Analysis
-
max time kernel
148s -
max time network
160s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 08:23
Static task
static1
Behavioral task
behavioral1
Sample
c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe
Resource
win10v2004-20241007-en
General
-
Target
c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe
-
Size
161KB
-
MD5
14889a7e231c4884f28aefd592e61398
-
SHA1
002ee090f71fce5363ba5d2036fae288e7b03aab
-
SHA256
c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090
-
SHA512
04b3437c09ba328e0e0697f969c613beefd4eec6c70c7bb9e0b5b7a6bb5d3303360d1d7b471d9307efd2ad60dcd078276b35546d5207939485c77c2d87a648e2
-
SSDEEP
3072:YduKWsRRjHRvsfdO3Q+rSBPJasYIeuv4aEkZSc5:bYjHiqrrTnWUc5
Malware Config
Extracted
F:\INC-README.txt
inc_ransom
http://incblog6qu4y4mm4zvw5nrmue6qbwtgjsxpw6b7ixzssu36tsajldoad.onion/
http://incblog7vmuq7rktic73r4ha4j757m3ptym37tyvifzp2roedyyzzxid.onion/
http://incapt.su/
https://twitter.com/hashtag/incransom?f=live
http://incpaykabjqc2mtdxq6c23nqh4x6m5dkps5fr6vgdkgzp5njssx6qkid.onion/
Extracted
C:\ProgramData\Adobe\INC-README.html
https://twitter.com/hashtag/incransom?f=live</span>
Signatures
-
INC Ransomware
INC Ransom is a ransomware that emerged in July 2023.
-
Inc_ransom family
-
Renames multiple (302) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\S: c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe File opened (read-only) \??\E: c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe File opened (read-only) \??\G: c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe File opened (read-only) \??\I: c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe File opened (read-only) \??\O: c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe File opened (read-only) \??\P: c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe File opened (read-only) \??\Q: c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe File opened (read-only) \??\T: c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe File opened (read-only) \??\Y: c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe File opened (read-only) \??\B: c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe File opened (read-only) \??\H: c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe File opened (read-only) \??\K: c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe File opened (read-only) \??\L: c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe File opened (read-only) \??\M: c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe File opened (read-only) \??\R: c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe File opened (read-only) \??\J: c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe File opened (read-only) \??\U: c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe File opened (read-only) \??\W: c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe File opened (read-only) \??\Z: c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe File opened (read-only) \??\F: c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe File opened (read-only) \??\A: c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe File opened (read-only) \??\N: c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe File opened (read-only) \??\V: c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe File opened (read-only) \??\X: c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\system32\spool\PRINTERS\00002.SPL c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe File created C:\Windows\system32\spool\PRINTERS\00003.SPL c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe File created C:\Windows\system32\spool\PRINTERS\PP09p0zrd0kk09ekrj40tnannl.TMP printfilterpipelinesvc.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3227495264-2217614367-4027411560-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\background-image.jpg" c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ONENOTE.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ONENOTE.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU ONENOTE.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5184 ONENOTE.EXE 5184 ONENOTE.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 768 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 768 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 768 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 768 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 768 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 768 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 768 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 768 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 768 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 768 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 768 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 768 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 768 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 768 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 768 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 768 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 768 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 768 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 768 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 768 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 768 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 768 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 768 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 768 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 768 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 768 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 768 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 768 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 768 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 768 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 768 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 768 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 768 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 768 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 768 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 768 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 768 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 768 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 768 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 768 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 768 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 768 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 768 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 768 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 768 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 768 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 768 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 768 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 768 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 768 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 768 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 768 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 768 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 768 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 768 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 768 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 768 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 768 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 768 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 768 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 768 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 768 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 768 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe Token: SeTakeOwnershipPrivilege 768 c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 5184 ONENOTE.EXE 5184 ONENOTE.EXE 5184 ONENOTE.EXE 5184 ONENOTE.EXE 5184 ONENOTE.EXE 5184 ONENOTE.EXE 5184 ONENOTE.EXE 5184 ONENOTE.EXE 5184 ONENOTE.EXE 5184 ONENOTE.EXE 5184 ONENOTE.EXE 5184 ONENOTE.EXE 5184 ONENOTE.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 5996 wrote to memory of 5184 5996 printfilterpipelinesvc.exe 93 PID 5996 wrote to memory of 5184 5996 printfilterpipelinesvc.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe"C:\Users\Admin\AppData\Local\Temp\c600e439da89f5ee5bbf5b7e3672b6165ded49dd748f06892647930e64783090.exe"1⤵
- Enumerates connected drives
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:768
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:5840
-
C:\Windows\system32\printfilterpipelinesvc.exeC:\Windows\system32\printfilterpipelinesvc.exe -Embedding1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5996 -
C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE/insertdoc "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\{E10D1EBC-E305-4446-ACA2-3C0BF4FE46C8}.xps" 1337665102612600002⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5184
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5498f0989511dd5bb1c18ef64cc2efc71
SHA1186b7ec10cd98d449b6dc89d0a943349f927e696
SHA256ff18b423865ef9d2ffc3670d7d23c6c127e887e0bc75ad59e557944634497324
SHA5129345c1695e0018b0aa6ea1764b860bd1abd828edc3ad2eb6fcd0939f0633b89f94f1667bbc041937b1d9082358ce3b51cebb9626b8bd40924b50741402101f33
-
Filesize
4KB
MD5992f852a2086ce29c0c41ec49c098944
SHA1d8d9c4aebd27e3ca219c42bcf74eda89146a90ef
SHA256d100b12829be3ce9fc4d2434b0bdd2d86f34c9bacf55b17661f5cd613b9bfca8
SHA51289eaddfcd23f5c8d5d275c4b66190df5676e6f63d7eb4e7ed3b5892a73620ee1949b108c94733ff6805c3b7f48f94dec111c6c198a882b9e31d08a196ce5690f
-
Filesize
4KB
MD580669db2fb8870a5d4f96dca50a0d179
SHA1219b11fe3cf573064c9a636a3ffa1b768b939dd4
SHA256f69f609c973b5a05c72d9156e10ec575d9f4628c6d4c990b45b31f4aa334e1b9
SHA512cd82e477308446eb7585b65e64332eb3b91c5117329287eec6e82a2d2d0ca80940a11e597e131b9f1b6809ded13c9e1c52d2d9347b507f4be6726a29698733da
-
Filesize
3KB
MD53d226c5f42d41a2da38bd29d5d007cf2
SHA1a1ce273185f889fba831f0a4a5f04e8727b4976a
SHA256287ef4614fc3d09d9d39735e57ae8d3fb55c7b22de1b83364b5f62a9e3f1a5ee
SHA512e72f075eb9418a6f7b53d7fc827ac8eca138ecf4c2ac863db85b91fed0213672d0be48e96c50b2c8703445ac6da0a2bb02ff3ff33a936eb9f3d0456f2a993972