Analysis
-
max time kernel
150s -
max time network
152s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 19:43
Static task
static1
Behavioral task
behavioral1
Sample
36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe
Resource
win10v2004-20241007-en
General
-
Target
36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe
-
Size
1.7MB
-
MD5
3e70a8fd1f8a45868e6f9e7f61dac897
-
SHA1
a21eb76ae78364e569eebe5768a32921af15a7be
-
SHA256
36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4
-
SHA512
7d8fbece9d596c2a556885b5e57edb5f2b07f3fd585a8b1c07c22af10ff653eada6553352fc2b40269fad14e8bd69f7b4138f2033e4c20af9d189c13f0a10397
-
SSDEEP
49152:BDDJhbYW4ocuJ5txUJG5SEm6xlbTT1z6F/iiDJZ:RDJJYW4ocu2b61A68
Malware Config
Extracted
C:\ProgramData\Adobe\INC-README.html
https://twitter.com/hashtag/incransom?f=live</span>
Extracted
C:\ProgramData\Adobe\INC-README.txt
inc_ransom
http://incblog6qu4y4mm4zvw5nrmue6qbwtgjsxpw6b7ixzssu36tsajldoad.onion/
http://incblog7vmuq7rktic73r4ha4j757m3ptym37tyvifzp2roedyyzzxid.onion/
http://incapt.su/
https://twitter.com/hashtag/incransom?f=live
http://incpaykabjqc2mtdxq6c23nqh4x6m5dkps5fr6vgdkgzp5njssx6qkid.onion/
Signatures
-
INC Ransomware
INC Ransom is a ransomware that emerged in July 2023.
-
Inc_ransom family
-
Renames multiple (320) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\Q: 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe File opened (read-only) \??\R: 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe File opened (read-only) \??\V: 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe File opened (read-only) \??\X: 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe File opened (read-only) \??\K: 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe File opened (read-only) \??\P: 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe File opened (read-only) \??\J: 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe File opened (read-only) \??\O: 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe File opened (read-only) \??\S: 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe File opened (read-only) \??\F: 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe File opened (read-only) \??\G: 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe File opened (read-only) \??\H: 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe File opened (read-only) \??\I: 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe File opened (read-only) \??\L: 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe File opened (read-only) \??\T: 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe File opened (read-only) \??\W: 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe File opened (read-only) \??\Z: 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe File opened (read-only) \??\A: 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe File opened (read-only) \??\B: 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe File opened (read-only) \??\N: 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe File opened (read-only) \??\U: 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe File opened (read-only) \??\Y: 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe File opened (read-only) \??\E: 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe File opened (read-only) \??\M: 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\system32\spool\PRINTERS\00002.SPL 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe File created C:\Windows\system32\spool\PRINTERS\00003.SPL 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe File created C:\Windows\system32\spool\PRINTERS\PP2x09p9_wlutgm5hrkfg3158x.TMP printfilterpipelinesvc.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-2045521122-590294423-3465680274-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\background-image.jpg" 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ONENOTE.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU ONENOTE.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5976 ONENOTE.EXE 5976 ONENOTE.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2680 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe Token: SeTakeOwnershipPrivilege 2680 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe Token: SeTakeOwnershipPrivilege 2680 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe Token: SeTakeOwnershipPrivilege 2680 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe Token: SeTakeOwnershipPrivilege 2680 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe Token: SeTakeOwnershipPrivilege 2680 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe Token: SeTakeOwnershipPrivilege 2680 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe Token: SeTakeOwnershipPrivilege 2680 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe Token: SeTakeOwnershipPrivilege 2680 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe Token: SeTakeOwnershipPrivilege 2680 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe Token: SeTakeOwnershipPrivilege 2680 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe Token: SeTakeOwnershipPrivilege 2680 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe Token: SeTakeOwnershipPrivilege 2680 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe Token: SeTakeOwnershipPrivilege 2680 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe Token: SeTakeOwnershipPrivilege 2680 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe Token: SeTakeOwnershipPrivilege 2680 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe Token: SeTakeOwnershipPrivilege 2680 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe Token: SeTakeOwnershipPrivilege 2680 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe Token: SeTakeOwnershipPrivilege 2680 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe Token: SeTakeOwnershipPrivilege 2680 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe Token: SeTakeOwnershipPrivilege 2680 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe Token: SeTakeOwnershipPrivilege 2680 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe Token: SeTakeOwnershipPrivilege 2680 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe Token: SeTakeOwnershipPrivilege 2680 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe Token: SeTakeOwnershipPrivilege 2680 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe Token: SeTakeOwnershipPrivilege 2680 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe Token: SeTakeOwnershipPrivilege 2680 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe Token: SeTakeOwnershipPrivilege 2680 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe Token: SeTakeOwnershipPrivilege 2680 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe Token: SeTakeOwnershipPrivilege 2680 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe Token: SeTakeOwnershipPrivilege 2680 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe Token: SeTakeOwnershipPrivilege 2680 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe Token: SeTakeOwnershipPrivilege 2680 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe Token: SeTakeOwnershipPrivilege 2680 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe Token: SeTakeOwnershipPrivilege 2680 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe Token: SeTakeOwnershipPrivilege 2680 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe Token: SeTakeOwnershipPrivilege 2680 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe Token: SeTakeOwnershipPrivilege 2680 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe Token: SeTakeOwnershipPrivilege 2680 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe Token: SeTakeOwnershipPrivilege 2680 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe Token: SeTakeOwnershipPrivilege 2680 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe Token: SeTakeOwnershipPrivilege 2680 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe Token: SeTakeOwnershipPrivilege 2680 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe Token: SeTakeOwnershipPrivilege 2680 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe Token: SeTakeOwnershipPrivilege 2680 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe Token: SeTakeOwnershipPrivilege 2680 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe Token: SeTakeOwnershipPrivilege 2680 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe Token: SeTakeOwnershipPrivilege 2680 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe Token: SeTakeOwnershipPrivilege 2680 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe Token: SeTakeOwnershipPrivilege 2680 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe Token: SeTakeOwnershipPrivilege 2680 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe Token: SeTakeOwnershipPrivilege 2680 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe Token: SeTakeOwnershipPrivilege 2680 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe Token: SeTakeOwnershipPrivilege 2680 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe Token: SeTakeOwnershipPrivilege 2680 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe Token: SeTakeOwnershipPrivilege 2680 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe Token: SeTakeOwnershipPrivilege 2680 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe Token: SeTakeOwnershipPrivilege 2680 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe Token: SeTakeOwnershipPrivilege 2680 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe Token: SeTakeOwnershipPrivilege 2680 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe Token: SeTakeOwnershipPrivilege 2680 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe Token: SeTakeOwnershipPrivilege 2680 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe Token: SeTakeOwnershipPrivilege 2680 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe Token: SeTakeOwnershipPrivilege 2680 36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 5976 ONENOTE.EXE 5976 ONENOTE.EXE 5976 ONENOTE.EXE 5976 ONENOTE.EXE 5976 ONENOTE.EXE 5976 ONENOTE.EXE 5976 ONENOTE.EXE 5976 ONENOTE.EXE 5976 ONENOTE.EXE 5976 ONENOTE.EXE 5976 ONENOTE.EXE 5976 ONENOTE.EXE 5976 ONENOTE.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 1912 wrote to memory of 5976 1912 printfilterpipelinesvc.exe 100 PID 1912 wrote to memory of 5976 1912 printfilterpipelinesvc.exe 100
Processes
-
C:\Users\Admin\AppData\Local\Temp\36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe"C:\Users\Admin\AppData\Local\Temp\36e4514d9b456cc1997a45a3fdb65481c1ffc41ffbf37ca6e415107185af1dd4.exe"1⤵
- Enumerates connected drives
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2680
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:5764
-
C:\Windows\system32\printfilterpipelinesvc.exeC:\Windows\system32\printfilterpipelinesvc.exe -Embedding1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE/insertdoc "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\{32C753E0-9A3B-48B7-A486-28F225A5894B}.xps" 1337669183806600002⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5976
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5562b140eb3b669284f2e7699bd7c68ac
SHA1d0ffd542ef18d1a3faf5d21b1eb649c64a4601a5
SHA2560ea5a5d069f69d5f544c729e3214da9d3cb222bdd860c988bed94c85c04e6f6a
SHA51261199066af6ca35e46535a7eac70110e8075c5c7b3626937981f29a98de036ce34dda8d12d42e6b1ab4246240aa5d6f94db16982377042cc9b652caac2b95a2e
-
Filesize
3KB
MD5d9c613828b2c891683f2d62d4cf2842e
SHA1843eb3222c56c64ca12e847771a15e1d1d214c3b
SHA2562ff2e2cd8af63c20c717c3fe5c20463ab0fbb08e8deff883893a197f852b1814
SHA5120b5a9becb538e35ee139c42020eb2c68a85108fd57a324db2f51c8d2a8d0ed78cd954087e054b5dc54908474741a6f21b332b6d26faa974f027d792546bf30da
-
Filesize
64KB
MD5fcd6bcb56c1689fcef28b57c22475bad
SHA11adc95bebe9eea8c112d40cd04ab7a8d75c4f961
SHA256de2f256064a0af797747c2b97505dc0b9f3df0de4f489eac731c23ae9ca9cc31
SHA51273e4153936dab198397b74ee9efc26093dda721eaab2f8d92786891153b45b04265a161b169c988edb0db2c53124607b6eaaa816559c5ce54f3dbc9fa6a7a4b2
-
Filesize
4KB
MD53405a5a5065767ed26ff35f2c1f5940e
SHA11eb01d16589e4a78823e35f8325aa91a7fa0a277
SHA25630d0f31c3dcce0c1a2ace889a0e927df4f817aa2747731bcbf4987e0833ae992
SHA5123f6a0b8031acea168c296f2c23007d56fc98b4485c0735b2c8c7763218987f2589acd6526edfdbd7f6d76feac21e28d1a56728776a9e7a81c511007eb5d2eb90
-
Filesize
4KB
MD561f3d2178760fe581b754ce42a19fb98
SHA142c32c8b21427ae255caf086b754e5ef98706bad
SHA256a98a7203d3fcdc9f89438f800d2d0033be584c19b85667f8b2ab590c3cd6d19f
SHA512c96a825fa3677282cac9f640b29a13fe72460a4f0ac8fe11d1a6dec6bfe5f88ce4a07240a4d3f1aaa7dcd53cc77f64eb30973ef5ae8ff6999aaf9dec7649c181