Analysis
-
max time kernel
147s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 05:08
Static task
static1
Behavioral task
behavioral1
Sample
5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe
Resource
win10v2004-20241007-en
General
-
Target
5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe
-
Size
161KB
-
MD5
d1df32e403d1424daa322e21dd1e4d19
-
SHA1
6d3db4569fde0a3ee6e65828ebc7a638b22dc001
-
SHA256
5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486
-
SHA512
b758651295081b33299691bf337af4b57f6feb86796a628ac154c0ddbb9d1172c0eb4ce398618060a340e06079e28b3924c5f737be42016a82b0f6f8d4efa9cc
-
SSDEEP
3072:YduKWsRRjHRvsfdO3Q+rSBPJasYIeuvUaEkZSc5:bYjHiqrrTzWUc5
Malware Config
Extracted
F:\INC-README.html
https://twitter.com/hashtag/incransom?f=live</span>
Extracted
F:\INC-README.txt
inc_ransom
http://incblog6qu4y4mm4zvw5nrmue6qbwtgjsxpw6b7ixzssu36tsajldoad.onion/
http://incblog7vmuq7rktic73r4ha4j757m3ptym37tyvifzp2roedyyzzxid.onion/
http://incapt.su/
https://twitter.com/hashtag/incransom?f=live
http://incpaykabjqc2mtdxq6c23nqh4x6m5dkps5fr6vgdkgzp5njssx6qkid.onion/
Signatures
-
INC Ransomware
INC Ransom is a ransomware that emerged in July 2023.
-
Inc_ransom family
-
Renames multiple (297) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\P: 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe File opened (read-only) \??\R: 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe File opened (read-only) \??\S: 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe File opened (read-only) \??\W: 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe File opened (read-only) \??\H: 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe File opened (read-only) \??\L: 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe File opened (read-only) \??\M: 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe File opened (read-only) \??\E: 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe File opened (read-only) \??\U: 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe File opened (read-only) \??\X: 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe File opened (read-only) \??\Q: 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe File opened (read-only) \??\T: 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe File opened (read-only) \??\Y: 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe File opened (read-only) \??\Z: 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe File opened (read-only) \??\A: 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe File opened (read-only) \??\G: 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe File opened (read-only) \??\I: 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe File opened (read-only) \??\K: 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe File opened (read-only) \??\N: 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe File opened (read-only) \??\O: 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe File opened (read-only) \??\V: 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe File opened (read-only) \??\F: 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe File opened (read-only) \??\B: 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe File opened (read-only) \??\J: 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\system32\spool\PRINTERS\00003.SPL 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe File created C:\Windows\system32\spool\PRINTERS\PPlj5mfyvce7ryzma7ytw87in9b.TMP printfilterpipelinesvc.exe File created C:\Windows\system32\spool\PRINTERS\00002.SPL 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1045960512-3948844814-3059691613-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\background-image.jpg" 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ONENOTE.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU ONENOTE.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5856 ONENOTE.EXE 5856 ONENOTE.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 1684 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 1684 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 1684 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 1684 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 1684 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 1684 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 1684 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 1684 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 1684 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 1684 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 1684 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 1684 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 1684 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 1684 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 1684 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 1684 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 1684 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 1684 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 1684 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 1684 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 1684 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 1684 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 1684 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 1684 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 1684 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 1684 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 1684 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 1684 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 1684 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 1684 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 1684 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 1684 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 1684 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 1684 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 1684 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 1684 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 1684 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 1684 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 1684 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 1684 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 1684 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 1684 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 1684 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 1684 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 1684 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 1684 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 1684 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 1684 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 1684 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 1684 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 1684 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 1684 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 1684 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 1684 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 1684 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 1684 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 1684 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 1684 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 1684 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 1684 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 1684 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 1684 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 1684 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe Token: SeTakeOwnershipPrivilege 1684 5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 5856 ONENOTE.EXE 5856 ONENOTE.EXE 5856 ONENOTE.EXE 5856 ONENOTE.EXE 5856 ONENOTE.EXE 5856 ONENOTE.EXE 5856 ONENOTE.EXE 5856 ONENOTE.EXE 5856 ONENOTE.EXE 5856 ONENOTE.EXE 5856 ONENOTE.EXE 5856 ONENOTE.EXE 5856 ONENOTE.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 5680 wrote to memory of 5856 5680 printfilterpipelinesvc.exe 102 PID 5680 wrote to memory of 5856 5680 printfilterpipelinesvc.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe"C:\Users\Admin\AppData\Local\Temp\5a8883ad96a944593103f2f7f3a692ea3cde1ede71cf3de6750eb7a044a61486.exe"1⤵
- Enumerates connected drives
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1684
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:5516
-
C:\Windows\system32\printfilterpipelinesvc.exeC:\Windows\system32\printfilterpipelinesvc.exe -Embedding1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5680 -
C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE/insertdoc "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\{83C105A5-763F-483B-BE5B-2D460DF8763C}.xps" 1337663933432800002⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5856
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
64KB
MD5fcd6bcb56c1689fcef28b57c22475bad
SHA11adc95bebe9eea8c112d40cd04ab7a8d75c4f961
SHA256de2f256064a0af797747c2b97505dc0b9f3df0de4f489eac731c23ae9ca9cc31
SHA51273e4153936dab198397b74ee9efc26093dda721eaab2f8d92786891153b45b04265a161b169c988edb0db2c53124607b6eaaa816559c5ce54f3dbc9fa6a7a4b2
-
Filesize
4KB
MD5d262e06071821fddd8e90455b17ca364
SHA1a9d8e28fc09a28ffdb50a836c3cd4eec34250c1f
SHA25636595a6ccfe55133538aae74e3f51b12f8ed27eb757fd4a899bdc2635bb04ce2
SHA5129d417f79871f41948c4515e458af6c7253b3fedc1c09a475e843d7635a673f22b6aa0165f13f94f1a25630a8c3d0aba2177a6a8d8bbacccdb6f7fa1a4797c775
-
Filesize
8KB
MD5bc7b54e804ba2d052146e9f5b2999f90
SHA1720f020a595a1c238d813033241a4e2e06cb2390
SHA256bcad856842ff5fecf7e009cbab191f8b3dcedf14abf0dded801fe33160c4e31e
SHA5126b4947fec5548e31b4ebde18bacf04c085745ad80d505c4263f21b18274ddc86fcb691f2f26189dbd41202ef51a536fdde006230cc48f15e2905827600cf3e99
-
Filesize
3KB
MD55a6172f2b871ef4696625d381732302e
SHA1dffc38dbd49a451f7f064d1836458280e5d5cc00
SHA256616e24f1fc0ff31ddbe26321f6dba1b665652f017a966afa3dd16d630ce1d201
SHA512d4e9ab8322371a19577d845a6540a8875232282586dbd785cf06730d2d94f57dc18cfe821e5e91fd6f86ab8d1da3f5b4ff763ce22d700de2215e9041b5a39ab4