Analysis
-
max time kernel
148s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 04:07
Static task
static1
Behavioral task
behavioral1
Sample
2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe
Resource
win10v2004-20241007-en
General
-
Target
2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe
-
Size
161KB
-
MD5
79952fdfcef93c2f65c2ff0b1c91fa35
-
SHA1
f8b1b51bb55f645e2a477509bb6f18a5b0fac8c3
-
SHA256
2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7
-
SHA512
b735c02b8823a6c6b48c9af76e33c3b2f8347e6827346cb1296f043067dea4cff54c8b7fe91bedb4152d0aa64b97f9c2818382d7f2ea9b551128cf67b82b8c84
-
SSDEEP
3072:YduKWsRRjHRvsfdO3Q+rSBPJasYIeuv3aEkZSc5:bYjHiqrrTgWUc5
Malware Config
Extracted
F:\INC-README.txt
inc_ransom
http://incblog6qu4y4mm4zvw5nrmue6qbwtgjsxpw6b7ixzssu36tsajldoad.onion/
http://incblog7vmuq7rktic73r4ha4j757m3ptym37tyvifzp2roedyyzzxid.onion/
http://incapt.su/
https://twitter.com/hashtag/incransom?f=live
http://incpaykabjqc2mtdxq6c23nqh4x6m5dkps5fr6vgdkgzp5njssx6qkid.onion/
Extracted
C:\ProgramData\Adobe\Setup\INC-README.html
https://twitter.com/hashtag/incransom?f=live</span>
Signatures
-
INC Ransomware
INC Ransom is a ransomware that emerged in July 2023.
-
Inc_ransom family
-
Renames multiple (317) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe File opened (read-only) \??\T: 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe File opened (read-only) \??\U: 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe File opened (read-only) \??\W: 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe File opened (read-only) \??\H: 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe File opened (read-only) \??\N: 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe File opened (read-only) \??\L: 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe File opened (read-only) \??\O: 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe File opened (read-only) \??\R: 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe File opened (read-only) \??\G: 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe File opened (read-only) \??\I: 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe File opened (read-only) \??\E: 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe File opened (read-only) \??\M: 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe File opened (read-only) \??\Q: 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe File opened (read-only) \??\X: 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe File opened (read-only) \??\Y: 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe File opened (read-only) \??\Z: 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe File opened (read-only) \??\A: 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe File opened (read-only) \??\B: 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe File opened (read-only) \??\K: 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe File opened (read-only) \??\S: 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe File opened (read-only) \??\V: 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe File opened (read-only) \??\F: 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe File opened (read-only) \??\J: 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\system32\spool\PRINTERS\00002.SPL 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe File created C:\Windows\system32\spool\PRINTERS\00003.SPL 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe File created C:\Windows\system32\spool\PRINTERS\PP65p7pdrk76ha_0kaz3azdqtjd.TMP printfilterpipelinesvc.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3442511616-637977696-3186306149-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\background-image.jpg" 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ONENOTE.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU ONENOTE.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5448 ONENOTE.EXE 5448 ONENOTE.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 1928 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 1928 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 1928 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 1928 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 1928 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 1928 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 1928 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 1928 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 1928 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 1928 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 1928 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 1928 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 1928 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 1928 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 1928 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 1928 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 1928 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 1928 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 1928 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 1928 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 1928 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 1928 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 1928 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 1928 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 1928 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 1928 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 1928 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 1928 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 1928 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 1928 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 1928 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 1928 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 1928 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 1928 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 1928 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 1928 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 1928 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 1928 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 1928 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 1928 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 1928 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 1928 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 1928 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 1928 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 1928 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 1928 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 1928 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 1928 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 1928 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 1928 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 1928 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 1928 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 1928 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 1928 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 1928 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 1928 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 1928 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 1928 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 1928 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 1928 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 1928 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 1928 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 1928 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe Token: SeTakeOwnershipPrivilege 1928 2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 5448 ONENOTE.EXE 5448 ONENOTE.EXE 5448 ONENOTE.EXE 5448 ONENOTE.EXE 5448 ONENOTE.EXE 5448 ONENOTE.EXE 5448 ONENOTE.EXE 5448 ONENOTE.EXE 5448 ONENOTE.EXE 5448 ONENOTE.EXE 5448 ONENOTE.EXE 5448 ONENOTE.EXE 5448 ONENOTE.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 5188 wrote to memory of 5448 5188 printfilterpipelinesvc.exe 93 PID 5188 wrote to memory of 5448 5188 printfilterpipelinesvc.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe"C:\Users\Admin\AppData\Local\Temp\2f14eaeb439b3d52b160b4738b049ce552c468e918c746ecb4e5c9b51ee6e4a7.exe"1⤵
- Enumerates connected drives
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1928
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:6048
-
C:\Windows\system32\printfilterpipelinesvc.exeC:\Windows\system32\printfilterpipelinesvc.exe -Embedding1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5188 -
C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE/insertdoc "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\{42A02AE1-297D-4F05-BFD0-B1B51EADFBF3}.xps" 1337663567214100002⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5448
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5b563181fcd62036a3007a9a21d5a6ec4
SHA1ba45ae6e9552b6ad5a62bcdb82fe1d569e95dc84
SHA25606361a310ff0c27550674dfe8b1236347eb85e0597b9921b04c964997e75bbc7
SHA512e2fba26d22b7784e5474d482714b5f43de41952a4ff1d1b9e85156f3501c7db0fb88a7aa4798b34f862f350130eb8e1d987279e8e35cd51c5a652ad7f3920dad
-
Filesize
64KB
MD5fcd6bcb56c1689fcef28b57c22475bad
SHA11adc95bebe9eea8c112d40cd04ab7a8d75c4f961
SHA256de2f256064a0af797747c2b97505dc0b9f3df0de4f489eac731c23ae9ca9cc31
SHA51273e4153936dab198397b74ee9efc26093dda721eaab2f8d92786891153b45b04265a161b169c988edb0db2c53124607b6eaaa816559c5ce54f3dbc9fa6a7a4b2
-
Filesize
4KB
MD5570fb9b30ec0955d73f70f2eaeefee78
SHA1c6afe3827b2c0269a4b932f0ed60b4d682885021
SHA25635184bd6daf83f3d33c933a3e53a48f8c45de1b7f6586ab02d593928c62d5b00
SHA512fd29db3c8f4c375c497554012e92676c7dd281ae8446418c74e326a1045f8b394bcdfb565aab5d9400402bac034ded1be6e9b8ff1e657a41f29909fead39f6b7
-
Filesize
3KB
MD513c5917cc0b72e397c5c1c27ad8b0ea4
SHA1882bb77a501e2e8822e3f1ae43f6bbe3a312bdab
SHA256b5b31c7fe82a224147312f9e10b8ac6f57844267292d9f6b7532b8ceffcb7cf9
SHA512a4d6c8ee6d07c3aa33233dac614c9d1a8170de7b341a42ccf115e4e90ae2dd6ea7c88ef18514a132537ca4aa584680419057b0a76267c75bd402df0fcc806f09