Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 06:29
Static task
static1
Behavioral task
behavioral1
Sample
834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe
Resource
win10v2004-20241007-en
General
-
Target
834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe
-
Size
161KB
-
MD5
211ea6dcca8b67e44d4e792f7f6a85b6
-
SHA1
ecbed7faec4a4af6d2289fbeca682a45444a84d4
-
SHA256
834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039
-
SHA512
b074b161dff97a3d55c635cbff36f0e88c4098d2392db4aa7860af94437bc5823bd1f60e1f6cc858c6306fba7f59ba14864c9ce0629618b613f36de1b0ba181b
-
SSDEEP
3072:YduKWsRRjHRvsfdO3Q+rSBPJasYIeuvYaEkZSc5:bYjHiqrrTvWUc5
Malware Config
Extracted
C:\ProgramData\Adobe\INC-README.txt
inc_ransom
http://incblog6qu4y4mm4zvw5nrmue6qbwtgjsxpw6b7ixzssu36tsajldoad.onion/
http://incblog7vmuq7rktic73r4ha4j757m3ptym37tyvifzp2roedyyzzxid.onion/
http://incapt.su/
https://twitter.com/hashtag/incransom?f=live
http://incpaykabjqc2mtdxq6c23nqh4x6m5dkps5fr6vgdkgzp5njssx6qkid.onion/
Extracted
C:\ProgramData\Adobe\INC-README.html
https://twitter.com/hashtag/incransom?f=live</span>
Signatures
-
INC Ransomware
INC Ransom is a ransomware that emerged in July 2023.
-
Inc_ransom family
-
Renames multiple (325) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\A: 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe File opened (read-only) \??\E: 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe File opened (read-only) \??\H: 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe File opened (read-only) \??\P: 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe File opened (read-only) \??\W: 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe File opened (read-only) \??\Z: 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe File opened (read-only) \??\B: 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe File opened (read-only) \??\L: 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe File opened (read-only) \??\Q: 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe File opened (read-only) \??\R: 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe File opened (read-only) \??\U: 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe File opened (read-only) \??\V: 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe File opened (read-only) \??\Y: 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe File opened (read-only) \??\G: 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe File opened (read-only) \??\M: 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe File opened (read-only) \??\O: 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe File opened (read-only) \??\S: 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe File opened (read-only) \??\F: 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe File opened (read-only) \??\I: 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe File opened (read-only) \??\J: 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe File opened (read-only) \??\K: 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe File opened (read-only) \??\N: 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe File opened (read-only) \??\T: 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe File opened (read-only) \??\X: 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\system32\spool\PRINTERS\00002.SPL 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe File created C:\Windows\system32\spool\PRINTERS\00003.SPL 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe File created C:\Windows\system32\spool\PRINTERS\PPhe6h1bhosl75imdyfib4vbq1.TMP printfilterpipelinesvc.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2437139445-1151884604-3026847218-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\background-image.jpg" 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ONENOTE.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU ONENOTE.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5752 ONENOTE.EXE 5752 ONENOTE.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 1472 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe Token: SeTakeOwnershipPrivilege 1472 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe Token: SeTakeOwnershipPrivilege 1472 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe Token: SeTakeOwnershipPrivilege 1472 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe Token: SeTakeOwnershipPrivilege 1472 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe Token: SeTakeOwnershipPrivilege 1472 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe Token: SeTakeOwnershipPrivilege 1472 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe Token: SeTakeOwnershipPrivilege 1472 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe Token: SeTakeOwnershipPrivilege 1472 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe Token: SeTakeOwnershipPrivilege 1472 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe Token: SeTakeOwnershipPrivilege 1472 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe Token: SeTakeOwnershipPrivilege 1472 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe Token: SeTakeOwnershipPrivilege 1472 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe Token: SeTakeOwnershipPrivilege 1472 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe Token: SeTakeOwnershipPrivilege 1472 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe Token: SeTakeOwnershipPrivilege 1472 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe Token: SeTakeOwnershipPrivilege 1472 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe Token: SeTakeOwnershipPrivilege 1472 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe Token: SeTakeOwnershipPrivilege 1472 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe Token: SeTakeOwnershipPrivilege 1472 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe Token: SeTakeOwnershipPrivilege 1472 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe Token: SeTakeOwnershipPrivilege 1472 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe Token: SeTakeOwnershipPrivilege 1472 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe Token: SeTakeOwnershipPrivilege 1472 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe Token: SeTakeOwnershipPrivilege 1472 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe Token: SeTakeOwnershipPrivilege 1472 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe Token: SeTakeOwnershipPrivilege 1472 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe Token: SeTakeOwnershipPrivilege 1472 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe Token: SeTakeOwnershipPrivilege 1472 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe Token: SeTakeOwnershipPrivilege 1472 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe Token: SeTakeOwnershipPrivilege 1472 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe Token: SeTakeOwnershipPrivilege 1472 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe Token: SeTakeOwnershipPrivilege 1472 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe Token: SeTakeOwnershipPrivilege 1472 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe Token: SeTakeOwnershipPrivilege 1472 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe Token: SeTakeOwnershipPrivilege 1472 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe Token: SeTakeOwnershipPrivilege 1472 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe Token: SeTakeOwnershipPrivilege 1472 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe Token: SeTakeOwnershipPrivilege 1472 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe Token: SeTakeOwnershipPrivilege 1472 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe Token: SeTakeOwnershipPrivilege 1472 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe Token: SeTakeOwnershipPrivilege 1472 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe Token: SeTakeOwnershipPrivilege 1472 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe Token: SeTakeOwnershipPrivilege 1472 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe Token: SeTakeOwnershipPrivilege 1472 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe Token: SeTakeOwnershipPrivilege 1472 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe Token: SeTakeOwnershipPrivilege 1472 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe Token: SeTakeOwnershipPrivilege 1472 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe Token: SeTakeOwnershipPrivilege 1472 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe Token: SeTakeOwnershipPrivilege 1472 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe Token: SeTakeOwnershipPrivilege 1472 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe Token: SeTakeOwnershipPrivilege 1472 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe Token: SeTakeOwnershipPrivilege 1472 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe Token: SeTakeOwnershipPrivilege 1472 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe Token: SeTakeOwnershipPrivilege 1472 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe Token: SeTakeOwnershipPrivilege 1472 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe Token: SeTakeOwnershipPrivilege 1472 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe Token: SeTakeOwnershipPrivilege 1472 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe Token: SeTakeOwnershipPrivilege 1472 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe Token: SeTakeOwnershipPrivilege 1472 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe Token: SeTakeOwnershipPrivilege 1472 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe Token: SeTakeOwnershipPrivilege 1472 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe Token: SeTakeOwnershipPrivilege 1472 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe Token: SeTakeOwnershipPrivilege 1472 834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 5752 ONENOTE.EXE 5752 ONENOTE.EXE 5752 ONENOTE.EXE 5752 ONENOTE.EXE 5752 ONENOTE.EXE 5752 ONENOTE.EXE 5752 ONENOTE.EXE 5752 ONENOTE.EXE 5752 ONENOTE.EXE 5752 ONENOTE.EXE 5752 ONENOTE.EXE 5752 ONENOTE.EXE 5752 ONENOTE.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1444 wrote to memory of 5752 1444 printfilterpipelinesvc.exe 102 PID 1444 wrote to memory of 5752 1444 printfilterpipelinesvc.exe 102
Processes
-
C:\Users\Admin\AppData\Local\Temp\834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe"C:\Users\Admin\AppData\Local\Temp\834c5f094c4a2db0f520962341b108af685efd346e5b6622eb2331b3ffa09039.exe"1⤵
- Enumerates connected drives
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:1472
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:5316
-
C:\Windows\system32\printfilterpipelinesvc.exeC:\Windows\system32\printfilterpipelinesvc.exe -Embedding1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1444 -
C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE/insertdoc "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\{2752B076-E37F-4389-B579-461A84855B1B}.xps" 1337664424176600002⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5752
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD584679a2d75c97dbda155ffe087455a82
SHA1bb25687c67ad68fc4c5769a5a1ccc9142658cad8
SHA25630bca5f76f7de623c86707e467b589655097037a5618e52174165f36979194be
SHA512674a4232870e544df17d5bd35bed90bf3e446b6bab38c4c30ab84a5d4526b95845444762cf1a04c179844214ce8a235479ceb570173b09bd66e23b218bb57de2
-
Filesize
3KB
MD5281742da4b497f548c55f1bbba434ce9
SHA1f126b48a0a916f3446128f86d3c8d75304fbdf59
SHA2567aa6081497ccd4ed68975a408dcc2886551fef3d55059a9d00f19780cf5b3544
SHA512b042ee3e0c7e2d0b6f1af508a3d33ce5338182552f7866ca9bb13b4b3fd2f54e08ad5f56a6d59d638f95f619f47d9a4f7595ee7c8843ecbca7eb3e8b4d0dab6e
-
Filesize
64KB
MD58e33ee9e17c0f2888c7fdfa506daed7f
SHA17877c90f5bd7aa4f35a1fd839ccfee2ab3783183
SHA256f02717bca437ea858e835703622a80211433c6c7aaa3e7aa9e33b93576e46776
SHA512797e1e8fb2929b2fa26822255ba62c3367de266b33434f4fbbec0df69548a38b9a63086be837f16c3a03a383f964a3a46c2e15aedc266153a481bf90809c3585
-
Filesize
4KB
MD5344f728af7a6f795bbb4ab284eba6ca1
SHA13b223ef5716be6d7c6cc45b895aa4c44a276a3da
SHA2563829a60357e0ddd406c6c993e42f3b8b8efa4158d74fc1bea2416f8e11072b10
SHA512804abb2b923f9b499b348cf8319855036dec2693da21707f3a3ec071531bc1e69c63d92a0e3102d762a07bb720e70f745cc7bf794f3cef0e02323333512b7940
-
Filesize
4KB
MD55340f89713f59b9d192e1f39c99edb81
SHA116bea3f4b3ade0f1a0ef28c0ebe0937ac0c2f333
SHA25632d34876f85d6bef4ebc6103412f044cce04734b86d12e4cf905df69f2af7605
SHA51220f772c149d30f983e8997b72ad4b43e6f26c8f49232cc0d293bc31ea022c1d43778f8fc86a6419ca5344a5c03d0c517a960f43a4683c1f49bdc44ebe23c0b27