Analysis
-
max time kernel
149s -
max time network
151s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
13-01-2025 14:40
Static task
static1
Behavioral task
behavioral1
Sample
windows.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
windows.exe
Resource
win10v2004-20241007-en
General
-
Target
windows.exe
-
Size
161KB
-
MD5
38eca0067e68a296b6142cdc9f43f5a5
-
SHA1
e58763611a199e785a7a492be9f6ec7628ded535
-
SHA256
cb320d0c18a399f8473b69c0e472180a0aa21b3936bdcc5fc290620412265c61
-
SHA512
5146219e6b82751d32250d1ac995055de0ab99fc9ee70e47d973a248b30ac47270faf8901b94ef3151d724ba6834fab963a9bd6d6243b891274e0c4d769271ed
-
SSDEEP
3072:YduKWsRRjHRvsfdO3Q+rSBPJasYIeuvdaEkZSc5:bYjHiqrrTeWUc5
Malware Config
Extracted
C:\ProgramData\Adobe\Setup\INC-README.html
https://twitter.com/hashtag/incransom?f=live</span>
Extracted
F:\INC-README.txt
inc_ransom
http://incblog6qu4y4mm4zvw5nrmue6qbwtgjsxpw6b7ixzssu36tsajldoad.onion/
http://incblog7vmuq7rktic73r4ha4j757m3ptym37tyvifzp2roedyyzzxid.onion/
http://incapt.su/
https://twitter.com/hashtag/incransom?f=live
http://incpaykabjqc2mtdxq6c23nqh4x6m5dkps5fr6vgdkgzp5njssx6qkid.onion/
Signatures
-
INC Ransomware
INC Ransom is a ransomware that emerged in July 2023.
-
Inc_ransom family
-
Renames multiple (284) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\O: windows.exe File opened (read-only) \??\Q: windows.exe File opened (read-only) \??\T: windows.exe File opened (read-only) \??\W: windows.exe File opened (read-only) \??\Z: windows.exe File opened (read-only) \??\H: windows.exe File opened (read-only) \??\N: windows.exe File opened (read-only) \??\J: windows.exe File opened (read-only) \??\K: windows.exe File opened (read-only) \??\P: windows.exe File opened (read-only) \??\U: windows.exe File opened (read-only) \??\V: windows.exe File opened (read-only) \??\X: windows.exe File opened (read-only) \??\A: windows.exe File opened (read-only) \??\G: windows.exe File opened (read-only) \??\E: windows.exe File opened (read-only) \??\Y: windows.exe File opened (read-only) \??\I: windows.exe File opened (read-only) \??\L: windows.exe File opened (read-only) \??\M: windows.exe File opened (read-only) \??\R: windows.exe File opened (read-only) \??\S: windows.exe File opened (read-only) \??\F: windows.exe File opened (read-only) \??\B: windows.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\system32\spool\PRINTERS\00003.SPL windows.exe File created C:\Windows\system32\spool\PRINTERS\PPg_oax6ct09k56fjkolljaitm.TMP printfilterpipelinesvc.exe File created C:\Windows\system32\spool\PRINTERS\00002.SPL windows.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4050598569-1597076380-177084960-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\background-image.jpg" windows.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language windows.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ONENOTE.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 ONENOTE.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU ONENOTE.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily ONENOTE.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5620 ONENOTE.EXE 5620 ONENOTE.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 4712 windows.exe Token: SeTakeOwnershipPrivilege 4712 windows.exe Token: SeTakeOwnershipPrivilege 4712 windows.exe Token: SeTakeOwnershipPrivilege 4712 windows.exe Token: SeTakeOwnershipPrivilege 4712 windows.exe Token: SeTakeOwnershipPrivilege 4712 windows.exe Token: SeTakeOwnershipPrivilege 4712 windows.exe Token: SeTakeOwnershipPrivilege 4712 windows.exe Token: SeTakeOwnershipPrivilege 4712 windows.exe Token: SeTakeOwnershipPrivilege 4712 windows.exe Token: SeTakeOwnershipPrivilege 4712 windows.exe Token: SeTakeOwnershipPrivilege 4712 windows.exe Token: SeTakeOwnershipPrivilege 4712 windows.exe Token: SeTakeOwnershipPrivilege 4712 windows.exe Token: SeTakeOwnershipPrivilege 4712 windows.exe Token: SeTakeOwnershipPrivilege 4712 windows.exe Token: SeTakeOwnershipPrivilege 4712 windows.exe Token: SeTakeOwnershipPrivilege 4712 windows.exe Token: SeTakeOwnershipPrivilege 4712 windows.exe Token: SeTakeOwnershipPrivilege 4712 windows.exe Token: SeTakeOwnershipPrivilege 4712 windows.exe Token: SeTakeOwnershipPrivilege 4712 windows.exe Token: SeTakeOwnershipPrivilege 4712 windows.exe Token: SeTakeOwnershipPrivilege 4712 windows.exe Token: SeTakeOwnershipPrivilege 4712 windows.exe Token: SeTakeOwnershipPrivilege 4712 windows.exe Token: SeTakeOwnershipPrivilege 4712 windows.exe Token: SeTakeOwnershipPrivilege 4712 windows.exe Token: SeTakeOwnershipPrivilege 4712 windows.exe Token: SeTakeOwnershipPrivilege 4712 windows.exe Token: SeTakeOwnershipPrivilege 4712 windows.exe Token: SeTakeOwnershipPrivilege 4712 windows.exe Token: SeTakeOwnershipPrivilege 4712 windows.exe Token: SeTakeOwnershipPrivilege 4712 windows.exe Token: SeTakeOwnershipPrivilege 4712 windows.exe Token: SeTakeOwnershipPrivilege 4712 windows.exe Token: SeTakeOwnershipPrivilege 4712 windows.exe Token: SeTakeOwnershipPrivilege 4712 windows.exe Token: SeTakeOwnershipPrivilege 4712 windows.exe Token: SeTakeOwnershipPrivilege 4712 windows.exe Token: SeTakeOwnershipPrivilege 4712 windows.exe Token: SeTakeOwnershipPrivilege 4712 windows.exe Token: SeTakeOwnershipPrivilege 4712 windows.exe Token: SeTakeOwnershipPrivilege 4712 windows.exe Token: SeTakeOwnershipPrivilege 4712 windows.exe Token: SeTakeOwnershipPrivilege 4712 windows.exe Token: SeTakeOwnershipPrivilege 4712 windows.exe Token: SeTakeOwnershipPrivilege 4712 windows.exe Token: SeTakeOwnershipPrivilege 4712 windows.exe Token: SeTakeOwnershipPrivilege 4712 windows.exe Token: SeTakeOwnershipPrivilege 4712 windows.exe Token: SeTakeOwnershipPrivilege 4712 windows.exe Token: SeTakeOwnershipPrivilege 4712 windows.exe Token: SeTakeOwnershipPrivilege 4712 windows.exe Token: SeTakeOwnershipPrivilege 4712 windows.exe Token: SeTakeOwnershipPrivilege 4712 windows.exe Token: SeTakeOwnershipPrivilege 4712 windows.exe Token: SeTakeOwnershipPrivilege 4712 windows.exe Token: SeTakeOwnershipPrivilege 4712 windows.exe Token: SeTakeOwnershipPrivilege 4712 windows.exe Token: SeTakeOwnershipPrivilege 4712 windows.exe Token: SeTakeOwnershipPrivilege 4712 windows.exe Token: SeTakeOwnershipPrivilege 4712 windows.exe Token: SeTakeOwnershipPrivilege 4712 windows.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 5620 ONENOTE.EXE 5620 ONENOTE.EXE 5620 ONENOTE.EXE 5620 ONENOTE.EXE 5620 ONENOTE.EXE 5620 ONENOTE.EXE 5620 ONENOTE.EXE 5620 ONENOTE.EXE 5620 ONENOTE.EXE 5620 ONENOTE.EXE 5620 ONENOTE.EXE 5620 ONENOTE.EXE 5620 ONENOTE.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 5500 wrote to memory of 5620 5500 printfilterpipelinesvc.exe 91 PID 5500 wrote to memory of 5620 5500 printfilterpipelinesvc.exe 91
Processes
-
C:\Users\Admin\AppData\Local\Temp\windows.exe"C:\Users\Admin\AppData\Local\Temp\windows.exe"1⤵
- Enumerates connected drives
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:4712
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:5352
-
C:\Windows\system32\printfilterpipelinesvc.exeC:\Windows\system32\printfilterpipelinesvc.exe -Embedding1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5500 -
C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE/insertdoc "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\{BED7C1AA-B74F-43D8-826C-7BED526D9015}.xps" 1338125283484400002⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5620
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD51438352603a20f2e5a15bc12d7d28bf1
SHA1a2d6912b531b0a968b01d7bf3c17f1933225e4ef
SHA2560601c5f2521efa21f044e607c3bed8e0f0d037c4998b61e20c493f4e3f88390e
SHA5121702d28ee7b74a43650f55869d3da71ee967bf21987cc679e3f865c5f2ee9ef132cbaf8c05ebb6ccc07750e82f19f9a8445163d2eac64cf779a29621475bb2f5
-
Filesize
64KB
MD5fcd6bcb56c1689fcef28b57c22475bad
SHA11adc95bebe9eea8c112d40cd04ab7a8d75c4f961
SHA256de2f256064a0af797747c2b97505dc0b9f3df0de4f489eac731c23ae9ca9cc31
SHA51273e4153936dab198397b74ee9efc26093dda721eaab2f8d92786891153b45b04265a161b169c988edb0db2c53124607b6eaaa816559c5ce54f3dbc9fa6a7a4b2
-
Filesize
4KB
MD55e08e9d8961e458acc0f71de8714ed4c
SHA1c85fa55871e355322569c80a643e547e85b2dcfc
SHA256bcec04162fff2c4ae32997e67f5186476fea5b4c472186cde95be3dc65d59ecb
SHA51287db4534fe92e95c28aaabb53909d11af043f17c23a4393ea9b41861fe6784e1caa3aa521cbec06fd75232f8ea9fd7881a3fff4af6e2c834873b36d86e788cd4
-
Filesize
4KB
MD52b5c018c77101572e8bf9365e4087f7b
SHA1206d8da552bcb0c385fce62d61334e3ffc0d4d4a
SHA25604dc234281a4b1c0fb152337f82ba8491f9f7ce703f523b53ad249aae4dc4fa0
SHA51285ec71399ead97ff37f96c9f175079db79a48ee87d3968b69eb52fab6aee980e82aa24e9f4abd94479053757b3bfce5ae9b6aac06e33e2320a52c540e38b7d4a
-
Filesize
3KB
MD5fb41a5c7981da369a1360d9e7ff1414a
SHA1a7e522aeecfe947ae4d3ea863c8091544ec189e7
SHA256657a6b530c13dc2762dde67f9b97ecaa48c2dd54b7851311f7712068275aa574
SHA512bce884644e9f01e2c2a32e37b694baab3e5b8e063eafa5c98d98004b019fdbb9ebb2630f0e9ee58871952dfc15c8e64682c90f074005b3ac11128304b0fc6778