Analysis
-
max time kernel
149s -
max time network
157s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 03:23
Static task
static1
Behavioral task
behavioral1
Sample
1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe
Resource
win10v2004-20241007-en
General
-
Target
1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe
-
Size
161KB
-
MD5
ab65a026cf2c33485960d52de4884fd3
-
SHA1
adafa060ea04b3d812e975fff6d8b39074ba2e3b
-
SHA256
1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169
-
SHA512
0a95b03bb9ddae32e0b3b76f0e6176ac464e291607633f6f320b92d781936ed7774294addf83cca5d9354b61ff4678d381cd5819dcfd1a1374605aad96ee9436
-
SSDEEP
3072:YduKWsRRjHRvsfdO3Q+rSBPJasYIeuvdaEkZSc5:bYjHiqrrTKWUc5
Malware Config
Extracted
F:\INC-README.txt
inc_ransom
http://incblog6qu4y4mm4zvw5nrmue6qbwtgjsxpw6b7ixzssu36tsajldoad.onion/
http://incblog7vmuq7rktic73r4ha4j757m3ptym37tyvifzp2roedyyzzxid.onion/
http://incapt.su/
https://twitter.com/hashtag/incransom?f=live
http://incpaykabjqc2mtdxq6c23nqh4x6m5dkps5fr6vgdkgzp5njssx6qkid.onion/
Extracted
C:\ProgramData\Adobe\Setup\INC-README.html
https://twitter.com/hashtag/incransom?f=live</span>
Signatures
-
INC Ransomware
INC Ransom is a ransomware that emerged in July 2023.
-
Inc_ransom family
-
Renames multiple (304) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\S: 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe File opened (read-only) \??\W: 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe File opened (read-only) \??\X: 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe File opened (read-only) \??\H: 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe File opened (read-only) \??\J: 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe File opened (read-only) \??\L: 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe File opened (read-only) \??\N: 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe File opened (read-only) \??\B: 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe File opened (read-only) \??\I: 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe File opened (read-only) \??\K: 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe File opened (read-only) \??\Z: 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe File opened (read-only) \??\P: 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe File opened (read-only) \??\Q: 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe File opened (read-only) \??\T: 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe File opened (read-only) \??\F: 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe File opened (read-only) \??\A: 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe File opened (read-only) \??\E: 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe File opened (read-only) \??\O: 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe File opened (read-only) \??\V: 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe File opened (read-only) \??\Y: 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe File opened (read-only) \??\G: 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe File opened (read-only) \??\M: 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe File opened (read-only) \??\R: 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe File opened (read-only) \??\U: 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\system32\spool\PRINTERS\00002.SPL 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe File created C:\Windows\system32\spool\PRINTERS\00003.SPL 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe File created C:\Windows\system32\spool\PRINTERS\PP208s674lv8n9g_ud606z6u9xb.TMP printfilterpipelinesvc.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\background-image.jpg" 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ONENOTE.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU ONENOTE.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS ONENOTE.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 6036 ONENOTE.EXE 6036 ONENOTE.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 4240 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4240 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4240 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4240 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4240 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4240 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4240 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4240 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4240 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4240 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4240 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4240 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4240 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4240 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4240 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4240 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4240 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4240 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4240 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4240 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4240 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4240 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4240 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4240 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4240 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4240 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4240 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4240 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4240 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4240 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4240 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4240 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4240 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4240 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4240 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4240 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4240 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4240 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4240 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4240 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4240 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4240 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4240 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4240 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4240 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4240 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4240 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4240 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4240 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4240 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4240 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4240 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4240 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4240 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4240 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4240 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4240 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4240 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4240 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4240 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4240 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4240 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4240 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe Token: SeTakeOwnershipPrivilege 4240 1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 6036 ONENOTE.EXE 6036 ONENOTE.EXE 6036 ONENOTE.EXE 6036 ONENOTE.EXE 6036 ONENOTE.EXE 6036 ONENOTE.EXE 6036 ONENOTE.EXE 6036 ONENOTE.EXE 6036 ONENOTE.EXE 6036 ONENOTE.EXE 6036 ONENOTE.EXE 6036 ONENOTE.EXE 6036 ONENOTE.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 5944 wrote to memory of 6036 5944 printfilterpipelinesvc.exe 91 PID 5944 wrote to memory of 6036 5944 printfilterpipelinesvc.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe"C:\Users\Admin\AppData\Local\Temp\1a50f5f752562c7be64a14a1cbef54a460cb7d11631ce2af55622a1f4156b169.exe"1⤵
- Enumerates connected drives
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4240
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:5828
-
C:\Windows\system32\printfilterpipelinesvc.exeC:\Windows\system32\printfilterpipelinesvc.exe -Embedding1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5944 -
C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE/insertdoc "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\{A67B50F9-79C5-41EB-84A3-0A0FE28C6447}.xps" 1337663304476800002⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:6036
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5dd6e91db842265b4ff022dad172d65ff
SHA1afdb1ee1df839be1b044bf01aa75e2f132c5391c
SHA256f711d1f92e60b51079985fbb8f36d86145f3c7d77ed6b0912ddbb8555b3a6be1
SHA512854f658e7d6d2b1c01eb53f4f48749b589d415233a8747f5a6390c904de3f2970c3629fdd5cb681ee3392509c3416e03d950f4c28e245d2ad153272bf0f2120b
-
Filesize
64KB
MD5fcd6bcb56c1689fcef28b57c22475bad
SHA11adc95bebe9eea8c112d40cd04ab7a8d75c4f961
SHA256de2f256064a0af797747c2b97505dc0b9f3df0de4f489eac731c23ae9ca9cc31
SHA51273e4153936dab198397b74ee9efc26093dda721eaab2f8d92786891153b45b04265a161b169c988edb0db2c53124607b6eaaa816559c5ce54f3dbc9fa6a7a4b2
-
Filesize
4KB
MD562c32ad8bd85b3bbc71a3cf4f54ac737
SHA13244c6987bcf863f4524b42e88ab4ccca563cbdb
SHA256a919cdd4285f9690bb223949f6dd62996d6b75fd15a642babd0a625812ab6484
SHA5127852eb74d2a4190a97e8ebec88432188546b3d07a7b0dc3df839cb55fa755f99c7b68f5698d29db5f214d7710e5bd30da32376598c08d5dda2ab4271f34c0ec9
-
Filesize
4KB
MD50e0c980acecfc6d83944c72b42656d5b
SHA181a8311f08577fcfba72ef2620072b6ee65be4ab
SHA256bb991bf4f42b5fbbfea7988419a4786f633aef7434c2b77711743aa0d69d80cb
SHA5126345174f12c534effe22e7af82c861ba5319b6d39cdd21a9d98811fcb948760e24a77c187fe2216358208d8d6954857693c82d03eb46abceb60e806bc3c73559
-
Filesize
3KB
MD55b4305c63d66f44752d5fa815deacb91
SHA12490af8f78d483a8cf65d3089908dfc976e6a686
SHA2569524d2a1ce3d7c111bdb8eb877c9b626f2cb21ae8e593866630bbc6227131748
SHA512ea0a61d493018fcc5bbb06a2b6387bbf9cae637e609bdbb3ea0507f8f9b43bc6d496f3f55d7f603b07a554dfe32910e1422d7184334244ca59366c9fc7257b3d