Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 05:23
Static task
static1
Behavioral task
behavioral1
Sample
63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe
Resource
win10v2004-20241007-en
General
-
Target
63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe
-
Size
161KB
-
MD5
d1dcd52a3679608250fee82e27051cbb
-
SHA1
c4cd0bdbf16c8eb471565f5adf20af7d5408d9b1
-
SHA256
63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7
-
SHA512
c7bd37dfd86d20800cec05f8b1f9b50017afc51dd3cb8f445a6109b227648a9d2673b442a3a6971eebdaf355c09e848913aa3445e27ef44251ec0fb7d303db87
-
SSDEEP
3072:YduKWsRRjHRvsfdO3Q+rSBPJasYIeuvRaEkZSc5:bYjHiqrrT6WUc5
Malware Config
Extracted
F:\INC-README.txt
inc_ransom
http://incblog6qu4y4mm4zvw5nrmue6qbwtgjsxpw6b7ixzssu36tsajldoad.onion/
http://incblog7vmuq7rktic73r4ha4j757m3ptym37tyvifzp2roedyyzzxid.onion/
http://incapt.su/
https://twitter.com/hashtag/incransom?f=live
http://incpaykabjqc2mtdxq6c23nqh4x6m5dkps5fr6vgdkgzp5njssx6qkid.onion/
Extracted
C:\ProgramData\Adobe\Setup\INC-README.html
https://twitter.com/hashtag/incransom?f=live</span>
Signatures
-
INC Ransomware
INC Ransom is a ransomware that emerged in July 2023.
-
Inc_ransom family
-
Renames multiple (335) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\X: 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe File opened (read-only) \??\A: 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe File opened (read-only) \??\E: 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe File opened (read-only) \??\G: 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe File opened (read-only) \??\I: 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe File opened (read-only) \??\J: 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe File opened (read-only) \??\R: 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe File opened (read-only) \??\T: 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe File opened (read-only) \??\F: 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe File opened (read-only) \??\H: 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe File opened (read-only) \??\K: 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe File opened (read-only) \??\L: 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe File opened (read-only) \??\W: 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe File opened (read-only) \??\Y: 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe File opened (read-only) \??\M: 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe File opened (read-only) \??\N: 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe File opened (read-only) \??\O: 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe File opened (read-only) \??\P: 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe File opened (read-only) \??\Q: 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe File opened (read-only) \??\S: 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe File opened (read-only) \??\B: 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe File opened (read-only) \??\U: 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe File opened (read-only) \??\V: 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe File opened (read-only) \??\Z: 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\system32\spool\PRINTERS\00002.SPL 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe File created C:\Windows\system32\spool\PRINTERS\00003.SPL 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe File created C:\Windows\system32\spool\PRINTERS\PP3jw60hw_903krr0v31g_30oyd.TMP printfilterpipelinesvc.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\background-image.jpg" 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ONENOTE.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ONENOTE.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU ONENOTE.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5464 ONENOTE.EXE 5464 ONENOTE.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 4860 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe Token: SeTakeOwnershipPrivilege 4860 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe Token: SeTakeOwnershipPrivilege 4860 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe Token: SeTakeOwnershipPrivilege 4860 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe Token: SeTakeOwnershipPrivilege 4860 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe Token: SeTakeOwnershipPrivilege 4860 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe Token: SeTakeOwnershipPrivilege 4860 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe Token: SeTakeOwnershipPrivilege 4860 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe Token: SeTakeOwnershipPrivilege 4860 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe Token: SeTakeOwnershipPrivilege 4860 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe Token: SeTakeOwnershipPrivilege 4860 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe Token: SeTakeOwnershipPrivilege 4860 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe Token: SeTakeOwnershipPrivilege 4860 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe Token: SeTakeOwnershipPrivilege 4860 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe Token: SeTakeOwnershipPrivilege 4860 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe Token: SeTakeOwnershipPrivilege 4860 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe Token: SeTakeOwnershipPrivilege 4860 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe Token: SeTakeOwnershipPrivilege 4860 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe Token: SeTakeOwnershipPrivilege 4860 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe Token: SeTakeOwnershipPrivilege 4860 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe Token: SeTakeOwnershipPrivilege 4860 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe Token: SeTakeOwnershipPrivilege 4860 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe Token: SeTakeOwnershipPrivilege 4860 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe Token: SeTakeOwnershipPrivilege 4860 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe Token: SeTakeOwnershipPrivilege 4860 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe Token: SeTakeOwnershipPrivilege 4860 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe Token: SeTakeOwnershipPrivilege 4860 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe Token: SeTakeOwnershipPrivilege 4860 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe Token: SeTakeOwnershipPrivilege 4860 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe Token: SeTakeOwnershipPrivilege 4860 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe Token: SeTakeOwnershipPrivilege 4860 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe Token: SeTakeOwnershipPrivilege 4860 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe Token: SeTakeOwnershipPrivilege 4860 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe Token: SeTakeOwnershipPrivilege 4860 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe Token: SeTakeOwnershipPrivilege 4860 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe Token: SeTakeOwnershipPrivilege 4860 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe Token: SeTakeOwnershipPrivilege 4860 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe Token: SeTakeOwnershipPrivilege 4860 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe Token: SeTakeOwnershipPrivilege 4860 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe Token: SeTakeOwnershipPrivilege 4860 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe Token: SeTakeOwnershipPrivilege 4860 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe Token: SeTakeOwnershipPrivilege 4860 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe Token: SeTakeOwnershipPrivilege 4860 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe Token: SeTakeOwnershipPrivilege 4860 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe Token: SeTakeOwnershipPrivilege 4860 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe Token: SeTakeOwnershipPrivilege 4860 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe Token: SeTakeOwnershipPrivilege 4860 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe Token: SeTakeOwnershipPrivilege 4860 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe Token: SeTakeOwnershipPrivilege 4860 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe Token: SeTakeOwnershipPrivilege 4860 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe Token: SeTakeOwnershipPrivilege 4860 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe Token: SeTakeOwnershipPrivilege 4860 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe Token: SeTakeOwnershipPrivilege 4860 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe Token: SeTakeOwnershipPrivilege 4860 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe Token: SeTakeOwnershipPrivilege 4860 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe Token: SeTakeOwnershipPrivilege 4860 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe Token: SeTakeOwnershipPrivilege 4860 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe Token: SeTakeOwnershipPrivilege 4860 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe Token: SeTakeOwnershipPrivilege 4860 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe Token: SeTakeOwnershipPrivilege 4860 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe Token: SeTakeOwnershipPrivilege 4860 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe Token: SeTakeOwnershipPrivilege 4860 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe Token: SeTakeOwnershipPrivilege 4860 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe Token: SeTakeOwnershipPrivilege 4860 63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 5464 ONENOTE.EXE 5464 ONENOTE.EXE 5464 ONENOTE.EXE 5464 ONENOTE.EXE 5464 ONENOTE.EXE 5464 ONENOTE.EXE 5464 ONENOTE.EXE 5464 ONENOTE.EXE 5464 ONENOTE.EXE 5464 ONENOTE.EXE 5464 ONENOTE.EXE 5464 ONENOTE.EXE 5464 ONENOTE.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 5304 wrote to memory of 5464 5304 printfilterpipelinesvc.exe 91 PID 5304 wrote to memory of 5464 5304 printfilterpipelinesvc.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe"C:\Users\Admin\AppData\Local\Temp\63c0a44479dc9f91647a9c10caba43fa73709a88540a2493fd68031905036ef7.exe"1⤵
- Enumerates connected drives
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4860
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:5156
-
C:\Windows\system32\printfilterpipelinesvc.exeC:\Windows\system32\printfilterpipelinesvc.exe -Embedding1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5304 -
C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE/insertdoc "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\{AE93990F-57F7-4319-B249-E5CD4C74563B}.xps" 1337664020890900002⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5464
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD51ea3bdba3f83c671f92362f973347221
SHA1b7c2cd689a22338712aa8c01aa646c4ff62ce9c2
SHA25624d7784a22514777040b49e02788b34c4940687804f352e993c866a7f44d11e1
SHA5129c015710810745ec107eb92a09013391606530f583dc7abfbbb475d0e2eede07b698211bc80bde6a714ff420a7f3cf607297463f35b82462eb7f19a946721765
-
Filesize
64KB
MD5fcd6bcb56c1689fcef28b57c22475bad
SHA11adc95bebe9eea8c112d40cd04ab7a8d75c4f961
SHA256de2f256064a0af797747c2b97505dc0b9f3df0de4f489eac731c23ae9ca9cc31
SHA51273e4153936dab198397b74ee9efc26093dda721eaab2f8d92786891153b45b04265a161b169c988edb0db2c53124607b6eaaa816559c5ce54f3dbc9fa6a7a4b2
-
Filesize
4KB
MD5682fe2beeb27b38150b6cbc12eddb4a8
SHA1bb65cf1a120ab368ddfa1f2c7f5ae4e6b0362dc4
SHA256b05d20704109dd619a4c3fc8550b1ca13d5f4340b319157e4b84359279ff6db0
SHA512b886a2fb343924029cd5d3b10de08f0f0e43fc2d0c8e495e7113f3c6d148538631078ea1abd560a2c0a46773ff76a8699e5f4d5a1cf992516cc90a14c2eab112
-
Filesize
4KB
MD509e8bf38cd046a11e8c1ff43c09ad462
SHA16e40a88b864ad80c24f2f4a91407d989bf570429
SHA2564d802691bcb8da3a53dcf558c670991831874fb40cb69daeec5e421ff60dc898
SHA512c5a37e9903730bee282c6814ba044e3caf799aa86c71dd9de3d6c01a3820be41fc3db4c30e76059d80ef4158a5c497d2935f1d2bb4fbf6608e9cf4c0267a46e0
-
Filesize
3KB
MD591f117a2d49ad8601f8c1f71f0b430af
SHA1064a0c20827c2e1d579f2e9caff346911d14e0ac
SHA25657f39b9fb0fcf51661a7f3fbb4de2f004280414d811a69a7a6aacd3972ce0f49
SHA512b3c094cdbf5c607f5dfda05447be30b86d6cc844f37da4a9e556634794278c9d990be1115c6288782b6767029bb5f2d30102fdade60a5c4d116664a491bac712