Analysis
-
max time kernel
147s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20250129-en -
resource tags
arch:x64arch:x86image:win10v2004-20250129-enlocale:en-usos:windows10-2004-x64system -
submitted
29-01-2025 20:44
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe
Resource
win7-20240729-en
Behavioral task
behavioral2
Sample
2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe
Resource
win10v2004-20250129-en
General
-
Target
2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe
-
Size
161KB
-
MD5
1c68214c3be2091c5e3ae3e88723fa77
-
SHA1
34566a0081f398020c7d140196a0ad452ec4452c
-
SHA256
df118684f3afe01fa2882acb2e633efd0151bc813f6605a89d614eed041016af
-
SHA512
f416ab7d5c9435b72602dc22591f83f7ed27462e7dea9b584cfdd9dfb9e74baafc24ac0f7d9b50799dd913db5381e340891d49e5d39f8aa4929f43b77d8a2645
-
SSDEEP
3072:YduKWsRRjHRvsfdO3Q+rSBPJasYIeuvSaEkZSc5:bYjHiqrrTNWUc5
Malware Config
Extracted
C:\ProgramData\Adobe\INC-README.html
https://twitter.com/hashtag/incransom?f=live</span>
Extracted
C:\ProgramData\Adobe\INC-README.txt
inc_ransom
http://incblog6qu4y4mm4zvw5nrmue6qbwtgjsxpw6b7ixzssu36tsajldoad.onion/
http://incblog7vmuq7rktic73r4ha4j757m3ptym37tyvifzp2roedyyzzxid.onion/
http://incapt.su/
https://twitter.com/hashtag/incransom?f=live
http://incpaykabjqc2mtdxq6c23nqh4x6m5dkps5fr6vgdkgzp5njssx6qkid.onion/
Signatures
-
INC Ransomware
INC Ransom is a ransomware that emerged in July 2023.
-
Inc_ransom family
-
Renames multiple (308) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\I: 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe File opened (read-only) \??\M: 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe File opened (read-only) \??\N: 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe File opened (read-only) \??\P: 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe File opened (read-only) \??\W: 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe File opened (read-only) \??\G: 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe File opened (read-only) \??\K: 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe File opened (read-only) \??\L: 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe File opened (read-only) \??\R: 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe File opened (read-only) \??\E: 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe File opened (read-only) \??\B: 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe File opened (read-only) \??\J: 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe File opened (read-only) \??\T: 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe File opened (read-only) \??\U: 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe File opened (read-only) \??\X: 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe File opened (read-only) \??\Y: 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe File opened (read-only) \??\Z: 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe File opened (read-only) \??\F: 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe File opened (read-only) \??\H: 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe File opened (read-only) \??\O: 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe File opened (read-only) \??\Q: 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe File opened (read-only) \??\S: 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe File opened (read-only) \??\V: 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe File opened (read-only) \??\A: 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\system32\spool\PRINTERS\PPrwr190t3mfy0lxv62b8951rxb.TMP printfilterpipelinesvc.exe File created C:\Windows\system32\spool\PRINTERS\00002.SPL 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe File created C:\Windows\system32\spool\PRINTERS\00003.SPL 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-1121399784-3202166597-3503557106-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\background-image.jpg" 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ONENOTE.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ONENOTE.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU ONENOTE.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily ONENOTE.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5164 ONENOTE.EXE 5164 ONENOTE.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 3264 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3264 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3264 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3264 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3264 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3264 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3264 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3264 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3264 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3264 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3264 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3264 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3264 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3264 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3264 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3264 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3264 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3264 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3264 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3264 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3264 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3264 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3264 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3264 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3264 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3264 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3264 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3264 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3264 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3264 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3264 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3264 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3264 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3264 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3264 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3264 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3264 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3264 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3264 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3264 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3264 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3264 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3264 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3264 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3264 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3264 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3264 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3264 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3264 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3264 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3264 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3264 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3264 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3264 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3264 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3264 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3264 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3264 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3264 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3264 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3264 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3264 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3264 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 3264 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 5164 ONENOTE.EXE 5164 ONENOTE.EXE 5164 ONENOTE.EXE 5164 ONENOTE.EXE 5164 ONENOTE.EXE 5164 ONENOTE.EXE 5164 ONENOTE.EXE 5164 ONENOTE.EXE 5164 ONENOTE.EXE 5164 ONENOTE.EXE 5164 ONENOTE.EXE 5164 ONENOTE.EXE 5164 ONENOTE.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 6084 wrote to memory of 5164 6084 printfilterpipelinesvc.exe 89 PID 6084 wrote to memory of 5164 6084 printfilterpipelinesvc.exe 89
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe"1⤵
- Enumerates connected drives
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:3264
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:5996
-
C:\Windows\system32\printfilterpipelinesvc.exeC:\Windows\system32\printfilterpipelinesvc.exe -Embedding1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:6084 -
C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE/insertdoc "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\{DD1D97AB-A6F4-4769-AC8C-723AD47C5821}.xps" 1338265705780100002⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5164
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD534f874203a017e2d5aacd6bd8d985024
SHA1410b3d4c803a26565666f4d2bf771e797285a1b9
SHA2562829a286b2e7656fa9be12dbb3be729288e3447f81859074b841bcb87883eeab
SHA5124c97c277a8e1e55245f41756522affef9674f655b51321d0c0dd4a5c8d891ab328449d288d823694e2020fc8032d26f905fb1a4e1112e5c62008ab440b74d412
-
Filesize
3KB
MD5b21d5a685326353521ac108806183836
SHA1f07cd27d74c3800534a8e3aff49fbe7e2c5ffffc
SHA25623c42337f79f4bda06bb3949fc16f636626dcecadae7114ec43adf1d8ba9d493
SHA512dff09eb0edca6b3c7b9f3c6b1d3f054fd5a9e1ea98a71e201b746982d159429fc141a57977a3c0d5bd985e0b2593b1d8a56a452aa5525f841b53c3b6fa7d7b18
-
Filesize
64KB
MD5fcd6bcb56c1689fcef28b57c22475bad
SHA11adc95bebe9eea8c112d40cd04ab7a8d75c4f961
SHA256de2f256064a0af797747c2b97505dc0b9f3df0de4f489eac731c23ae9ca9cc31
SHA51273e4153936dab198397b74ee9efc26093dda721eaab2f8d92786891153b45b04265a161b169c988edb0db2c53124607b6eaaa816559c5ce54f3dbc9fa6a7a4b2
-
Filesize
4KB
MD5ef3a22f1c5f6fcbc3cd9cbd118fb7be1
SHA160e77d53dad1e47238c049637a233664e2e25263
SHA256c1ac9bbe51f073b080948a8170bb152671610c44a26b8932c6528dac2ac732cd
SHA5120f1a6a7a98eda5d54e96e61c6268b78f3bd4e46c1e93401ae26564dbd9568bd79f58d7ce1e855257727a2d517ce3bf953067d3dedc2693195d518aabc7fbe802