Analysis
-
max time kernel
148s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 05:20
Static task
static1
Behavioral task
behavioral1
Sample
5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe
Resource
win10v2004-20241007-en
General
-
Target
5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe
-
Size
1.1MB
-
MD5
abe16faca8a21836e6d491a11ae9dde4
-
SHA1
9e63ad3be03d6acce3a7eff62c9147d3deead512
-
SHA256
5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db
-
SHA512
000a71e24007b640c3165022e569566ec8ea02533939bdae47ab04ac7631d98e9b597c0575c3e212a274ecd07a53a3538e4cdf90bf6d7462ec55eeb754e97295
-
SSDEEP
24576:RjukpdpEaAYxpD/27Ul2afYc+6MggcCxu:R7dLfxpD83awXTgga
Malware Config
Extracted
F:\INC-README.txt
inc_ransom
http://incblog6qu4y4mm4zvw5nrmue6qbwtgjsxpw6b7ixzssu36tsajldoad.onion/
http://incblog7vmuq7rktic73r4ha4j757m3ptym37tyvifzp2roedyyzzxid.onion/
http://incapt.su/
https://twitter.com/hashtag/incransom?f=live
http://incpaykabjqc2mtdxq6c23nqh4x6m5dkps5fr6vgdkgzp5njssx6qkid.onion/
Extracted
C:\ProgramData\Adobe\Setup\INC-README.html
https://twitter.com/hashtag/incransom?f=live</span>
Signatures
-
INC Ransomware
INC Ransom is a ransomware that emerged in July 2023.
-
Inc_ransom family
-
Renames multiple (302) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\H: 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe File opened (read-only) \??\J: 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe File opened (read-only) \??\N: 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe File opened (read-only) \??\Q: 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe File opened (read-only) \??\R: 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe File opened (read-only) \??\V: 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe File opened (read-only) \??\Z: 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe File opened (read-only) \??\E: 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe File opened (read-only) \??\M: 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe File opened (read-only) \??\P: 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe File opened (read-only) \??\X: 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe File opened (read-only) \??\A: 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe File opened (read-only) \??\B: 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe File opened (read-only) \??\G: 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe File opened (read-only) \??\K: 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe File opened (read-only) \??\O: 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe File opened (read-only) \??\T: 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe File opened (read-only) \??\F: 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe File opened (read-only) \??\I: 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe File opened (read-only) \??\L: 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe File opened (read-only) \??\S: 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe File opened (read-only) \??\U: 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe File opened (read-only) \??\W: 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe File opened (read-only) \??\Y: 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\system32\spool\PRINTERS\00002.SPL 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe File created C:\Windows\system32\spool\PRINTERS\00003.SPL 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe File created C:\Windows\system32\spool\PRINTERS\PPx39r24p46vqq1wdvsmunyl0hb.TMP printfilterpipelinesvc.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\background-image.jpg" 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ONENOTE.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU ONENOTE.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5272 ONENOTE.EXE 5272 ONENOTE.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 3724 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 3724 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 3724 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 3724 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 3724 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 3724 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 3724 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 3724 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 3724 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 3724 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 3724 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 3724 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 3724 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 3724 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 3724 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 3724 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 3724 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 3724 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 3724 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 3724 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 3724 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 3724 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 3724 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 3724 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 3724 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 3724 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 3724 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 3724 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 3724 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 3724 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 3724 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 3724 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 3724 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 3724 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 3724 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 3724 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 3724 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 3724 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 3724 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 3724 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 3724 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 3724 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 3724 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 3724 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 3724 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 3724 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 3724 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 3724 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 3724 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 3724 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 3724 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 3724 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 3724 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 3724 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 3724 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 3724 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 3724 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 3724 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 3724 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 3724 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 3724 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 3724 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 3724 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe Token: SeTakeOwnershipPrivilege 3724 5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 5272 ONENOTE.EXE 5272 ONENOTE.EXE 5272 ONENOTE.EXE 5272 ONENOTE.EXE 5272 ONENOTE.EXE 5272 ONENOTE.EXE 5272 ONENOTE.EXE 5272 ONENOTE.EXE 5272 ONENOTE.EXE 5272 ONENOTE.EXE 5272 ONENOTE.EXE 5272 ONENOTE.EXE 5272 ONENOTE.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 6112 wrote to memory of 5272 6112 printfilterpipelinesvc.exe 93 PID 6112 wrote to memory of 5272 6112 printfilterpipelinesvc.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe"C:\Users\Admin\AppData\Local\Temp\5e3c44ac77cba228f54304f7f1f9ee4d86099950f230186f11fffaa76c86a5db.exe"1⤵
- Enumerates connected drives
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3724
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:5928
-
C:\Windows\system32\printfilterpipelinesvc.exeC:\Windows\system32\printfilterpipelinesvc.exe -Embedding1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:6112 -
C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE/insertdoc "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\{2DC66429-43EF-4ED8-8B32-B08578DECBA1}.xps" 1337664007820600002⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5272
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5185052dfe73e7f806a16d8fccceab907
SHA1297b9e82de3967577b8e6807c1e2630d21f6bccc
SHA25664fd0d891e1536f4c7ebdd03ed23c44b84d902e73a96555a5fcd394c6d7a1e45
SHA512a9a26303d52cac73c9ef929541f4a6010a22a3e7e20da00d60fae02788429a47af2c4af524b62f7665ec39ce44b4c961069aba3244785c017db87e28b85cff0b
-
Filesize
64KB
MD5fcd6bcb56c1689fcef28b57c22475bad
SHA11adc95bebe9eea8c112d40cd04ab7a8d75c4f961
SHA256de2f256064a0af797747c2b97505dc0b9f3df0de4f489eac731c23ae9ca9cc31
SHA51273e4153936dab198397b74ee9efc26093dda721eaab2f8d92786891153b45b04265a161b169c988edb0db2c53124607b6eaaa816559c5ce54f3dbc9fa6a7a4b2
-
Filesize
4KB
MD5e9687793a250abbf3e6477dece2a9627
SHA174444173383b3d482d51a268d310d2976caf0842
SHA256b5a54e7a292af8409ce2cdf9a6aa31b442e96aa6807af786bf0d530134b99103
SHA512c2081c8680bb22322be597755fbae05eeda8f07a54adeae8134dc5ac0230d64e44cc3a46dfa059e12afe8da6da424830bdc380881095edaad939f330af239755
-
Filesize
3KB
MD51199e508b695d85ef8b551d76a107cfa
SHA1a43b5ba491d89c62c0a44b586de383d90d11a090
SHA25682ae87050e17230d4a155fcae387e4717b93a0b65c667fb4148b63caaaf078ac
SHA5125e7beb97dabf878aebb7f7b68d1c4efcd86b98bd378605370f26b8fdd58d308ea99caa2f06491d77ae20de552f92a1bbbc0fd53d0130edb33af681a023a2eb3b