Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 04:59
Static task
static1
Behavioral task
behavioral1
Sample
508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe
Resource
win10v2004-20241007-en
General
-
Target
508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe
-
Size
161KB
-
MD5
c6b6543ef258058049b0322ca8b59fd5
-
SHA1
1410c2f60840066d34f48a4be5e7e0a8126117ab
-
SHA256
508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef
-
SHA512
ff48724190a84dc39392dd69c2ead7f2180b95d9a85df22fa9967d228f1c0913de3a5fd592624a224e562d6794188183c9a23eed40b28c8afa397a1b7a480eb2
-
SSDEEP
3072:+dBK6dRsjHRvsGWO3G+gSB9ssYIeuV0lCGkZSQ5:2ajHOuVg9w0U5UQ5
Malware Config
Extracted
F:\INC-README.txt
inc_ransom
http://incblog7vmuq7rktic73r4ha4j757m3ptym37tyvifzp2roedyyzzxid.onion/
http://incapt.su/
https://twitter.com/hashtag/incransom?f=live
http://incpaysp74dphcbjyvg2eepxnl3tkgt5mq5vd4tnjusoissz342bdnad.onion/
Extracted
C:\ProgramData\Adobe\Setup\INC-README.html
https://twitter.com/hashtag/incransom?f=live</span>
Signatures
-
INC Ransomware
INC Ransom is a ransomware that emerged in July 2023.
-
Inc_ransom family
-
Renames multiple (327) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Q: 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe File opened (read-only) \??\V: 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe File opened (read-only) \??\Z: 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe File opened (read-only) \??\G: 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe File opened (read-only) \??\J: 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe File opened (read-only) \??\O: 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe File opened (read-only) \??\P: 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe File opened (read-only) \??\B: 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe File opened (read-only) \??\I: 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe File opened (read-only) \??\K: 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe File opened (read-only) \??\M: 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe File opened (read-only) \??\T: 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe File opened (read-only) \??\U: 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe File opened (read-only) \??\X: 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe File opened (read-only) \??\F: 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe File opened (read-only) \??\A: 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe File opened (read-only) \??\H: 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe File opened (read-only) \??\R: 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe File opened (read-only) \??\S: 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe File opened (read-only) \??\W: 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe File opened (read-only) \??\Y: 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe File opened (read-only) \??\E: 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe File opened (read-only) \??\L: 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe File opened (read-only) \??\N: 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\system32\spool\PRINTERS\00002.SPL 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe File created C:\Windows\system32\spool\PRINTERS\00003.SPL 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe File created C:\Windows\system32\spool\PRINTERS\PPymbs6529tlhn1fd6m8vr2p2d.TMP printfilterpipelinesvc.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\background-image.jpg" 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ONENOTE.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 ONENOTE.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU ONENOTE.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily ONENOTE.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5112 ONENOTE.EXE 5112 ONENOTE.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 4936 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4936 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4936 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4936 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4936 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4936 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4936 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4936 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4936 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4936 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4936 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4936 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4936 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4936 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4936 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4936 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4936 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4936 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4936 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4936 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4936 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4936 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4936 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4936 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4936 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4936 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4936 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4936 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4936 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4936 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4936 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4936 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4936 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4936 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4936 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4936 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4936 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4936 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4936 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4936 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4936 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4936 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4936 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4936 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4936 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4936 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4936 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4936 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4936 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4936 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4936 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4936 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4936 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4936 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4936 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4936 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4936 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4936 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4936 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4936 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4936 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4936 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4936 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe Token: SeTakeOwnershipPrivilege 4936 508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 5112 ONENOTE.EXE 5112 ONENOTE.EXE 5112 ONENOTE.EXE 5112 ONENOTE.EXE 5112 ONENOTE.EXE 5112 ONENOTE.EXE 5112 ONENOTE.EXE 5112 ONENOTE.EXE 5112 ONENOTE.EXE 5112 ONENOTE.EXE 5112 ONENOTE.EXE 5112 ONENOTE.EXE 5112 ONENOTE.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 5948 wrote to memory of 5112 5948 printfilterpipelinesvc.exe 100 PID 5948 wrote to memory of 5112 5948 printfilterpipelinesvc.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe"C:\Users\Admin\AppData\Local\Temp\508a644d552f237615d1504aa1628566fe0e752a5bc0c882fa72b3155c322cef.exe"1⤵
- Enumerates connected drives
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4936
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:5712
-
C:\Windows\system32\printfilterpipelinesvc.exeC:\Windows\system32\printfilterpipelinesvc.exe -Embedding1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5948 -
C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE/insertdoc "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\{4EF46097-8762-4323-8303-3C98E28186E9}.xps" 1337663906428200002⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5112
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD589adbf65371b89f1a1b641cd0ed59aa3
SHA10625b876a80a4520b1363affa12adc48cbafc861
SHA256e9ac28128aa563cac2ba7355c539893518215a8c47aa4a3aa3d4dba810f2a1a5
SHA512f936cc18e5e77a0b6bbac4c7c5621431a7093174708ca102d49069a4a7ab65de904ea7e53f784c6779aa99e433f76139a42bf867bc3f1cd0866de0771455c639
-
Filesize
64KB
MD56bcfd12a283868e621c36c9b0f955e01
SHA100404c0f17fb31b31848c8a479bf95f873735b95
SHA25658e90e4b9edabc8899ad5cd9e9587a3cb35fa069ade8815156c03195b671e462
SHA512db78684eb7a50f5b9e7d0e0d8e402b0dc95ac837d101a8ab20b5db6d35618ee718342ea984b8097841b04c22384e84fc5b7b6b38553624416da08df849d6bd20
-
Filesize
4KB
MD5ce66b80f3539f934217daff1bcec13ee
SHA1f658fcf79d74ed8f25cdaea3f91ff80692c7379d
SHA256f5df1f86e1b93aa538000783f5788930e9220517221c57cc654a0e5422a1b459
SHA5121d1df3d0bca0239396d46201b9c6011cbfcd8629b69e4c65a623bf01c1d1d2559e1020b150aa62ef4154dffee2e5a8ee70eaab0ff3e654f2ae19ac757eb1f801
-
Filesize
4KB
MD5baf32af51560a7fc80ebfbde41165ec1
SHA1bd89bee344f2985452b235bb793a211565c200d8
SHA256c85babc4f63a04f4ff412fcbffd13b8458292e0823cad96402042766d3705b1b
SHA5120aac037ed6adae57e84346de782905842c7eca82e92dac08097cb32b48d8b81a3b951022679b4be256ce0420111df872b38b92a13af12bcbce33182ff8c760c9
-
Filesize
3KB
MD556d11f16817d21a92d197d21074f1c01
SHA13c6d5f9ab8996b9a0a0c527a6095c13412de5da1
SHA256d837d8a34e54f30bf0816ade6ba03d0d5f9c722a512b48242ca31b1b282d314c
SHA51261bb291683d551479adddba3cfaca792af3d5fcdcfd8724aa79e795c6291dd33541d507a5ed72f48223be7b5cf77574492fb96fd76d776a39c766373144b4c60