Analysis
-
max time kernel
149s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 04:16
Static task
static1
Behavioral task
behavioral1
Sample
39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe
Resource
win10v2004-20241007-en
General
-
Target
39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe
-
Size
1.7MB
-
MD5
9767fa45a59e399d31ba79cb89555215
-
SHA1
d6b017b3961c239a18d22addb4c8b288361eadb1
-
SHA256
39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449
-
SHA512
88a34d42f2a00574a703927a7245ed33c986cafa7e802773af500710d5e8b2fe4978833d9b70face5135ea80362eca9ab8871a192f1a8322cebcb0e51181ae31
-
SSDEEP
49152:BDDJhbYW4ocuJ5txUJG5SEm6xlbTT1z6F/iiDJ:RDJJYW4ocu2b61A6
Malware Config
Extracted
C:\ProgramData\Adobe\Setup\INC-README.html
https://twitter.com/hashtag/incransom?f=live</span>
Extracted
C:\ProgramData\Adobe\Setup\INC-README.txt
inc_ransom
http://incblog6qu4y4mm4zvw5nrmue6qbwtgjsxpw6b7ixzssu36tsajldoad.onion/
http://incblog7vmuq7rktic73r4ha4j757m3ptym37tyvifzp2roedyyzzxid.onion/
http://incapt.su/
https://twitter.com/hashtag/incransom?f=live
http://incpaykabjqc2mtdxq6c23nqh4x6m5dkps5fr6vgdkgzp5njssx6qkid.onion/
Signatures
-
INC Ransomware
INC Ransom is a ransomware that emerged in July 2023.
-
Inc_ransom family
-
Renames multiple (327) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\E: 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe File opened (read-only) \??\O: 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe File opened (read-only) \??\L: 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe File opened (read-only) \??\N: 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe File opened (read-only) \??\R: 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe File opened (read-only) \??\S: 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe File opened (read-only) \??\U: 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe File opened (read-only) \??\W: 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe File opened (read-only) \??\B: 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe File opened (read-only) \??\H: 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe File opened (read-only) \??\X: 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe File opened (read-only) \??\K: 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe File opened (read-only) \??\M: 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe File opened (read-only) \??\T: 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe File opened (read-only) \??\V: 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe File opened (read-only) \??\A: 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe File opened (read-only) \??\I: 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe File opened (read-only) \??\J: 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe File opened (read-only) \??\P: 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe File opened (read-only) \??\Q: 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe File opened (read-only) \??\Y: 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe File opened (read-only) \??\Z: 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe File opened (read-only) \??\F: 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe File opened (read-only) \??\G: 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\system32\spool\PRINTERS\00002.SPL 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe File created C:\Windows\system32\spool\PRINTERS\00003.SPL 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe File created C:\Windows\system32\spool\PRINTERS\PPt6lln9uqoxzihxf9w06o4imec.TMP printfilterpipelinesvc.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\background-image.jpg" 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ONENOTE.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU ONENOTE.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5792 ONENOTE.EXE 5792 ONENOTE.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 4708 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe Token: SeTakeOwnershipPrivilege 4708 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe Token: SeTakeOwnershipPrivilege 4708 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe Token: SeTakeOwnershipPrivilege 4708 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe Token: SeTakeOwnershipPrivilege 4708 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe Token: SeTakeOwnershipPrivilege 4708 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe Token: SeTakeOwnershipPrivilege 4708 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe Token: SeTakeOwnershipPrivilege 4708 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe Token: SeTakeOwnershipPrivilege 4708 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe Token: SeTakeOwnershipPrivilege 4708 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe Token: SeTakeOwnershipPrivilege 4708 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe Token: SeTakeOwnershipPrivilege 4708 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe Token: SeTakeOwnershipPrivilege 4708 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe Token: SeTakeOwnershipPrivilege 4708 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe Token: SeTakeOwnershipPrivilege 4708 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe Token: SeTakeOwnershipPrivilege 4708 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe Token: SeTakeOwnershipPrivilege 4708 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe Token: SeTakeOwnershipPrivilege 4708 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe Token: SeTakeOwnershipPrivilege 4708 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe Token: SeTakeOwnershipPrivilege 4708 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe Token: SeTakeOwnershipPrivilege 4708 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe Token: SeTakeOwnershipPrivilege 4708 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe Token: SeTakeOwnershipPrivilege 4708 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe Token: SeTakeOwnershipPrivilege 4708 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe Token: SeTakeOwnershipPrivilege 4708 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe Token: SeTakeOwnershipPrivilege 4708 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe Token: SeTakeOwnershipPrivilege 4708 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe Token: SeTakeOwnershipPrivilege 4708 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe Token: SeTakeOwnershipPrivilege 4708 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe Token: SeTakeOwnershipPrivilege 4708 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe Token: SeTakeOwnershipPrivilege 4708 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe Token: SeTakeOwnershipPrivilege 4708 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe Token: SeTakeOwnershipPrivilege 4708 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe Token: SeTakeOwnershipPrivilege 4708 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe Token: SeTakeOwnershipPrivilege 4708 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe Token: SeTakeOwnershipPrivilege 4708 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe Token: SeTakeOwnershipPrivilege 4708 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe Token: SeTakeOwnershipPrivilege 4708 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe Token: SeTakeOwnershipPrivilege 4708 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe Token: SeTakeOwnershipPrivilege 4708 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe Token: SeTakeOwnershipPrivilege 4708 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe Token: SeTakeOwnershipPrivilege 4708 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe Token: SeTakeOwnershipPrivilege 4708 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe Token: SeTakeOwnershipPrivilege 4708 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe Token: SeTakeOwnershipPrivilege 4708 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe Token: SeTakeOwnershipPrivilege 4708 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe Token: SeTakeOwnershipPrivilege 4708 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe Token: SeTakeOwnershipPrivilege 4708 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe Token: SeTakeOwnershipPrivilege 4708 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe Token: SeTakeOwnershipPrivilege 4708 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe Token: SeTakeOwnershipPrivilege 4708 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe Token: SeTakeOwnershipPrivilege 4708 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe Token: SeTakeOwnershipPrivilege 4708 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe Token: SeTakeOwnershipPrivilege 4708 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe Token: SeTakeOwnershipPrivilege 4708 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe Token: SeTakeOwnershipPrivilege 4708 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe Token: SeTakeOwnershipPrivilege 4708 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe Token: SeTakeOwnershipPrivilege 4708 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe Token: SeTakeOwnershipPrivilege 4708 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe Token: SeTakeOwnershipPrivilege 4708 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe Token: SeTakeOwnershipPrivilege 4708 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe Token: SeTakeOwnershipPrivilege 4708 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe Token: SeTakeOwnershipPrivilege 4708 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe Token: SeTakeOwnershipPrivilege 4708 39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 5792 ONENOTE.EXE 5792 ONENOTE.EXE 5792 ONENOTE.EXE 5792 ONENOTE.EXE 5792 ONENOTE.EXE 5792 ONENOTE.EXE 5792 ONENOTE.EXE 5792 ONENOTE.EXE 5792 ONENOTE.EXE 5792 ONENOTE.EXE 5792 ONENOTE.EXE 5792 ONENOTE.EXE 5792 ONENOTE.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 292 wrote to memory of 5792 292 printfilterpipelinesvc.exe 103 PID 292 wrote to memory of 5792 292 printfilterpipelinesvc.exe 103
Processes
-
C:\Users\Admin\AppData\Local\Temp\39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe"C:\Users\Admin\AppData\Local\Temp\39e1aa118310977d809d618c937b799cd228b2e339583a21f27cca2ef0bf9449.exe"1⤵
- Enumerates connected drives
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4708
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:6040
-
C:\Windows\system32\printfilterpipelinesvc.exeC:\Windows\system32\printfilterpipelinesvc.exe -Embedding1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:292 -
C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE/insertdoc "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\{BB88BB8C-B70C-49E3-833C-1537A51D3B71}.xps" 1337663617833300002⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5792
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5562b140eb3b669284f2e7699bd7c68ac
SHA1d0ffd542ef18d1a3faf5d21b1eb649c64a4601a5
SHA2560ea5a5d069f69d5f544c729e3214da9d3cb222bdd860c988bed94c85c04e6f6a
SHA51261199066af6ca35e46535a7eac70110e8075c5c7b3626937981f29a98de036ce34dda8d12d42e6b1ab4246240aa5d6f94db16982377042cc9b652caac2b95a2e
-
Filesize
3KB
MD5d9c613828b2c891683f2d62d4cf2842e
SHA1843eb3222c56c64ca12e847771a15e1d1d214c3b
SHA2562ff2e2cd8af63c20c717c3fe5c20463ab0fbb08e8deff883893a197f852b1814
SHA5120b5a9becb538e35ee139c42020eb2c68a85108fd57a324db2f51c8d2a8d0ed78cd954087e054b5dc54908474741a6f21b332b6d26faa974f027d792546bf30da
-
Filesize
4KB
MD5d3ee77eddf21606eeda9b9ee22d46634
SHA1af1f207b12a6f1d9887f36ab7f5471ce95b69dd1
SHA256d9266873b20f34e88b94f59ced0027d0ed002a397ce260c376cafb6b319e64e4
SHA512001a0633e7cd159a176914665342ca63c3342cab336ce5c5caecef8aff15eac5284286f30b7fb7a4f4c6e1afe99c6935c3494168963448b961fa617927e7fad5
-
Filesize
4KB
MD535e1483be80221cb5345f2ef39449ad1
SHA17f3cdbbd7ffdb139e79e36489b2e2c44bc98539d
SHA2567672ebb7d41587c840e5dedec3adfb2e23f3033eb6e3b737c875160b1ff84adc
SHA51243f3aff19498f648b9a87dd428fa19808f000bf73ecd185bf3a59d154ae4fe37a1dbc233b514fd499302dd44457c897551c64bbb039d41e8781edaf7a9d0fc77