipPrivilege 2276 windows.exe Token: SeTakeOwnershipPrivilege 2276 windows.exe Token: SeTakeOwnershipPrivilege 2276 windows.exe Token: SeTakeOwnershipPrivilege 2276 windows.exe Token: SeTakeOwnershipPrivilege 2276 windows.exe Token: SeTakeOwnershipPrivilege 2276 windows.exe Token: SeTakeOwnershipPrivilege 2276 windows.exe Token: SeTakeOwnershipPrivilege 2276 windows.exe Token: SeTakeOwnershipPrivilege 2276 windows.exe Token: SeTakeOwnershipPrivilege 2276 windows.exe Token: SeTakeOwnershipPrivilege 2276 windows.exe Token: SeTakeOwnershipPrivilege 2276 windows.exe Token: SeTakeOwnershipPrivilege 2276 windows.exe Token: SeTakeOwnershipPrivilege 2276 windows.exe Token: SeTakeOwnershipPrivilege 2276 windows.exe Token: SeTakeOwnershipPrivilege 2276 windows.exe Token: SeTakeOwnershipPrivilege 2276 windows.exe Token: SeTakeOwnershipPrivilege 2276 windows.exe Token: SeTakeOwnershipPrivilege 2276 windows.exe Token: SeTakeOwnershipPrivilege 2276 windows.exe Token: SeTakeOwnershipPrivilege 2276 windows.exe Token: SeTakeOwnershipPrivilege 2276 windows.exe Token: SeTakeOwnershipPrivilege 2276 windows.exe Token: SeTakeOwnershipPrivilege 2276 windows.exe Token: SeTakeOwnershipPrivilege 2276 windows.exe Token: SeTakeOwnershipPrivilege 2276 windows.exe Token: SeTakeOwnershipPrivilege 2276 windows.exe Token: SeTakeOwnershipPrivilege 2276 windows.exe Token: SeTakeOwnershipPrivilege 2276 windows.exe Token: SeTakeOwnershipPrivilege 2276 windows.exe Token: SeTakeOwnershipPrivilege 2276 windows.exe Token: SeTakeOwnershipPrivilege 2276 windows.exe Token: SeTakeOwnershipPrivilege 2276 windows.exe Token: SeTakeOwnershipPrivilege 2276 windows.exe Token: SeTakeOwnershipPrivilege 2276 windows.exe Token: SeTakeOwnershipPrivilege 2276 windows.exe Token: SeTakeOwnershipPrivilege 2276 windows.exe Token: SeTakeOwnershipPrivilege 2276 windows.exe Token: SeTakeOwnershipPrivilege 2276 windows.exe Token: SeTakeOwnershipPrivilege 2276 windows.exe Token: SeTakeOwnershipPrivilege 2276 windows.exe Token: SeTakeOwnershipPrivilege 2276 windows.exe Token: SeTakeOwnershipPrivilege 2276 windows.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 5840 ONENOTE.EXE 5840 ONENOTE.EXE 5840 ONENOTE.EXE 5840 ONENOTE.EXE 5840 ONENOTE.EXE 5840 ONENOTE.EXE 5840 ONENOTE.EXE 5840 ONENOTE.EXE 5840 ONENOTE.EXE 5840 ONENOTE.EXE 5840 ONENOTE.EXE 5840 ONENOTE.EXE 5840 ONENOTE.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 5692 wrote to memory of 5840 5692 printfilterpipelinesvc.exe 101 PID 5692 wrote to memory of 5840 5692 printfilterpipelinesvc.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\windows.exe"C:\Users\Admin\AppData\Local\Temp\windows.exe"1⤵
- Enumerates connected drives
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2276
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:5508
-
C:\Windows\system32\printfilterpipelinesvc.exeC:\Windows\system32\printfilterpipelinesvc.exe -Embedding1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5692 -
C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE/insertdoc "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\{D19A9FDA-A183-431B-87C7-D30E1F959DF0}.xps" 1337659096033300002⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5840
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5fcd6bcb56c1689fcef28b57c22475bad
SHA11adc95bebe9eea8c112d40cd04ab7a8d75c4f961
SHA256de2f256064a0af797747c2b97505dc0b9f3df0de4f489eac731c23ae9ca9cc31
SHA51273e4153936dab198397b74ee9efc26093dda721eaab2f8d92786891153b45b04265a161b169c988edb0db2c53124607b6eaaa816559c5ce54f3dbc9fa6a7a4b2
-
Filesize
4KB
MD5527c5d13c96c2dace4d5a4fabeb5d0d7
SHA12726ea6f610fd4c5766cd36ca790f89ec150a86a
SHA256afb65abb80eb51d86fbf2c7ac46768411a53070be9c019438b005eda098bfa32
SHA512b8ae6423cefe16ac0d42162c6da284bab3d74cd7e7c003cbcb06c5c793d5f66e80414ec47e2ba8e74bd750fec7bad419cae0a1d851e808befa1ffc8eda7e1f23
-
Filesize
4KB
MD5010755702d073acd5cb2945f646bda91
SHA146595cbd9a9d80c40c4555626ac76aeff7334db1
SHA256d32c9e3318063656a6662fadb05a9ed7972b525497a1003c08e9e896ae0e86e9
SHA512283dae9e2a353ea3213146052aec121276670a3c11ac61ca973206bf1f7e5a38295185dbbde110b0c916aa911d5139c412d65ba839c1f6fadfa91d728ad79ece
-
Filesize
8KB
MD584679a2d75c97dbda155ffe087455a82
SHA1bb25687c67ad68fc4c5769a5a1ccc9142658cad8
SHA25630bca5f76f7de623c86707e467b589655097037a5618e52174165f36979194be
SHA512674a4232870e544df17d5bd35bed90bf3e446b6bab38c4c30ab84a5d4526b95845444762cf1a04c179844214ce8a235479ceb570173b09bd66e23b218bb57de2
-
Filesize
3KB
MD5281742da4b497f548c55f1bbba434ce9
SHA1f126b48a0a916f3446128f86d3c8d75304fbdf59
SHA2567aa6081497ccd4ed68975a408dcc2886551fef3d55059a9d00f19780cf5b3544
SHA512b042ee3e0c7e2d0b6f1af508a3d33ce5338182552f7866ca9bb13b4b3fd2f54e08ad5f56a6d59d638f95f619f47d9a4f7595ee7c8843ecbca7eb3e8b4d0dab6e