Analysis
-
max time kernel
147s -
max time network
145s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
21-11-2024 20:00
Static task
static1
Behavioral task
behavioral1
Sample
58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe
Resource
win7-20241023-en
Behavioral task
behavioral2
Sample
58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe
Resource
win10v2004-20241007-en
General
-
Target
58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe
-
Size
161KB
-
MD5
ac75e404ea7711a5b3c2e84549190059
-
SHA1
d0437f25605d8bc28cc9801205a46747e6e39c80
-
SHA256
58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7
-
SHA512
6051e7adbf6300dc0616129349a4e865198b5f8af39cd8f47bcdee287d438b8743bd386e4ac04c7276efcc7880f53eace0740bdadf2ef77287b5bee166c120cf
-
SSDEEP
3072:YduKWsRRjHRvsfdO3Q+rSBPJasYIeuvUaEkZSc5o:bYjHiqrrTLWUc5o
Malware Config
Extracted
F:\INC-README.txt
inc_ransom
http://incblog6qu4y4mm4zvw5nrmue6qbwtgjsxpw6b7ixzssu36tsajldoad.onion/
http://incblog7vmuq7rktic73r4ha4j757m3ptym37tyvifzp2roedyyzzxid.onion/
http://incapt.su/
https://twitter.com/hashtag/incransom?f=live
http://incpaykabjqc2mtdxq6c23nqh4x6m5dkps5fr6vgdkgzp5njssx6qkid.onion/
Extracted
C:\ProgramData\Adobe\Setup\INC-README.html
https://twitter.com/hashtag/incransom?f=live</span>
Signatures
-
INC Ransomware
INC Ransom is a ransomware that emerged in July 2023.
-
Inc_ransom family
-
Renames multiple (262) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\T: 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe File opened (read-only) \??\V: 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe File opened (read-only) \??\X: 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe File opened (read-only) \??\Z: 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe File opened (read-only) \??\G: 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe File opened (read-only) \??\H: 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe File opened (read-only) \??\P: 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe File opened (read-only) \??\U: 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe File opened (read-only) \??\Y: 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe File opened (read-only) \??\M: 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe File opened (read-only) \??\O: 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe File opened (read-only) \??\Q: 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe File opened (read-only) \??\F: 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe File opened (read-only) \??\A: 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe File opened (read-only) \??\I: 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe File opened (read-only) \??\K: 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe File opened (read-only) \??\L: 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe File opened (read-only) \??\N: 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe File opened (read-only) \??\R: 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe File opened (read-only) \??\S: 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe File opened (read-only) \??\B: 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe File opened (read-only) \??\E: 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe File opened (read-only) \??\J: 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe File opened (read-only) \??\W: 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\system32\spool\PRINTERS\00002.SPL 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe File created C:\Windows\system32\spool\PRINTERS\00003.SPL 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe File created C:\Windows\system32\spool\PRINTERS\PPm045od4c1qnp5lx8ye_dh7sod.TMP printfilterpipelinesvc.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-3350944739-639801879-157714471-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\background-image.jpg" 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ONENOTE.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU ONENOTE.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily ONENOTE.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5152 ONENOTE.EXE 5152 ONENOTE.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 64 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe Token: SeTakeOwnershipPrivilege 64 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe Token: SeTakeOwnershipPrivilege 64 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe Token: SeTakeOwnershipPrivilege 64 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe Token: SeTakeOwnershipPrivilege 64 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe Token: SeTakeOwnershipPrivilege 64 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe Token: SeTakeOwnershipPrivilege 64 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe Token: SeTakeOwnershipPrivilege 64 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe Token: SeTakeOwnershipPrivilege 64 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe Token: SeTakeOwnershipPrivilege 64 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe Token: SeTakeOwnershipPrivilege 64 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe Token: SeTakeOwnershipPrivilege 64 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe Token: SeTakeOwnershipPrivilege 64 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe Token: SeTakeOwnershipPrivilege 64 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe Token: SeTakeOwnershipPrivilege 64 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe Token: SeTakeOwnershipPrivilege 64 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe Token: SeTakeOwnershipPrivilege 64 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe Token: SeTakeOwnershipPrivilege 64 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe Token: SeTakeOwnershipPrivilege 64 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe Token: SeTakeOwnershipPrivilege 64 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe Token: SeTakeOwnershipPrivilege 64 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe Token: SeTakeOwnershipPrivilege 64 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe Token: SeTakeOwnershipPrivilege 64 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe Token: SeTakeOwnershipPrivilege 64 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe Token: SeTakeOwnershipPrivilege 64 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe Token: SeTakeOwnershipPrivilege 64 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe Token: SeTakeOwnershipPrivilege 64 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe Token: SeTakeOwnershipPrivilege 64 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe Token: SeTakeOwnershipPrivilege 64 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe Token: SeTakeOwnershipPrivilege 64 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe Token: SeTakeOwnershipPrivilege 64 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe Token: SeTakeOwnershipPrivilege 64 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe Token: SeTakeOwnershipPrivilege 64 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe Token: SeTakeOwnershipPrivilege 64 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe Token: SeTakeOwnershipPrivilege 64 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe Token: SeTakeOwnershipPrivilege 64 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe Token: SeTakeOwnershipPrivilege 64 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe Token: SeTakeOwnershipPrivilege 64 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe Token: SeTakeOwnershipPrivilege 64 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe Token: SeTakeOwnershipPrivilege 64 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe Token: SeTakeOwnershipPrivilege 64 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe Token: SeTakeOwnershipPrivilege 64 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe Token: SeTakeOwnershipPrivilege 64 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe Token: SeTakeOwnershipPrivilege 64 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe Token: SeTakeOwnershipPrivilege 64 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe Token: SeTakeOwnershipPrivilege 64 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe Token: SeTakeOwnershipPrivilege 64 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe Token: SeTakeOwnershipPrivilege 64 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe Token: SeTakeOwnershipPrivilege 64 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe Token: SeTakeOwnershipPrivilege 64 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe Token: SeTakeOwnershipPrivilege 64 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe Token: SeTakeOwnershipPrivilege 64 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe Token: SeTakeOwnershipPrivilege 64 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe Token: SeTakeOwnershipPrivilege 64 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe Token: SeTakeOwnershipPrivilege 64 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe Token: SeTakeOwnershipPrivilege 64 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe Token: SeTakeOwnershipPrivilege 64 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe Token: SeTakeOwnershipPrivilege 64 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe Token: SeTakeOwnershipPrivilege 64 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe Token: SeTakeOwnershipPrivilege 64 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe Token: SeTakeOwnershipPrivilege 64 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe Token: SeTakeOwnershipPrivilege 64 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe Token: SeTakeOwnershipPrivilege 64 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe Token: SeTakeOwnershipPrivilege 64 58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 5152 ONENOTE.EXE 5152 ONENOTE.EXE 5152 ONENOTE.EXE 5152 ONENOTE.EXE 5152 ONENOTE.EXE 5152 ONENOTE.EXE 5152 ONENOTE.EXE 5152 ONENOTE.EXE 5152 ONENOTE.EXE 5152 ONENOTE.EXE 5152 ONENOTE.EXE 5152 ONENOTE.EXE 5152 ONENOTE.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 6072 wrote to memory of 5152 6072 printfilterpipelinesvc.exe 101 PID 6072 wrote to memory of 5152 6072 printfilterpipelinesvc.exe 101
Processes
-
C:\Users\Admin\AppData\Local\Temp\58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe"C:\Users\Admin\AppData\Local\Temp\58cea6f8176b984d328e593b7bdfbb41cf4a43aa8184d30acf49121066cff8d7.exe"1⤵
- Enumerates connected drives
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:64
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:5904
-
C:\Windows\system32\printfilterpipelinesvc.exeC:\Windows\system32\printfilterpipelinesvc.exe -Embedding1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:6072 -
C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE/insertdoc "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\{3464A0BA-03E0-4A1D-8EFE-A41464026493}.xps" 1337669287384000002⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5152
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD53d1d522b4e9a785d56049e53a6d89b05
SHA1908c95acee3102315bc70f5bd516fb033f8ca5d2
SHA2566c725e64aa7502f0348947a845f30f8b7ab3e8147fe66dda906a0b9a1a1c1926
SHA512f6949a7843c7c9ddc7958efa62578cb7dfcd8fe23f094e19c3dbd382880080d6352f76f310447eb484d2bff97461c66570d08f9bfbbfc854e0cb8cfc38a0e432
-
Filesize
64KB
MD5fcd6bcb56c1689fcef28b57c22475bad
SHA11adc95bebe9eea8c112d40cd04ab7a8d75c4f961
SHA256de2f256064a0af797747c2b97505dc0b9f3df0de4f489eac731c23ae9ca9cc31
SHA51273e4153936dab198397b74ee9efc26093dda721eaab2f8d92786891153b45b04265a161b169c988edb0db2c53124607b6eaaa816559c5ce54f3dbc9fa6a7a4b2
-
Filesize
4KB
MD52cb317e9129de6b8673eb197f7884ef6
SHA1e63ef524a80260cf9d4c37d6b4b574dac0dfdcec
SHA256a6935422462e90e7190955e610dba6c0ea9e395e47bb533fabde3d0d6c8332cd
SHA5128c2c163d5aa200f0bf3c572f6b7debc8fac1286209f4399a6c9b536f164c81c74ae6e151fbeeeddf2b5fcf0d03dc30ec7c5f545a30815f802e2d44514281092d
-
Filesize
3KB
MD5b5e1a43759ef29b429bde65e4b5b77aa
SHA1ba3a40948c4515c75d5b67a0408a619fe53911ca
SHA256570796fd80f4c30b21750581b28b7de7561381850b408924d05cfb47a1d2cfa4
SHA512bc9635d6b749c9cd66a6403b30e4c429b07c4ef5e7259ba33cf5fa84e35f94e3294b8e7ff1c5d268036e890b3e2e54f44cd0def18de439ce97f67df201c13675