Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 04:38
Static task
static1
Behavioral task
behavioral1
Sample
36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe
Resource
win10v2004-20241007-en
General
-
Target
36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe
-
Size
161KB
-
MD5
485573e162551f66f776923126e5b5ff
-
SHA1
c1f4507c3f8eb24279e0b47a1523500e62cb0764
-
SHA256
36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e
-
SHA512
b26706dd0fc92019f85b287fb778d34d163fbcda987477f9a3635863e4ff7bd412782fac961ea03616a7687a08deaeec23e26c3ff6a97deacd460030c7700de3
-
SSDEEP
3072:+dBK6dRsjHRvsGWO3G+gSB9ssYIeuV0lbGkZSQ5:2ajHOuVg9w0R5UQ5
Malware Config
Extracted
F:\INC-README.txt
inc_ransom
http://incblog7vmuq7rktic73r4ha4j757m3ptym37tyvifzp2roedyyzzxid.onion/
http://incapt.su/
https://twitter.com/hashtag/incransom?f=live
http://incpaysp74dphcbjyvg2eepxnl3tkgt5mq5vd4tnjusoissz342bdnad.onion/
Extracted
F:\INC-README.html
https://twitter.com/hashtag/incransom?f=live</span>
Signatures
-
INC Ransomware
INC Ransom is a ransomware that emerged in July 2023.
-
Inc_ransom family
-
Renames multiple (299) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe File opened (read-only) \??\M: 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe File opened (read-only) \??\Z: 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe File opened (read-only) \??\A: 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe File opened (read-only) \??\E: 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe File opened (read-only) \??\J: 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe File opened (read-only) \??\K: 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe File opened (read-only) \??\L: 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe File opened (read-only) \??\O: 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe File opened (read-only) \??\Q: 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe File opened (read-only) \??\R: 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe File opened (read-only) \??\S: 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe File opened (read-only) \??\U: 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe File opened (read-only) \??\V: 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe File opened (read-only) \??\Y: 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe File opened (read-only) \??\F: 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe File opened (read-only) \??\B: 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe File opened (read-only) \??\T: 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe File opened (read-only) \??\G: 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe File opened (read-only) \??\I: 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe File opened (read-only) \??\N: 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe File opened (read-only) \??\P: 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe File opened (read-only) \??\W: 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe File opened (read-only) \??\X: 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\system32\spool\PRINTERS\00003.SPL 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe File created C:\Windows\system32\spool\PRINTERS\PP1fav0c7w9lcokf048z_xxt7gc.TMP printfilterpipelinesvc.exe File created C:\Windows\system32\spool\PRINTERS\00002.SPL 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\background-image.jpg" 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ONENOTE.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU ONENOTE.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5904 ONENOTE.EXE 5904 ONENOTE.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 1460 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 1460 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 1460 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 1460 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 1460 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 1460 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 1460 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 1460 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 1460 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 1460 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 1460 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 1460 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 1460 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 1460 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 1460 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 1460 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 1460 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 1460 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 1460 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 1460 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 1460 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 1460 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 1460 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 1460 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 1460 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 1460 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 1460 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 1460 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 1460 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 1460 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 1460 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 1460 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 1460 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 1460 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 1460 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 1460 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 1460 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 1460 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 1460 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 1460 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 1460 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 1460 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 1460 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 1460 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 1460 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 1460 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 1460 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 1460 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 1460 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 1460 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 1460 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 1460 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 1460 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 1460 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 1460 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 1460 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 1460 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 1460 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 1460 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 1460 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 1460 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 1460 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 1460 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe Token: SeTakeOwnershipPrivilege 1460 36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 5904 ONENOTE.EXE 5904 ONENOTE.EXE 5904 ONENOTE.EXE 5904 ONENOTE.EXE 5904 ONENOTE.EXE 5904 ONENOTE.EXE 5904 ONENOTE.EXE 5904 ONENOTE.EXE 5904 ONENOTE.EXE 5904 ONENOTE.EXE 5904 ONENOTE.EXE 5904 ONENOTE.EXE 5904 ONENOTE.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 5728 wrote to memory of 5904 5728 printfilterpipelinesvc.exe 93 PID 5728 wrote to memory of 5904 5728 printfilterpipelinesvc.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe"C:\Users\Admin\AppData\Local\Temp\36e3c83e50a19ad1048dab7814f3922631990578aab0790401bc67dbcc90a72e.exe"1⤵
- Enumerates connected drives
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1460
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:3932
-
C:\Windows\system32\printfilterpipelinesvc.exeC:\Windows\system32\printfilterpipelinesvc.exe -Embedding1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5728 -
C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE/insertdoc "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\{F398D098-25E2-4A5E-B011-C3A69FCA97F2}.xps" 1337663770203200002⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5904
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5889ef1c53d8cc78010a0b2543e570d57
SHA1189c51fdfeb5b662b597b1ca6175ebd1517a4aea
SHA256e64207c766049abba922f6c38e2b5b4b8a8e1ef309249e8680ee942c5857ec21
SHA512448ac51359184535f5b07bf396c3836c86475ab0584d07102b765ed00dd88ff500eb755d7f07a0d375cb5ab70dbc1c09d485abf645bb69041d2814fb10dba1d6
-
Filesize
4KB
MD5f5e6fca4a40468383cc2eb2e5f95ebef
SHA1181feba6fa7534ae1502b93b707a1f27e2ab0f69
SHA256971fc5359c6578a9168b1cf0e77a9e83be5a5965b79fcbbfa5fb3c28382bee03
SHA5124e742e47ffef9a6272d83fee7c1d9dec5a4832c1adb938de62646c3dda6451cb5405d5f6d1dffda0a3d7d725eeeb5393af72749aec6c814ad8441f39f4be9f27
-
Filesize
8KB
MD5293b6073872df4f3492c483cece06514
SHA1d48f6bcf0d6f47ade74b5e16e103f6f6decf3a18
SHA256e2300a37a0b2a0d9d93806d14539b074bd77d85d3777dedd33c4f15f8356d4e9
SHA512965e318ff415b43ae0a73dcfbe9d5b853a7fb308712e111b261d3e6284f391f9428a5c43e1eba42be7565b7f35a8f1dbe16041bc6f4e4809f085fa76af89deba
-
Filesize
3KB
MD5d8c35d7979b3f670ca9d154168cf9181
SHA18b8575a4993a5e2805ee0691a046d2cc675c0f77
SHA256bb3e30c1aab5af9e400f290f26eded5d91757a347b4587f4f5f617ee6d8d9c90
SHA5127bd407b16960ffe6cc73cef3bc1d3a82667b030a4208a35c2320aa6194053a1a78488e27554e223435b3cca69e3aa75aa9d4c58123d85f5add4c449483539b0e