Analysis
-
max time kernel
147s -
max time network
139s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-01-2025 10:32
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe
Resource
win10v2004-20241007-en
General
-
Target
2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe
-
Size
161KB
-
MD5
8a275265a27f6426cc9f1ea0b0e24bcf
-
SHA1
4e2811cc56fc29f5369377714311089220f88123
-
SHA256
7c90ccd17fa69843cf4230d9206d2904303d826f3455289f1e514b0c948fcb28
-
SHA512
1dae5ec3e3809004d5c06b47a0d8f7632bc091733b23e40cf3bf6d11769bde1b05795110e370271a1637f9dffd1c79ded7c33148cefc374d6e7c10e7b814b2b0
-
SSDEEP
3072:YduKWsRRjHRvsfdO3Q+rSBPJasYIeuvuaEkZSc5:bYjHiqrrT1WUc5
Malware Config
Extracted
C:\ProgramData\Adobe\INC-README.txt
inc_ransom
http://incblog6qu4y4mm4zvw5nrmue6qbwtgjsxpw6b7ixzssu36tsajldoad.onion/
http://incblog7vmuq7rktic73r4ha4j757m3ptym37tyvifzp2roedyyzzxid.onion/
http://incapt.su/
https://twitter.com/hashtag/incransom?f=live
http://incpaykabjqc2mtdxq6c23nqh4x6m5dkps5fr6vgdkgzp5njssx6qkid.onion/
Extracted
C:\ProgramData\Adobe\INC-README.html
https://twitter.com/hashtag/incransom?f=live</span>
Signatures
-
INC Ransomware
INC Ransom is a ransomware that emerged in July 2023.
-
Inc_ransom family
-
Renames multiple (303) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\L: 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe File opened (read-only) \??\N: 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe File opened (read-only) \??\S: 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe File opened (read-only) \??\U: 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe File opened (read-only) \??\F: 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe File opened (read-only) \??\A: 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe File opened (read-only) \??\B: 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe File opened (read-only) \??\E: 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe File opened (read-only) \??\V: 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe File opened (read-only) \??\X: 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe File opened (read-only) \??\T: 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe File opened (read-only) \??\W: 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe File opened (read-only) \??\Y: 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe File opened (read-only) \??\G: 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe File opened (read-only) \??\I: 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe File opened (read-only) \??\K: 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe File opened (read-only) \??\P: 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe File opened (read-only) \??\M: 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe File opened (read-only) \??\O: 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe File opened (read-only) \??\R: 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe File opened (read-only) \??\Z: 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe File opened (read-only) \??\H: 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe File opened (read-only) \??\J: 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe File opened (read-only) \??\Q: 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\system32\spool\PRINTERS\PP4u7fhq4lclv01i0gzqgthr_fd.TMP printfilterpipelinesvc.exe File created C:\Windows\system32\spool\PRINTERS\00002.SPL 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe File created C:\Windows\system32\spool\PRINTERS\00003.SPL 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\background-image.jpg" 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ONENOTE.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU ONENOTE.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5364 ONENOTE.EXE 5364 ONENOTE.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 5076 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 5076 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 5076 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 5076 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 5076 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 5076 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 5076 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 5076 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 5076 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 5076 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 5076 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 5076 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 5076 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 5076 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 5076 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 5076 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 5076 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 5076 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 5076 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 5076 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 5076 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 5076 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 5076 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 5076 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 5076 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 5076 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 5076 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 5076 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 5076 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 5076 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 5076 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 5076 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 5076 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 5076 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 5076 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 5076 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 5076 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 5076 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 5076 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 5076 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 5076 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 5076 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 5076 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 5076 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 5076 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 5076 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 5076 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 5076 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 5076 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 5076 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 5076 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 5076 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 5076 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 5076 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 5076 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 5076 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 5076 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 5076 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 5076 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 5076 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 5076 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 5076 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 5076 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 5076 2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 5364 ONENOTE.EXE 5364 ONENOTE.EXE 5364 ONENOTE.EXE 5364 ONENOTE.EXE 5364 ONENOTE.EXE 5364 ONENOTE.EXE 5364 ONENOTE.EXE 5364 ONENOTE.EXE 5364 ONENOTE.EXE 5364 ONENOTE.EXE 5364 ONENOTE.EXE 5364 ONENOTE.EXE 5364 ONENOTE.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 5156 wrote to memory of 5364 5156 printfilterpipelinesvc.exe 90 PID 5156 wrote to memory of 5364 5156 printfilterpipelinesvc.exe 90
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\2025-01-29_8a275265a27f6426cc9f1ea0b0e24bcf_inc_luca-stealer.exe"1⤵
- Enumerates connected drives
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:5076
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:6036
-
C:\Windows\system32\printfilterpipelinesvc.exeC:\Windows\system32\printfilterpipelinesvc.exe -Embedding1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5156 -
C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE/insertdoc "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\{FE018685-6517-45A6-86D3-9B2791250C57}.xps" 1338262047006700002⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5364
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD5bdd7a7b257a69198ecaf9fc5aca78460
SHA14b8ee842973446c2cd288bcc45caa6846eaa27fd
SHA256da0da2f95e789a0d49ec9ac075f353beb71825bbf490a146f70e3279f964be8b
SHA512a1a937910270d054046304f947f5d51b3152873aff40a37fd45d8fbb78928673049d2001facbd937668ab1ec8ea61b4222d88ffd694e7c9d98309d56dd7bd86c
-
Filesize
3KB
MD51ee02b7dfa0f1516c4218569ad55e6c0
SHA14b8358b9073b87cbcfd7cd820486ecc8da45b434
SHA256d531c9e92db5cd4a3cc2fc7a6e5fdd959cbfcf3608e32a3b3e35c3c1cfa421a5
SHA512dfe89333181631fc1a11dd85421206ff95d65df876b6a9d3343d2a590d8c1ef3a5995e98a42f0748bb109c9268273bdb9729cebfe2f5ba1cd102ddafb3a164a9
-
Filesize
64KB
MD5fcd6bcb56c1689fcef28b57c22475bad
SHA11adc95bebe9eea8c112d40cd04ab7a8d75c4f961
SHA256de2f256064a0af797747c2b97505dc0b9f3df0de4f489eac731c23ae9ca9cc31
SHA51273e4153936dab198397b74ee9efc26093dda721eaab2f8d92786891153b45b04265a161b169c988edb0db2c53124607b6eaaa816559c5ce54f3dbc9fa6a7a4b2
-
Filesize
4KB
MD5f6884cdc2899862f0090dde15d2e79bf
SHA18e136fb929efa7971b5eb3d0a5ceb1f994a7340d
SHA25688fd1a5b6f7bbc8212929af2b33efe0688d22f25ca85203957b3c2f235febbda
SHA51261434763cb0c8a0c03e9d14d13cc6a1a3eb2f1f66390fe3150efeaade2aac3f7c853be19121fefbf3297a2bb2b95e4475acab47a056170a887ba230134d4ba2f
-
Filesize
4KB
MD5d446ae7e658f7ab4e39997bb1133512e
SHA1d3062f18b3e1da4e79ac1a30d5971d1aab716a4f
SHA2567a047265116b920ee279e0b8b48e61e4c9a462273bcb8838a58bbec7a73326f7
SHA512b244d7aeaf4e6a715805a17a07adfd6121da5a81e8f8277beb42fddafb39149ef7a19dfb40478f101355b908059e4540c6d4530bc8e2c367c717b0646929014a