Analysis
-
max time kernel
148s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-01-2025 11:33
Static task
static1
Behavioral task
behavioral1
Sample
7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe
Resource
win7-20241010-en
Behavioral task
behavioral2
Sample
7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe
Resource
win10v2004-20241007-en
General
-
Target
7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe
-
Size
161KB
-
MD5
45452dfed7ff029dae0c9722e4d92449
-
SHA1
16679929124b6dc9c0679b99ddcd0cd93fa4179c
-
SHA256
7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f
-
SHA512
87c2383f3ee6837e6c8b48ef26ad0045563f1c7a91ae518ede4d8939736f00ec0995f230019fdfddd9629dfedfca9588a3817b4762c9e1fe722b30e9dd4beb33
-
SSDEEP
3072:YduKWsRRjHRvsfdO3Q+rSBPJasYIeuvkaEkZSc5o:bYjHiqrrTPWUc5o
Malware Config
Extracted
C:\ProgramData\Adobe\Setup\INC-README.html
https://twitter.com/hashtag/incransom?f=live</span>
Extracted
F:\INC-README.txt
inc_ransom
http://incblog6qu4y4mm4zvw5nrmue6qbwtgjsxpw6b7ixzssu36tsajldoad.onion/
http://incblog7vmuq7rktic73r4ha4j757m3ptym37tyvifzp2roedyyzzxid.onion/
http://incapt.su/
https://twitter.com/hashtag/incransom?f=live
http://incpaykabjqc2mtdxq6c23nqh4x6m5dkps5fr6vgdkgzp5njssx6qkid.onion/
Signatures
-
INC Ransomware
INC Ransom is a ransomware that emerged in July 2023.
-
Inc_ransom family
-
Renames multiple (326) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe File opened (read-only) \??\P: 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe File opened (read-only) \??\Q: 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe File opened (read-only) \??\X: 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe File opened (read-only) \??\Y: 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe File opened (read-only) \??\Z: 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe File opened (read-only) \??\B: 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe File opened (read-only) \??\M: 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe File opened (read-only) \??\N: 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe File opened (read-only) \??\W: 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe File opened (read-only) \??\A: 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe File opened (read-only) \??\I: 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe File opened (read-only) \??\K: 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe File opened (read-only) \??\L: 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe File opened (read-only) \??\O: 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe File opened (read-only) \??\R: 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe File opened (read-only) \??\T: 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe File opened (read-only) \??\E: 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe File opened (read-only) \??\G: 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe File opened (read-only) \??\H: 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe File opened (read-only) \??\S: 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe File opened (read-only) \??\U: 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe File opened (read-only) \??\V: 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe File opened (read-only) \??\F: 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\system32\spool\PRINTERS\00003.SPL 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe File created C:\Windows\system32\spool\PRINTERS\PPxcbq97_l2mjke_7u86vxcyd9d.TMP printfilterpipelinesvc.exe File created C:\Windows\system32\spool\PRINTERS\00002.SPL 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\background-image.jpg" 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ONENOTE.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU ONENOTE.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5584 ONENOTE.EXE 5584 ONENOTE.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2344 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe Token: SeTakeOwnershipPrivilege 2344 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe Token: SeTakeOwnershipPrivilege 2344 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe Token: SeTakeOwnershipPrivilege 2344 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe Token: SeTakeOwnershipPrivilege 2344 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe Token: SeTakeOwnershipPrivilege 2344 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe Token: SeTakeOwnershipPrivilege 2344 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe Token: SeTakeOwnershipPrivilege 2344 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe Token: SeTakeOwnershipPrivilege 2344 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe Token: SeTakeOwnershipPrivilege 2344 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe Token: SeTakeOwnershipPrivilege 2344 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe Token: SeTakeOwnershipPrivilege 2344 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe Token: SeTakeOwnershipPrivilege 2344 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe Token: SeTakeOwnershipPrivilege 2344 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe Token: SeTakeOwnershipPrivilege 2344 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe Token: SeTakeOwnershipPrivilege 2344 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe Token: SeTakeOwnershipPrivilege 2344 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe Token: SeTakeOwnershipPrivilege 2344 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe Token: SeTakeOwnershipPrivilege 2344 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe Token: SeTakeOwnershipPrivilege 2344 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe Token: SeTakeOwnershipPrivilege 2344 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe Token: SeTakeOwnershipPrivilege 2344 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe Token: SeTakeOwnershipPrivilege 2344 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe Token: SeTakeOwnershipPrivilege 2344 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe Token: SeTakeOwnershipPrivilege 2344 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe Token: SeTakeOwnershipPrivilege 2344 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe Token: SeTakeOwnershipPrivilege 2344 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe Token: SeTakeOwnershipPrivilege 2344 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe Token: SeTakeOwnershipPrivilege 2344 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe Token: SeTakeOwnershipPrivilege 2344 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe Token: SeTakeOwnershipPrivilege 2344 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe Token: SeTakeOwnershipPrivilege 2344 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe Token: SeTakeOwnershipPrivilege 2344 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe Token: SeTakeOwnershipPrivilege 2344 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe Token: SeTakeOwnershipPrivilege 2344 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe Token: SeTakeOwnershipPrivilege 2344 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe Token: SeTakeOwnershipPrivilege 2344 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe Token: SeTakeOwnershipPrivilege 2344 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe Token: SeTakeOwnershipPrivilege 2344 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe Token: SeTakeOwnershipPrivilege 2344 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe Token: SeTakeOwnershipPrivilege 2344 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe Token: SeTakeOwnershipPrivilege 2344 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe Token: SeTakeOwnershipPrivilege 2344 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe Token: SeTakeOwnershipPrivilege 2344 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe Token: SeTakeOwnershipPrivilege 2344 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe Token: SeTakeOwnershipPrivilege 2344 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe Token: SeTakeOwnershipPrivilege 2344 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe Token: SeTakeOwnershipPrivilege 2344 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe Token: SeTakeOwnershipPrivilege 2344 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe Token: SeTakeOwnershipPrivilege 2344 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe Token: SeTakeOwnershipPrivilege 2344 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe Token: SeTakeOwnershipPrivilege 2344 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe Token: SeTakeOwnershipPrivilege 2344 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe Token: SeTakeOwnershipPrivilege 2344 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe Token: SeTakeOwnershipPrivilege 2344 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe Token: SeTakeOwnershipPrivilege 2344 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe Token: SeTakeOwnershipPrivilege 2344 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe Token: SeTakeOwnershipPrivilege 2344 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe Token: SeTakeOwnershipPrivilege 2344 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe Token: SeTakeOwnershipPrivilege 2344 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe Token: SeTakeOwnershipPrivilege 2344 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe Token: SeTakeOwnershipPrivilege 2344 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe Token: SeTakeOwnershipPrivilege 2344 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe Token: SeTakeOwnershipPrivilege 2344 7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 5584 ONENOTE.EXE 5584 ONENOTE.EXE 5584 ONENOTE.EXE 5584 ONENOTE.EXE 5584 ONENOTE.EXE 5584 ONENOTE.EXE 5584 ONENOTE.EXE 5584 ONENOTE.EXE 5584 ONENOTE.EXE 5584 ONENOTE.EXE 5584 ONENOTE.EXE 5584 ONENOTE.EXE 5584 ONENOTE.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 5268 wrote to memory of 5584 5268 printfilterpipelinesvc.exe 95 PID 5268 wrote to memory of 5584 5268 printfilterpipelinesvc.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe"C:\Users\Admin\AppData\Local\Temp\7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f.exe"1⤵
- Enumerates connected drives
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2344
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:6116
-
C:\Windows\system32\printfilterpipelinesvc.exeC:\Windows\system32\printfilterpipelinesvc.exe -Embedding1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5268 -
C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE/insertdoc "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\{67A79597-A879-470F-894D-54E795D7C5E9}.xps" 1338219202366700002⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5584
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5a578518f1056926291feaab8b82cacfc
SHA142ad6720763746e378c785037f9f533720256377
SHA2566b48e1439a4817b476aa900b2a7e92a641f525fd1041ea0f525955a80b1ed2bd
SHA51220e5fff2f61bc722c839b678f04a804c491f9b9d3c1eba19642322956616d22a406edcbb78ebcf2e6f494ed58ec6eb1988789bc761856b2eeb48d6ace5dfd6ce
-
Filesize
4KB
MD538ff36ea93d9450e99f7295a5b729b32
SHA1473e44b68d72651627bd99e74b2251f10684edf3
SHA25605a462364ec1768b75d0093c958e001191a47fd7cc66cefaccc9f54ad362b346
SHA5121ed804bd3b6dc7d169850c5e37795ffd5d8b12a5026e0510f65a73da3a30c6702e4fcd5d7b7134c1ee80815471206054ad505b99796e1a7de34aaeb5c76e255b
-
Filesize
4KB
MD5ec50da5d34ad6fa32506625c440c5985
SHA154762e333046e5764a29de0dc67c385b52c66d01
SHA256fd9a0bd16df86658f541ab9a4460621425dd7e74964facf854bcde905f5935d5
SHA512a405371c8945b8e32a621949ec68b4f88501808de5545609a4186a49abe4d38e0c25edd7690545d1bf2a6b6b35cae1bddc169cca0d7b41e34053b3e90ba4d61b
-
Filesize
3KB
MD5d9ec1a0a6441388227626c5261941ed9
SHA1bfb388f0b246b71233d31415abc721e861bcd4f2
SHA25606bd237cb33dc4b6e7fc279594d0ef0fdb2e62656d813ac95339ad2b469ad55a
SHA5123d6bd3b2f60fa53c34f6b0991d1e46d6e1435f5c183f885ff300d002041c8bb2fe773a4aac045eefbfec79e66b4d3f7dc81102f2884586516884e98c4e660419