Analysis
-
max time kernel
148s -
max time network
149s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 19:14
Static task
static1
Behavioral task
behavioral1
Sample
0e3f849e351cea99f9979889fc4d3700c710573a215805329eb097c533d87c3e.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
0e3f849e351cea99f9979889fc4d3700c710573a215805329eb097c533d87c3e.exe
Resource
win10v2004-20241007-en
General
-
Target
0e3f849e351cea99f9979889fc4d3700c710573a215805329eb097c533d87c3e.exe
-
Size
142KB
-
MD5
9e28725a40faab491e96a80d5c258c31
-
SHA1
2cc8ca797c6c731f0266a27176d71697e097824b
-
SHA256
0e3f849e351cea99f9979889fc4d3700c710573a215805329eb097c533d87c3e
-
SHA512
5448cdb27bc354091bb25a5cb3d17e71cad8ec2825069b177b3cddec8887e6118dc614eed41c24f948bd39751903f79e66939ae3081f175355cc2bb0d054ec29
-
SSDEEP
3072:uA5ohBykv/QGvx4TOPu5XH4KoUu2JsaO0xiQhzNHaGVV:DojR/QY4CP434KrtOiJHFVV
Malware Config
Extracted
C:\ProgramData\Adobe\INC-README.txt
inc_ransom
http://incpaysp74dphcbjyvg2eepxnl3tkgt5mq5vd4tnjusoissz342bdnad.onion/
http://incblog7vmuq7rktic73r4ha4j757m3ptym37tyvifzp2roedyyzzxid.onion/
Signatures
-
INC Ransomware
INC Ransom is a ransomware that emerged in July 2023.
-
Inc_ransom family
-
Renames multiple (317) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Q: 0e3f849e351cea99f9979889fc4d3700c710573a215805329eb097c533d87c3e.exe File opened (read-only) \??\U: 0e3f849e351cea99f9979889fc4d3700c710573a215805329eb097c533d87c3e.exe File opened (read-only) \??\V: 0e3f849e351cea99f9979889fc4d3700c710573a215805329eb097c533d87c3e.exe File opened (read-only) \??\Y: 0e3f849e351cea99f9979889fc4d3700c710573a215805329eb097c533d87c3e.exe File opened (read-only) \??\F: 0e3f849e351cea99f9979889fc4d3700c710573a215805329eb097c533d87c3e.exe File opened (read-only) \??\A: 0e3f849e351cea99f9979889fc4d3700c710573a215805329eb097c533d87c3e.exe File opened (read-only) \??\M: 0e3f849e351cea99f9979889fc4d3700c710573a215805329eb097c533d87c3e.exe File opened (read-only) \??\J: 0e3f849e351cea99f9979889fc4d3700c710573a215805329eb097c533d87c3e.exe File opened (read-only) \??\L: 0e3f849e351cea99f9979889fc4d3700c710573a215805329eb097c533d87c3e.exe File opened (read-only) \??\P: 0e3f849e351cea99f9979889fc4d3700c710573a215805329eb097c533d87c3e.exe File opened (read-only) \??\S: 0e3f849e351cea99f9979889fc4d3700c710573a215805329eb097c533d87c3e.exe File opened (read-only) \??\W: 0e3f849e351cea99f9979889fc4d3700c710573a215805329eb097c533d87c3e.exe File opened (read-only) \??\E: 0e3f849e351cea99f9979889fc4d3700c710573a215805329eb097c533d87c3e.exe File opened (read-only) \??\G: 0e3f849e351cea99f9979889fc4d3700c710573a215805329eb097c533d87c3e.exe File opened (read-only) \??\H: 0e3f849e351cea99f9979889fc4d3700c710573a215805329eb097c533d87c3e.exe File opened (read-only) \??\Z: 0e3f849e351cea99f9979889fc4d3700c710573a215805329eb097c533d87c3e.exe File opened (read-only) \??\O: 0e3f849e351cea99f9979889fc4d3700c710573a215805329eb097c533d87c3e.exe File opened (read-only) \??\R: 0e3f849e351cea99f9979889fc4d3700c710573a215805329eb097c533d87c3e.exe File opened (read-only) \??\B: 0e3f849e351cea99f9979889fc4d3700c710573a215805329eb097c533d87c3e.exe File opened (read-only) \??\I: 0e3f849e351cea99f9979889fc4d3700c710573a215805329eb097c533d87c3e.exe File opened (read-only) \??\N: 0e3f849e351cea99f9979889fc4d3700c710573a215805329eb097c533d87c3e.exe File opened (read-only) \??\K: 0e3f849e351cea99f9979889fc4d3700c710573a215805329eb097c533d87c3e.exe File opened (read-only) \??\T: 0e3f849e351cea99f9979889fc4d3700c710573a215805329eb097c533d87c3e.exe File opened (read-only) \??\X: 0e3f849e351cea99f9979889fc4d3700c710573a215805329eb097c533d87c3e.exe -
Drops file in System32 directory 16 IoCs
description ioc Process File created C:\Windows\system32\spool\PRINTERS\PPw32mmweij2i993ddkfxu537t.TMP printfilterpipelinesvc.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.chk svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSSres00001.jrs svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.dat svchost.exe File created C:\Windows\system32\spool\PRINTERS\00002.SPL 0e3f849e351cea99f9979889fc4d3700c710573a215805329eb097c533d87c3e.exe File created C:\Windows\system32\spool\PRINTERS\PP7tl2sx430dm9pun0jrue0niyc.TMP printfilterpipelinesvc.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.jcp svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSSres00002.jrs svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.chk svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.jfm svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSTokenDB2.dat svchost.exe File created C:\Windows\system32\spool\PRINTERS\00003.SPL 0e3f849e351cea99f9979889fc4d3700c710573a215805329eb097c533d87c3e.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.log svchost.exe File opened for modification C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSS.jtx svchost.exe File created C:\Windows\system32\config\systemprofile\AppData\Local\DataSharing\Storage\DSStmp.log svchost.exe File created C:\Windows\system32\spool\PRINTERS\00004.SPL 0e3f849e351cea99f9979889fc4d3700c710573a215805329eb097c533d87c3e.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\background-image.jpg" 0e3f849e351cea99f9979889fc4d3700c710573a215805329eb097c533d87c3e.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 0e3f849e351cea99f9979889fc4d3700c710573a215805329eb097c533d87c3e.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ONENOTE.EXE -
Enumerates system info in registry 2 TTPs 6 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS onenoteim.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemProductName onenoteim.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemManufacturer onenoteim.exe Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU ONENOTE.EXE -
Modifies registry class 4 IoCs
description ioc Process Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\MuiCache onenoteim.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.office.onenote_8wekyb3d8bbwe\Internet Settings\Cache onenoteim.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.office.onenote_8wekyb3d8bbwe\Internet Settings onenoteim.exe Key created \REGISTRY\USER\S-1-5-21-940901362-3608833189-1915618603-1000_Classes\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.office.onenote_8wekyb3d8bbwe\Internet Settings\Cache\Extensible Cache onenoteim.exe -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5464 ONENOTE.EXE 5464 ONENOTE.EXE -
Suspicious use of SetWindowsHookEx 14 IoCs
pid Process 5464 ONENOTE.EXE 5464 ONENOTE.EXE 5464 ONENOTE.EXE 5464 ONENOTE.EXE 5464 ONENOTE.EXE 5464 ONENOTE.EXE 5464 ONENOTE.EXE 5464 ONENOTE.EXE 5464 ONENOTE.EXE 5464 ONENOTE.EXE 2368 onenoteim.exe 5464 ONENOTE.EXE 5464 ONENOTE.EXE 5464 ONENOTE.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 5152 wrote to memory of 5464 5152 printfilterpipelinesvc.exe 101 PID 5152 wrote to memory of 5464 5152 printfilterpipelinesvc.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\0e3f849e351cea99f9979889fc4d3700c710573a215805329eb097c533d87c3e.exe"C:\Users\Admin\AppData\Local\Temp\0e3f849e351cea99f9979889fc4d3700c710573a215805329eb097c533d87c3e.exe"1⤵
- Enumerates connected drives
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
PID:3100
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:6008
-
C:\Windows\system32\printfilterpipelinesvc.exeC:\Windows\system32\printfilterpipelinesvc.exe -Embedding1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5152 -
C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE/insertdoc "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\{4B0E5530-E24D-4E8D-9C10-7178F285BD3B}.xps" 1337669010462400002⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5464
-
-
C:\Windows\System32\svchost.exeC:\Windows\System32\svchost.exe -k LocalSystemNetworkRestricted -p -s DsSvc1⤵
- Drops file in System32 directory
PID:2844
-
C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\onenoteim.exe"C:\Program Files\WindowsApps\Microsoft.Office.OneNote_16001.12026.20112.0_x64__8wekyb3d8bbwe\onenoteim.exe" -ServerName:microsoft.onenoteim.AppXxqb9ypsz6cs1w07e1pmjy4ww4dy9tpqr.mca1⤵
- Enumerates system info in registry
- Modifies registry class
- Suspicious use of SetWindowsHookEx
PID:2368
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
1KB
MD585b81261146c08f4d472d18edc33c3b6
SHA17eb932f20e9c03fc8d77007f2651cbf5aad888a4
SHA256265a0f64e8f11bbb397f0f02d035ac172a5ef02e38fdb864913a540ad9ad60b3
SHA512b8d76760065743b3ef754c6b630300e091282207048a91a2b57577d9ed6e110640946e3bc099e7777ddcefa463d718908a630e9468447c3ca1f2c57e213bdff3
-
Filesize
1KB
MD5bcbfa1399779f0779b61dd8169d2393d
SHA1424013a1f7830b13065817c5c865a2101709be92
SHA256cad9dde04935dfe6517c61ea55a40365c5f65062c4305508989a10a5c90ac03d
SHA512fd7d0721e44d0f2f5c983406b3d4b1705d2c99b44cd5fee4c46cc9950ff05fa7c985bcee882d3852038f2e3a815ed34739e66cd80418e06634e37074f8e4acdf
-
Filesize
64KB
MD54e526d0d4ecd4f2fe7e947aeee5d2408
SHA101e572690d95cf4087d62cdec52189ac07e9bc88
SHA256d3a14643481aa327a85be39ed285cb3470a7f5aa2bc71563ab9b2b7df9cbb3d5
SHA5124b2b05173d68dd5cc39ec1b5566650c6ffe76b7bfa25266e5dc6c93d5466d05b43a24c4e9a4c64922975f7a15f7b9007ff8e38219a903451da8bdc5a25d1cef8
-
Filesize
4KB
MD59ac5a15c15b1441b4fcb56d2de9e3966
SHA1637f57b582cab29bb886df49418d6b5fd544c9b5
SHA2562c91e3fbc7ef7deeef0f0ad40220a949480cf610d4604f7141ee0dfc039ab266
SHA51278d998e61cecf645d140cfc4f3a828d3747b485f2702c3b9155341667a240ea3b5baa7e52fbf596a705ce92744475f728c25f6f78456ea15979c1a5d8ce4882a