Analysis
-
max time kernel
148s -
max time network
144s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 05:03
Static task
static1
Behavioral task
behavioral1
Sample
win.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
win.exe
Resource
win10v2004-20241007-en
General
-
Target
win.exe
-
Size
161KB
-
MD5
d18ef5a6c2bd443864132e5c7feb0c2f
-
SHA1
4a34764809f4a95d87e98abb834721be41060a6b
-
SHA256
02472036db9ec498ae565b344f099263f3218ecb785282150e8565d5cac92461
-
SHA512
dd1b3cee1145ef4332ef8c217f3d4cb3b7e74ac7a3033a467b6553e00a918940ff6c4db4c61ebd2686bc0d2424e9f2b0a207937e9b0a5b642c26a13e6a056dec
-
SSDEEP
3072:YduKWsRRjHRvsfdO3Q+rSBPJasYIeuvGaEkZSc5:bYjHiqrrT1WUc5
Malware Config
Extracted
C:\ProgramData\Adobe\INC-README.txt
inc_ransom
http://incblog6qu4y4mm4zvw5nrmue6qbwtgjsxpw6b7ixzssu36tsajldoad.onion/
http://incblog7vmuq7rktic73r4ha4j757m3ptym37tyvifzp2roedyyzzxid.onion/
http://incapt.su/
https://twitter.com/hashtag/incransom?f=live
http://incpaykabjqc2mtdxq6c23nqh4x6m5dkps5fr6vgdkgzp5njssx6qkid.onion/
Extracted
C:\ProgramData\Adobe\INC-README.html
https://twitter.com/hashtag/incransom?f=live</span>
Signatures
-
INC Ransomware
INC Ransom is a ransomware that emerged in July 2023.
-
Inc_ransom family
-
Renames multiple (309) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Y: win.exe File opened (read-only) \??\H: win.exe File opened (read-only) \??\K: win.exe File opened (read-only) \??\L: win.exe File opened (read-only) \??\T: win.exe File opened (read-only) \??\R: win.exe File opened (read-only) \??\V: win.exe File opened (read-only) \??\E: win.exe File opened (read-only) \??\J: win.exe File opened (read-only) \??\N: win.exe File opened (read-only) \??\Q: win.exe File opened (read-only) \??\U: win.exe File opened (read-only) \??\Z: win.exe File opened (read-only) \??\B: win.exe File opened (read-only) \??\G: win.exe File opened (read-only) \??\M: win.exe File opened (read-only) \??\O: win.exe File opened (read-only) \??\S: win.exe File opened (read-only) \??\W: win.exe File opened (read-only) \??\X: win.exe File opened (read-only) \??\F: win.exe File opened (read-only) \??\A: win.exe File opened (read-only) \??\I: win.exe File opened (read-only) \??\P: win.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\system32\spool\PRINTERS\00002.SPL win.exe File created C:\Windows\system32\spool\PRINTERS\00003.SPL win.exe File created C:\Windows\system32\spool\PRINTERS\PP1enayfwhd5grx15rd38oh1ddb.TMP printfilterpipelinesvc.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\background-image.jpg" win.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language win.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ONENOTE.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU ONENOTE.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5708 ONENOTE.EXE 5708 ONENOTE.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 4744 win.exe Token: SeTakeOwnershipPrivilege 4744 win.exe Token: SeTakeOwnershipPrivilege 4744 win.exe Token: SeTakeOwnershipPrivilege 4744 win.exe Token: SeTakeOwnershipPrivilege 4744 win.exe Token: SeTakeOwnershipPrivilege 4744 win.exe Token: SeTakeOwnershipPrivilege 4744 win.exe Token: SeTakeOwnershipPrivilege 4744 win.exe Token: SeTakeOwnershipPrivilege 4744 win.exe Token: SeTakeOwnershipPrivilege 4744 win.exe Token: SeTakeOwnershipPrivilege 4744 win.exe Token: SeTakeOwnershipPrivilege 4744 win.exe Token: SeTakeOwnershipPrivilege 4744 win.exe Token: SeTakeOwnershipPrivilege 4744 win.exe Token: SeTakeOwnershipPrivilege 4744 win.exe Token: SeTakeOwnershipPrivilege 4744 win.exe Token: SeTakeOwnershipPrivilege 4744 win.exe Token: SeTakeOwnershipPrivilege 4744 win.exe Token: SeTakeOwnershipPrivilege 4744 win.exe Token: SeTakeOwnershipPrivilege 4744 win.exe Token: SeTakeOwnershipPrivilege 4744 win.exe Token: SeTakeOwnershipPrivilege 4744 win.exe Token: SeTakeOwnershipPrivilege 4744 win.exe Token: SeTakeOwnershipPrivilege 4744 win.exe Token: SeTakeOwnershipPrivilege 4744 win.exe Token: SeTakeOwnershipPrivilege 4744 win.exe Token: SeTakeOwnershipPrivilege 4744 win.exe Token: SeTakeOwnershipPrivilege 4744 win.exe Token: SeTakeOwnershipPrivilege 4744 win.exe Token: SeTakeOwnershipPrivilege 4744 win.exe Token: SeTakeOwnershipPrivilege 4744 win.exe Token: SeTakeOwnershipPrivilege 4744 win.exe Token: SeTakeOwnershipPrivilege 4744 win.exe Token: SeTakeOwnershipPrivilege 4744 win.exe Token: SeTakeOwnershipPrivilege 4744 win.exe Token: SeTakeOwnershipPrivilege 4744 win.exe Token: SeTakeOwnershipPrivilege 4744 win.exe Token: SeTakeOwnershipPrivilege 4744 win.exe Token: SeTakeOwnershipPrivilege 4744 win.exe Token: SeTakeOwnershipPrivilege 4744 win.exe Token: SeTakeOwnershipPrivilege 4744 win.exe Token: SeTakeOwnershipPrivilege 4744 win.exe Token: SeTakeOwnershipPrivilege 4744 win.exe Token: SeTakeOwnershipPrivilege 4744 win.exe Token: SeTakeOwnershipPrivilege 4744 win.exe Token: SeTakeOwnershipPrivilege 4744 win.exe Token: SeTakeOwnershipPrivilege 4744 win.exe Token: SeTakeOwnershipPrivilege 4744 win.exe Token: SeTakeOwnershipPrivilege 4744 win.exe Token: SeTakeOwnershipPrivilege 4744 win.exe Token: SeTakeOwnershipPrivilege 4744 win.exe Token: SeTakeOwnershipPrivilege 4744 win.exe Token: SeTakeOwnershipPrivilege 4744 win.exe Token: SeTakeOwnershipPrivilege 4744 win.exe Token: SeTakeOwnershipPrivilege 4744 win.exe Token: SeTakeOwnershipPrivilege 4744 win.exe Token: SeTakeOwnershipPrivilege 4744 win.exe Token: SeTakeOwnershipPrivilege 4744 win.exe Token: SeTakeOwnershipPrivilege 4744 win.exe Token: SeTakeOwnershipPrivilege 4744 win.exe Token: SeTakeOwnershipPrivilege 4744 win.exe Token: SeTakeOwnershipPrivilege 4744 win.exe Token: SeTakeOwnershipPrivilege 4744 win.exe Token: SeTakeOwnershipPrivilege 4744 win.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 5708 ONENOTE.EXE 5708 ONENOTE.EXE 5708 ONENOTE.EXE 5708 ONENOTE.EXE 5708 ONENOTE.EXE 5708 ONENOTE.EXE 5708 ONENOTE.EXE 5708 ONENOTE.EXE 5708 ONENOTE.EXE 5708 ONENOTE.EXE 5708 ONENOTE.EXE 5708 ONENOTE.EXE 5708 ONENOTE.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 3076 wrote to memory of 5708 3076 printfilterpipelinesvc.exe 93 PID 3076 wrote to memory of 5708 3076 printfilterpipelinesvc.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\win.exe"C:\Users\Admin\AppData\Local\Temp\win.exe"1⤵
- Enumerates connected drives
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4744
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:5472
-
C:\Windows\system32\printfilterpipelinesvc.exeC:\Windows\system32\printfilterpipelinesvc.exe -Embedding1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:3076 -
C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE/insertdoc "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\{8EA0C5B9-9EEE-48B5-B170-AB9168234FF1}.xps" 1337663905800300002⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5708
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5fe75098393bf7204cb97b2efdc2b3125
SHA1dd77bc4c4cf68ed563eb2c9858aecd5a6b7361e9
SHA256cbae2cba2f77cddee022999f1b1c7932999eb8695201aa8c6655d2752af89aae
SHA512cee45654469f9c375f408ebfa68162fded19ef7254da57f0970da6e4c3cc771dfa89fdb28a4d26a98b7823810459761aeb0dbf0811bee0860f3404d3e23f61a9
-
Filesize
3KB
MD58cd444fe4738cd48735de6d254de4080
SHA101ee9698aca64c48ececaaf843783ab1fe756ccc
SHA256b0a13a45d517990ebf23ce1f8b947abe96da6a643274df8c8a038c7b95c624ec
SHA51236de1a2aabb67bb5631f16ddc4a1e6dc8d59897139874228520dac56ad24a1be6be35a80da2fd4d4720069a2883658be31138ee3cd83b39f6129c921778c3d4f
-
Filesize
64KB
MD5fcd6bcb56c1689fcef28b57c22475bad
SHA11adc95bebe9eea8c112d40cd04ab7a8d75c4f961
SHA256de2f256064a0af797747c2b97505dc0b9f3df0de4f489eac731c23ae9ca9cc31
SHA51273e4153936dab198397b74ee9efc26093dda721eaab2f8d92786891153b45b04265a161b169c988edb0db2c53124607b6eaaa816559c5ce54f3dbc9fa6a7a4b2
-
Filesize
4KB
MD574e51cd96bb7cbc3c286ef5aef413472
SHA14b0ed58d00e08609e8e68a1b7f8d477d9e4c85bb
SHA25675bb1102c473336056b37b7e7c6aa9ee87a5a0fea1ba8855f9e66b257a12f8ef
SHA51244ea5517cedac837af9a6bb5f1c37cb6dd1bf4a4d74443bb7fa522eb990490dbb4b2bd0a40a6dc389e68b9ca85e4880cfa29a23c095854b1e9cd5a1daf2816ab
-
Filesize
4KB
MD5df6c68f94d3308d40dcf0f42835f547f
SHA18b6c0d114cedb598dd18570f2e658afddad262e0
SHA2566d7e20b4239b58e0ebe18a63fb4b6b080b05d3422a46bdc07de421927df82409
SHA512992cae2f4976e811459c2aeb20eaeb0553a0a0f7a1431e4835b114b8aa69c6d21c74d6fbe205d97c9e3037564c126d5c40f8b6cf41778ea76ca0f62d4e05e097