Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 19:14
Static task
static1
Behavioral task
behavioral1
Sample
0e3f849e351cea99f9979889fc4d3700c710573a215805329eb097c533d87c3e.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
0e3f849e351cea99f9979889fc4d3700c710573a215805329eb097c533d87c3e.exe
Resource
win10v2004-20241007-en
General
-
Target
0e3f849e351cea99f9979889fc4d3700c710573a215805329eb097c533d87c3e.exe
-
Size
142KB
-
MD5
9e28725a40faab491e96a80d5c258c31
-
SHA1
2cc8ca797c6c731f0266a27176d71697e097824b
-
SHA256
0e3f849e351cea99f9979889fc4d3700c710573a215805329eb097c533d87c3e
-
SHA512
5448cdb27bc354091bb25a5cb3d17e71cad8ec2825069b177b3cddec8887e6118dc614eed41c24f948bd39751903f79e66939ae3081f175355cc2bb0d054ec29
-
SSDEEP
3072:uA5ohBykv/QGvx4TOPu5XH4KoUu2JsaO0xiQhzNHaGVV:DojR/QY4CP434KrtOiJHFVV
Malware Config
Extracted
C:\ProgramData\Adobe\INC-README.txt
inc_ransom
http://incpaysp74dphcbjyvg2eepxnl3tkgt5mq5vd4tnjusoissz342bdnad.onion/
http://incblog7vmuq7rktic73r4ha4j757m3ptym37tyvifzp2roedyyzzxid.onion/
Signatures
-
INC Ransomware
INC Ransom is a ransomware that emerged in July 2023.
-
Inc_ransom family
-
Renames multiple (317) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
Processes:
0e3f849e351cea99f9979889fc4d3700c710573a215805329eb097c533d87c3e.exedescription ioc process File opened (read-only) \??\Q: 0e3f849e351cea99f9979889fc4d3700c710573a215805329eb097c533d87c3e.exe File opened (read-only) \??\U: 0e3f849e351cea99f9979889fc4d3700c710573a215805329eb097c533d87c3e.exe File opened (read-only) \??\V: 0e3f849e351cea99f9979889fc4d3700c710573a215805329eb097c533d87c3e.exe File opened (read-only) \??\Y: 0e3f849e351cea99f9979889fc4d3700c710573a215805329eb097c533d87c3e.exe File opened (read-only) \??\F: 0e3f849e351cea99f9979889fc4d3700c710573a215805329eb097c533d87c3e.exe File opened (read-only) \??\A: 0e3f849e351cea99f9979889fc4d3700c710573a215805329eb097c533d87c3e.exe File opened (read-only) \??\M: 0e3f849e351cea99f9979889fc4d3700c710573a215805329eb097c533d87c3e.exe File opened (read-only) \??\J: 0e3f849e351cea99f9979889fc4d3700c710573a215805329eb097c533d87c3e.exe File opened (read-only) \??\L: 0e3f849e351cea99f9979889fc4d3700c710573a215805329eb097c533d87c3e.exe File opened (read-only) \??\P: 0e3f849e351cea99f9979889fc4d3700c710573a215805329eb097c533d87c3e.exe File opened (read-only) \??\S: 0e3f849e351cea99f9979889fc4d3700c710573a215805329eb097c533d87c3e.exe File opened (read-only) \??\W: 0e3f849e351cea99f9979889fc4d3700c710573a215805329eb097c533d87c3e.exe File opened (read-only) \??\E: 0e3f849e351cea99f9979889fc4d3700c710573a215805329eb097c533d87c3e.exe File opened (read-only) \??\G: 0e3f849e351cea99f9979889fc4d3700c710573a215805329eb097c533d87c3e.exe File opened (read-only) \??\H: 0e3f849e351cea99f9979889fc4d3700c710573a215805329eb097c533d87c3e.exe File opened (read-only) \??\Z: 0e3f849e351cea99f9979889fc4d3700c710573a215805329eb097c533d87c3e.exe File opened (read-only) \??\O: 0e3f849e351cea99f9979889fc4d3700c710573a215805329eb097c533d87c3e.exe File opened (read-only) \??\R: 0e3f849e351cea99f9979889fc4d3700c710573a215805329eb097c533d87c3e.exe File opened (read-only) \??\B: 0e3f849e351cea99f9979889fc4d3700c710573a215805329eb097c533d87c3e.exe File opened (read-only) \??\I: 0e3f849e351cea99f9979889fc4d3700c710573a215805329eb097c533d87c3e.exe File opened (read-only) \??\N: 0e3f849e351cea99f9979889fc4d3700c710573a215805329eb097c533d87c3e.exe File opened (read-only) \??\K: 0e3f849e351cea99f9979889fc4d3700c710573a215805329eb097c533d87c3e.exe File opened (read-only) \??\T: 0e3f849e351cea99f9979889fc4d3700c710573a215805329eb097c533d87c3e.exe File opened (read-only) \??\X: 0e3f849e351cea99f9979889fc4d3700c710573a215805329eb097c533d87c3e.exe -
Drops file in System32 directory 16 IoCs
Processes:
printfilterpipelinesvc.exesvchost.exe0e3f849e351cea99f9979889fc4d3700c710573a215805329eb097c533d87c3e.exedescription ioc process File created C:\Windows\system32\spool\PRINTERS\PPw32mmweij2i993ddkfxu537t.TMP printfilterpipelinesvc.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.chk svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSSres00001.jrs svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.dat svchost.exe File created C:\Windows\system32\spool\PRINTERS\00002.SPL 0e3f849e351cea99f9979889fc4d3700c710573a215805329eb097c533d87c3e.exe File created C:\Windows\system32\spool\PRINTERS\PP7tl2sx430dm9pun0jrue0niyc.TMP printfilterpipelinesvc.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.jcp svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSSres00002.jrs svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.chk svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.jfm svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.dat svchost.exe File created C:\Windows\system32\spool\PRINTERS\00003.SPL 0e3f849e351cea99f9979889fc4d3700c710573a215805329eb097c533d87c3e.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.log svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.jtx svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSStmp.log svchost.exe File created C:\Windows\system32\spool\PRINTERS\00004.SPL 0e3f849e351cea99f9979889fc4d3700c710573a215805329eb097c533d87c3e.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
Processes:
0e3f849e351cea99f9979889fc4d3700c710573a215805329eb097c533d87c3e.exedescription ioc process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\background-image.jpg" 0e3f849e351cea99f9979889fc4d3700c710573a215805329eb097c533d87c3e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
Processes:
0e3f849e351cea99f9979889fc4d3700c710573a215805329eb097c533d87c3e.exedescription ioc process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0e3f849e351cea99f9979889fc4d3700c710573a215805329eb097c533d87c3e.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
Processes:
ONENOTE.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ONENOTE.EXE -
Enumerates system info in registry 2 TTPs 6 IoCs
Processes:
onenoteim.exeONENOTE.EXEdescription ioc process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS onenoteim.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName onenoteim.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer onenoteim.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU ONENOTE.EXE -
Modifies registry class 4 IoCs
Processes:
onenoteim.exedescription ioc process Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\MuiCache onenoteim.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.office.onenote_8wekyb3d8bbwe\Internet Settings\Cache onenoteim.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.office.onenote_8wekyb3d8bbwe\Internet Settings onenoteim.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.office.onenote_8wekyb3d8bbwe\Internet Settings\Cache\Extensible Cache onenoteim.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
Processes:
ONENOTE.EXEpid process 5464 ONENOTE.EXE 5464 ONENOTE.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
Processes:
ONENOTE.EXEonenoteim.exepid process 5464 ONENOTE.EXE 5464 ONENOTE.EXE 5464 ONENOTE.EXE 5464 ONENOTE.EXE 5464 ONENOTE.EXE 5464 ONENOTE.EXE 5464 ONENOTE.EXE 5464 ONENOTE.EXE 5464 ONENOTE.EXE 5464 ONENOTE.EXE 2368 onenoteim.exe 5464 ONENOTE.EXE 5464 ONENOTE.EXE 5464 ONENOTE.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
Processes:
printfilterpipelinesvc.exedescription pid process target process PID 5152 wrote to memory of 5464 5152 printfilterpipelinesvc.exe ONENOTE.EXE PID 5152 wrote to memory of 5464 5152 printfilterpipelinesvc.exe ONENOTE.EXE
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e3f849e351cea99f9979889fc4d3700c710573a215805329eb097c533d87c3e.exe"C:\Users\Admin\AppData\Local\Temp\0e3f849e351cea99f9979889fc4d3700c710573a215805329eb097c533d87c3e.exe"1⤵
- Enumerates connected drives
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
PID:3100
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:6008
-
C:\Windows\system32\printfilterpipelinesvc.exeC:\Windows\system32\printfilterpipelinesvc.exe -Embedding1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5152 -
C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE/insertdoc "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\{4B0E5530-E24D-4E8D-9C10-7178F285BD3B}.xps" 1337669010462400002⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5464
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s DsSvc1⤵
- Drops file in System32 directory
PID:2844
-
C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\onenoteim.exe"C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\onenoteim.exe" -ServerName:microsoft.onenoteim.AppXxqb9ypsz6cs1w07e1pmjy4ww4dy9tpqr.mca1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2368
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD585b81261146c08f4d472d18edc33c3b6
SHA17eb932f20e9c03fc8d77007f2651cbf5aad888a4
SHA256265a0f64e8f11bbb397f0f02d035ac172a5ef02e38fdb864913a540ad9ad60b3
SHA512b8d76760065743b3ef754c6b630300e091282207048a91a2b57577d9ed6e110640946e3bc099e7777ddcefa463d718908a630e9468447c3ca1f2c57e213bdff3
-
Filesize
1KB
MD5bcbfa1399779f0779b61dd8169d2393d
SHA1424013a1f7830b13065817c5c865a2101709be92
SHA256cad9dde04935dfe6517c61ea55a40365c5f65062c4305508989a10a5c90ac03d
SHA512fd7d0721e44d0f2f5c983406b3d4b1705d2c99b44cd5fee4c46cc9950ff05fa7c985bcee882d3852038f2e3a815ed34739e66cd80418e06634e37074f8e4acdf
-
MD5
d41d8cd98f00b204e9800998ecf8427e
SHA1da39a3ee5e6b4b0d3255bfef95601890afd80709
SHA256e3b0c44298fc1c149afbf4c8996fb92427ae41e4649b934ca495991b7852b855
SHA512cf83e1357eefb8bdf1542850d66d8007d620e4050b5715dc83f4a921d36ce9ce47d0d13c5d85f2b0ff8318d2877eec2f63b931bd47417a81a538327af927da3e
-
Filesize
64KB
MD54e526d0d4ecd4f2fe7e947aeee5d2408
SHA101e572690d95cf4087d62cdec52189ac07e9bc88
SHA256d3a14643481aa327a85be39ed285cb3470a7f5aa2bc71563ab9b2b7df9cbb3d5
SHA5124b2b05173d68dd5cc39ec1b5566650c6ffe76b7bfa25266e5dc6c93d5466d05b43a24c4e9a4c64922975f7a15f7b9007ff8e38219a903451da8bdc5a25d1cef8
-
Filesize
4KB
MD59ac5a15c15b1441b4fcb56d2de9e3966
SHA1637f57b582cab29bb886df49418d6b5fd544c9b5
SHA2562c91e3fbc7ef7deeef0f0ad40220a949480cf610d4604f7141ee0dfc039ab266
SHA51278d998e61cecf645d140cfc4f3a828d3747b485f2702c3b9155341667a240ea3b5baa7e52fbf596a705ce92744475f728c25f6f78456ea15979c1a5d8ce4882a