Analysis
-
max time kernel
147s -
max time network
147s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
24-01-2025 18:52
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe
Resource
win10v2004-20241007-en
General
-
Target
2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe
-
Size
161KB
-
MD5
45452dfed7ff029dae0c9722e4d92449
-
SHA1
16679929124b6dc9c0679b99ddcd0cd93fa4179c
-
SHA256
7eb895229298652a5c2afa81166b100143ac6f791bd50f7d1858ed42660bf61f
-
SHA512
87c2383f3ee6837e6c8b48ef26ad0045563f1c7a91ae518ede4d8939736f00ec0995f230019fdfddd9629dfedfca9588a3817b4762c9e1fe722b30e9dd4beb33
-
SSDEEP
3072:YduKWsRRjHRvsfdO3Q+rSBPJasYIeuvkaEkZSc5o:bYjHiqrrTPWUc5o
Malware Config
Extracted
C:\ProgramData\Adobe\Setup\INC-README.html
https://twitter.com/hashtag/incransom?f=live</span>
Extracted
F:\INC-README.txt
inc_ransom
http://incblog6qu4y4mm4zvw5nrmue6qbwtgjsxpw6b7ixzssu36tsajldoad.onion/
http://incblog7vmuq7rktic73r4ha4j757m3ptym37tyvifzp2roedyyzzxid.onion/
http://incapt.su/
https://twitter.com/hashtag/incransom?f=live
http://incpaykabjqc2mtdxq6c23nqh4x6m5dkps5fr6vgdkgzp5njssx6qkid.onion/
Signatures
-
INC Ransomware
INC Ransom is a ransomware that emerged in July 2023.
-
Inc_ransom family
-
Renames multiple (314) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\J: 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe File opened (read-only) \??\K: 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe File opened (read-only) \??\N: 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe File opened (read-only) \??\S: 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe File opened (read-only) \??\X: 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe File opened (read-only) \??\Y: 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe File opened (read-only) \??\B: 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe File opened (read-only) \??\G: 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe File opened (read-only) \??\P: 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe File opened (read-only) \??\R: 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe File opened (read-only) \??\Z: 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe File opened (read-only) \??\A: 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe File opened (read-only) \??\E: 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe File opened (read-only) \??\I: 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe File opened (read-only) \??\O: 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe File opened (read-only) \??\Q: 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe File opened (read-only) \??\W: 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe File opened (read-only) \??\F: 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe File opened (read-only) \??\H: 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe File opened (read-only) \??\T: 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe File opened (read-only) \??\U: 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe File opened (read-only) \??\V: 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe File opened (read-only) \??\L: 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe File opened (read-only) \??\M: 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\system32\spool\PRINTERS\00002.SPL 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe File created C:\Windows\system32\spool\PRINTERS\00003.SPL 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe File created C:\Windows\system32\spool\PRINTERS\PPjxar99rgzv49wb_yh3hhmbxjd.TMP printfilterpipelinesvc.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-493223053-2004649691-1575712786-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\background-image.jpg" 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ONENOTE.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 ONENOTE.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU ONENOTE.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS ONENOTE.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5528 ONENOTE.EXE 5528 ONENOTE.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 3868 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3868 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3868 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3868 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3868 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3868 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3868 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3868 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3868 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3868 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3868 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3868 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3868 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3868 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3868 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3868 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3868 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3868 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3868 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3868 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3868 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3868 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3868 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3868 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3868 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3868 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3868 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3868 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3868 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3868 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3868 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3868 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3868 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3868 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3868 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3868 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3868 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3868 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3868 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3868 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3868 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3868 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3868 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3868 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3868 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3868 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3868 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3868 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3868 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3868 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3868 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3868 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3868 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3868 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3868 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3868 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3868 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3868 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3868 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3868 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3868 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3868 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3868 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3868 2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 5528 ONENOTE.EXE 5528 ONENOTE.EXE 5528 ONENOTE.EXE 5528 ONENOTE.EXE 5528 ONENOTE.EXE 5528 ONENOTE.EXE 5528 ONENOTE.EXE 5528 ONENOTE.EXE 5528 ONENOTE.EXE 5528 ONENOTE.EXE 5528 ONENOTE.EXE 5528 ONENOTE.EXE 5528 ONENOTE.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 5396 wrote to memory of 5528 5396 printfilterpipelinesvc.exe 97 PID 5396 wrote to memory of 5528 5396 printfilterpipelinesvc.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\2025-01-24_45452dfed7ff029dae0c9722e4d92449_inc_luca-stealer.exe"1⤵
- Enumerates connected drives
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3868
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:5148
-
C:\Windows\system32\printfilterpipelinesvc.exeC:\Windows\system32\printfilterpipelinesvc.exe -Embedding1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5396 -
C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE/insertdoc "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\{51874640-EBF9-4C17-96D2-55DC3C658F7F}.xps" 1338221839632200002⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5528
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5a578518f1056926291feaab8b82cacfc
SHA142ad6720763746e378c785037f9f533720256377
SHA2566b48e1439a4817b476aa900b2a7e92a641f525fd1041ea0f525955a80b1ed2bd
SHA51220e5fff2f61bc722c839b678f04a804c491f9b9d3c1eba19642322956616d22a406edcbb78ebcf2e6f494ed58ec6eb1988789bc761856b2eeb48d6ace5dfd6ce
-
Filesize
64KB
MD5fcd6bcb56c1689fcef28b57c22475bad
SHA11adc95bebe9eea8c112d40cd04ab7a8d75c4f961
SHA256de2f256064a0af797747c2b97505dc0b9f3df0de4f489eac731c23ae9ca9cc31
SHA51273e4153936dab198397b74ee9efc26093dda721eaab2f8d92786891153b45b04265a161b169c988edb0db2c53124607b6eaaa816559c5ce54f3dbc9fa6a7a4b2
-
Filesize
3KB
MD5d9ec1a0a6441388227626c5261941ed9
SHA1bfb388f0b246b71233d31415abc721e861bcd4f2
SHA25606bd237cb33dc4b6e7fc279594d0ef0fdb2e62656d813ac95339ad2b469ad55a
SHA5123d6bd3b2f60fa53c34f6b0991d1e46d6e1435f5c183f885ff300d002041c8bb2fe773a4aac045eefbfec79e66b4d3f7dc81102f2884586516884e98c4e660419