Analysis
-
max time kernel
147s -
max time network
143s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 03:18
Static task
static1
Behavioral task
behavioral1
Sample
1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe
Resource
win10v2004-20241007-en
General
-
Target
1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe
-
Size
161KB
-
MD5
ab65a026cf2c33485960d52de4884fd3
-
SHA1
adafa060ea04b3d812e975fff6d8b39074ba2e3b
-
SHA256
1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169
-
SHA512
0a95b03bb9ddae32e0b3b76f0e6176ac464e291607633f6f320b92d781936ed7774294addf83cca5d9354b61ff4678d381cd5819dcfd1a1374605aad96ee9436
-
SSDEEP
3072:YduKWsRRjHRvsfdO3Q+rSBPJasYIeuvdaEkZSc5:bYjHiqrrTKWUc5
Malware Config
Extracted
C:\ProgramData\Adobe\INC-README.txt
inc_ransom
http://incblog6qu4y4mm4zvw5nrmue6qbwtgjsxpw6b7ixzssu36tsajldoad.onion/
http://incblog7vmuq7rktic73r4ha4j757m3ptym37tyvifzp2roedyyzzxid.onion/
http://incapt.su/
https://twitter.com/hashtag/incransom?f=live
http://incpaykabjqc2mtdxq6c23nqh4x6m5dkps5fr6vgdkgzp5njssx6qkid.onion/
Extracted
C:\ProgramData\Adobe\INC-README.html
https://twitter.com/hashtag/incransom?f=live</span>
Signatures
-
INC Ransomware
INC Ransom is a ransomware that emerged in July 2023.
-
Inc_ransom family
-
Renames multiple (286) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\V: 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe File opened (read-only) \??\X: 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe File opened (read-only) \??\F: 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe File opened (read-only) \??\B: 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe File opened (read-only) \??\I: 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe File opened (read-only) \??\S: 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe File opened (read-only) \??\R: 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe File opened (read-only) \??\Z: 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe File opened (read-only) \??\G: 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe File opened (read-only) \??\J: 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe File opened (read-only) \??\O: 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe File opened (read-only) \??\P: 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe File opened (read-only) \??\U: 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe File opened (read-only) \??\W: 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe File opened (read-only) \??\Y: 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe File opened (read-only) \??\K: 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe File opened (read-only) \??\L: 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe File opened (read-only) \??\N: 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe File opened (read-only) \??\Q: 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe File opened (read-only) \??\T: 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe File opened (read-only) \??\A: 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe File opened (read-only) \??\E: 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe File opened (read-only) \??\H: 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe File opened (read-only) \??\M: 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\system32\spool\PRINTERS\00002.SPL 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe File created C:\Windows\system32\spool\PRINTERS\00003.SPL 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe File created C:\Windows\system32\spool\PRINTERS\PPkv2tk81xc2qd4dox04y7cxaud.TMP printfilterpipelinesvc.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\background-image.jpg" 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ONENOTE.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU ONENOTE.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 6052 ONENOTE.EXE 6052 ONENOTE.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 3048 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 3048 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 3048 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 3048 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 3048 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 3048 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 3048 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 3048 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 3048 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 3048 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 3048 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 3048 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 3048 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 3048 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 3048 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 3048 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 3048 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 3048 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 3048 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 3048 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 3048 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 3048 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 3048 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 3048 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 3048 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 3048 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 3048 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 3048 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 3048 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 3048 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 3048 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 3048 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 3048 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 3048 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 3048 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 3048 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 3048 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 3048 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 3048 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 3048 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 3048 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 3048 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 3048 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 3048 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 3048 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 3048 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 3048 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 3048 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 3048 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 3048 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 3048 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 3048 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 3048 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 3048 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 3048 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 3048 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 3048 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 3048 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 3048 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 3048 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 3048 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 3048 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 3048 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 3048 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 6052 ONENOTE.EXE 6052 ONENOTE.EXE 6052 ONENOTE.EXE 6052 ONENOTE.EXE 6052 ONENOTE.EXE 6052 ONENOTE.EXE 6052 ONENOTE.EXE 6052 ONENOTE.EXE 6052 ONENOTE.EXE 6052 ONENOTE.EXE 6052 ONENOTE.EXE 6052 ONENOTE.EXE 6052 ONENOTE.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 5956 wrote to memory of 6052 5956 printfilterpipelinesvc.exe 94 PID 5956 wrote to memory of 6052 5956 printfilterpipelinesvc.exe 94
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe"C:\Users\Admin\AppData\Local\Temp\1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe"1⤵
- Enumerates connected drives
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3048
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:5776
-
C:\Windows\system32\printfilterpipelinesvc.exeC:\Windows\system32\printfilterpipelinesvc.exe -Embedding1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5956 -
C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE/insertdoc "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\{A00C2BF8-4479-48EB-A8C5-D5F237A3B700}.xps" 1337663273156100002⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:6052
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5dd6e91db842265b4ff022dad172d65ff
SHA1afdb1ee1df839be1b044bf01aa75e2f132c5391c
SHA256f711d1f92e60b51079985fbb8f36d86145f3c7d77ed6b0912ddbb8555b3a6be1
SHA512854f658e7d6d2b1c01eb53f4f48749b589d415233a8747f5a6390c904de3f2970c3629fdd5cb681ee3392509c3416e03d950f4c28e245d2ad153272bf0f2120b
-
Filesize
3KB
MD55b4305c63d66f44752d5fa815deacb91
SHA12490af8f78d483a8cf65d3089908dfc976e6a686
SHA2569524d2a1ce3d7c111bdb8eb877c9b626f2cb21ae8e593866630bbc6227131748
SHA512ea0a61d493018fcc5bbb06a2b6387bbf9cae637e609bdbb3ea0507f8f9b43bc6d496f3f55d7f603b07a554dfe32910e1422d7184334244ca59366c9fc7257b3d
-
Filesize
64KB
MD5fcd6bcb56c1689fcef28b57c22475bad
SHA11adc95bebe9eea8c112d40cd04ab7a8d75c4f961
SHA256de2f256064a0af797747c2b97505dc0b9f3df0de4f489eac731c23ae9ca9cc31
SHA51273e4153936dab198397b74ee9efc26093dda721eaab2f8d92786891153b45b04265a161b169c988edb0db2c53124607b6eaaa816559c5ce54f3dbc9fa6a7a4b2
-
Filesize
4KB
MD5cf17ded7977834cd0afa926766f9fa01
SHA19cb5d2aaa8b656d1f5a5e80d808467c7e01f540c
SHA256b9bec7981f2ceeb6164fad7c1ba91680b6f104fb153e552e80e420787e2bca5d
SHA512dc86edcf6f6d27f28c3094fe9a7d3abfcc94ec459016c786ef68295406f5bb8e0433bc709c9fd14a31b350ce7e507f33cd86471f8d7fb522ad7103844735b51d
-
Filesize
4KB
MD5ab0e8d4629f141da6f3904b7789c05a2
SHA1bfd0d0a6bede1c844d52c175f51cea8943f82949
SHA2560a478bc45db3b198524957d13ce7be35fa11447ce4f3a63f8261e5095011538c
SHA51207f02f446fc1a5b2b9cd563898f4dc2e05a046e64af5950713a2bfacd466f8918faa21369ee72328de4cf4d0ab5fa9da797b3fa98f494dfd21375e4ea0670083