Analysis
-
max time kernel
148s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 02:50
Static task
static1
Behavioral task
behavioral1
Sample
11cfd8e84704194ff9c56780858e9bbb9e82ff1b958149d74c43969d06ea10bd.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
11cfd8e84704194ff9c56780858e9bbb9e82ff1b958149d74c43969d06ea10bd.exe
Resource
win10v2004-20241007-en
General
-
Target
11cfd8e84704194ff9c56780858e9bbb9e82ff1b958149d74c43969d06ea10bd.exe
-
Size
142KB
-
MD5
092d39b97288886203fa681bb354cca3
-
SHA1
baa44b68d92836d9005c6829d6d4891d39e1471d
-
SHA256
11cfd8e84704194ff9c56780858e9bbb9e82ff1b958149d74c43969d06ea10bd
-
SHA512
7b77a63b635477bf88934983fabf4103d94aefc95986f4c66df3a74ede2349a6d8c9442f38417dcd5518231ed42104c33273229b3d99c92250cacfd6623c5b47
-
SSDEEP
3072:uA5ohBykv/QGvx4TOPu5XH4KoUu2JsaO0xiQhzNHaGV:DojR/QY4CP434KrtOiJHFV
Malware Config
Extracted
F:\INC-README.txt
inc_ransom
http://incpaysp74dphcbjyvg2eepxnl3tkgt5mq5vd4tnjusoissz342bdnad.onion/
http://incblog7vmuq7rktic73r4ha4j757m3ptym37tyvifzp2roedyyzzxid.onion/
Signatures
-
INC Ransomware
INC Ransom is a ransomware that emerged in July 2023.
-
Inc_ransom family
-
Renames multiple (298) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\B: 11cfd8e84704194ff9c56780858e9bbb9e82ff1b958149d74c43969d06ea10bd.exe File opened (read-only) \??\I: 11cfd8e84704194ff9c56780858e9bbb9e82ff1b958149d74c43969d06ea10bd.exe File opened (read-only) \??\J: 11cfd8e84704194ff9c56780858e9bbb9e82ff1b958149d74c43969d06ea10bd.exe File opened (read-only) \??\K: 11cfd8e84704194ff9c56780858e9bbb9e82ff1b958149d74c43969d06ea10bd.exe File opened (read-only) \??\R: 11cfd8e84704194ff9c56780858e9bbb9e82ff1b958149d74c43969d06ea10bd.exe File opened (read-only) \??\W: 11cfd8e84704194ff9c56780858e9bbb9e82ff1b958149d74c43969d06ea10bd.exe File opened (read-only) \??\V: 11cfd8e84704194ff9c56780858e9bbb9e82ff1b958149d74c43969d06ea10bd.exe File opened (read-only) \??\F: 11cfd8e84704194ff9c56780858e9bbb9e82ff1b958149d74c43969d06ea10bd.exe File opened (read-only) \??\A: 11cfd8e84704194ff9c56780858e9bbb9e82ff1b958149d74c43969d06ea10bd.exe File opened (read-only) \??\E: 11cfd8e84704194ff9c56780858e9bbb9e82ff1b958149d74c43969d06ea10bd.exe File opened (read-only) \??\G: 11cfd8e84704194ff9c56780858e9bbb9e82ff1b958149d74c43969d06ea10bd.exe File opened (read-only) \??\L: 11cfd8e84704194ff9c56780858e9bbb9e82ff1b958149d74c43969d06ea10bd.exe File opened (read-only) \??\O: 11cfd8e84704194ff9c56780858e9bbb9e82ff1b958149d74c43969d06ea10bd.exe File opened (read-only) \??\U: 11cfd8e84704194ff9c56780858e9bbb9e82ff1b958149d74c43969d06ea10bd.exe File opened (read-only) \??\H: 11cfd8e84704194ff9c56780858e9bbb9e82ff1b958149d74c43969d06ea10bd.exe File opened (read-only) \??\N: 11cfd8e84704194ff9c56780858e9bbb9e82ff1b958149d74c43969d06ea10bd.exe File opened (read-only) \??\P: 11cfd8e84704194ff9c56780858e9bbb9e82ff1b958149d74c43969d06ea10bd.exe File opened (read-only) \??\Q: 11cfd8e84704194ff9c56780858e9bbb9e82ff1b958149d74c43969d06ea10bd.exe File opened (read-only) \??\T: 11cfd8e84704194ff9c56780858e9bbb9e82ff1b958149d74c43969d06ea10bd.exe File opened (read-only) \??\Z: 11cfd8e84704194ff9c56780858e9bbb9e82ff1b958149d74c43969d06ea10bd.exe File opened (read-only) \??\M: 11cfd8e84704194ff9c56780858e9bbb9e82ff1b958149d74c43969d06ea10bd.exe File opened (read-only) \??\S: 11cfd8e84704194ff9c56780858e9bbb9e82ff1b958149d74c43969d06ea10bd.exe File opened (read-only) \??\X: 11cfd8e84704194ff9c56780858e9bbb9e82ff1b958149d74c43969d06ea10bd.exe File opened (read-only) \??\Y: 11cfd8e84704194ff9c56780858e9bbb9e82ff1b958149d74c43969d06ea10bd.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\system32\spool\PRINTERS\00002.SPL 11cfd8e84704194ff9c56780858e9bbb9e82ff1b958149d74c43969d06ea10bd.exe File created C:\Windows\system32\spool\PRINTERS\00003.SPL 11cfd8e84704194ff9c56780858e9bbb9e82ff1b958149d74c43969d06ea10bd.exe File created C:\Windows\system32\spool\PRINTERS\PPwdmwmx3hjn8v97gwa_mo6skub.TMP printfilterpipelinesvc.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\background-image.jpg" 11cfd8e84704194ff9c56780858e9bbb9e82ff1b958149d74c43969d06ea10bd.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 11cfd8e84704194ff9c56780858e9bbb9e82ff1b958149d74c43969d06ea10bd.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ONENOTE.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU ONENOTE.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS ONENOTE.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5736 ONENOTE.EXE 5736 ONENOTE.EXE -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 5736 ONENOTE.EXE 5736 ONENOTE.EXE 5736 ONENOTE.EXE 5736 ONENOTE.EXE 5736 ONENOTE.EXE 5736 ONENOTE.EXE 5736 ONENOTE.EXE 5736 ONENOTE.EXE 5736 ONENOTE.EXE 5736 ONENOTE.EXE 5736 ONENOTE.EXE 5736 ONENOTE.EXE 5736 ONENOTE.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 5488 wrote to memory of 5736 5488 printfilterpipelinesvc.exe 101 PID 5488 wrote to memory of 5736 5488 printfilterpipelinesvc.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\11cfd8e84704194ff9c56780858e9bbb9e82ff1b958149d74c43969d06ea10bd.exe"C:\Users\Admin\AppData\Local\Temp\11cfd8e84704194ff9c56780858e9bbb9e82ff1b958149d74c43969d06ea10bd.exe"1⤵
- Enumerates connected drives
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
PID:4552
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:5368
-
C:\Windows\system32\printfilterpipelinesvc.exeC:\Windows\system32\printfilterpipelinesvc.exe -Embedding1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5488 -
C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE/insertdoc "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\{A3CB5D19-C242-4940-AD7B-ADD93DC0C55C}.xps" 1337663103158400002⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5736
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD585b81261146c08f4d472d18edc33c3b6
SHA17eb932f20e9c03fc8d77007f2651cbf5aad888a4
SHA256265a0f64e8f11bbb397f0f02d035ac172a5ef02e38fdb864913a540ad9ad60b3
SHA512b8d76760065743b3ef754c6b630300e091282207048a91a2b57577d9ed6e110640946e3bc099e7777ddcefa463d718908a630e9468447c3ca1f2c57e213bdff3
-
Filesize
64KB
MD5fcd6bcb56c1689fcef28b57c22475bad
SHA11adc95bebe9eea8c112d40cd04ab7a8d75c4f961
SHA256de2f256064a0af797747c2b97505dc0b9f3df0de4f489eac731c23ae9ca9cc31
SHA51273e4153936dab198397b74ee9efc26093dda721eaab2f8d92786891153b45b04265a161b169c988edb0db2c53124607b6eaaa816559c5ce54f3dbc9fa6a7a4b2
-
Filesize
4KB
MD5975ce39faa5c3c5b43d2a215d69ee6b4
SHA18880323ffa4a0e054de8bf01562af7d7d005d2d6
SHA256569b3377412beddf6736dfd8762e660f5d08d3f09e964e09bd6d96973f216889
SHA5122fe1d54096243841598674115befdae8760ce93c4abaf974bbfa4c91c1faadfbd3b4edc4d4cb0699f020c91b7968b8dd951f505f860e6b9b04a5888b6e4d7cc5
-
Filesize
4KB
MD59951828817ff52b5e8541448171e88b7
SHA1ae3732657de294ad6ee2453b33a93131511b9106
SHA256f28c6d72dfad2c3fa84c36c98cdbc1a15d7286f0032b6e6822314ae6155bf129
SHA512eb80ad4bf1abc3b9c086f390aee731b1a253b56f99502434a69914eacd58004bab5ada2bb6235ef8e1b618cd5f88b1385a2a971f34a3748e6c3d6e68dac81209
-
Filesize
1KB
MD5bcbfa1399779f0779b61dd8169d2393d
SHA1424013a1f7830b13065817c5c865a2101709be92
SHA256cad9dde04935dfe6517c61ea55a40365c5f65062c4305508989a10a5c90ac03d
SHA512fd7d0721e44d0f2f5c983406b3d4b1705d2c99b44cd5fee4c46cc9950ff05fa7c985bcee882d3852038f2e3a815ed34739e66cd80418e06634e37074f8e4acdf