Analysis
-
max time kernel
149s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
29-01-2025 20:47
Static task
static1
Behavioral task
behavioral1
Sample
2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe
Resource
win10v2004-20241007-en
General
-
Target
2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe
-
Size
161KB
-
MD5
1c68214c3be2091c5e3ae3e88723fa77
-
SHA1
34566a0081f398020c7d140196a0ad452ec4452c
-
SHA256
df118684f3afe01fa2882acb2e633efd0151bc813f6605a89d614eed041016af
-
SHA512
f416ab7d5c9435b72602dc22591f83f7ed27462e7dea9b584cfdd9dfb9e74baafc24ac0f7d9b50799dd913db5381e340891d49e5d39f8aa4929f43b77d8a2645
-
SSDEEP
3072:YduKWsRRjHRvsfdO3Q+rSBPJasYIeuvSaEkZSc5:bYjHiqrrTNWUc5
Malware Config
Extracted
C:\ProgramData\Adobe\INC-README.txt
inc_ransom
http://incblog6qu4y4mm4zvw5nrmue6qbwtgjsxpw6b7ixzssu36tsajldoad.onion/
http://incblog7vmuq7rktic73r4ha4j757m3ptym37tyvifzp2roedyyzzxid.onion/
http://incapt.su/
https://twitter.com/hashtag/incransom?f=live
http://incpaykabjqc2mtdxq6c23nqh4x6m5dkps5fr6vgdkgzp5njssx6qkid.onion/
Extracted
C:\ProgramData\Adobe\INC-README.html
https://twitter.com/hashtag/incransom?f=live</span>
Signatures
-
INC Ransomware
INC Ransom is a ransomware that emerged in July 2023.
-
Inc_ransom family
-
Renames multiple (288) files with added filename extension
This suggests ransomware activity of encrypting all the files on the system.
-
Credentials from Password Stores: Windows Credential Manager 1 TTPs
Suspicious access to Credentials History.
-
Enumerates connected drives 3 TTPs 24 IoCs
Attempts to read the root path of hard drives other than the default C: drive.
description ioc Process File opened (read-only) \??\N: 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe File opened (read-only) \??\X: 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe File opened (read-only) \??\Y: 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe File opened (read-only) \??\B: 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe File opened (read-only) \??\E: 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe File opened (read-only) \??\G: 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe File opened (read-only) \??\H: 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe File opened (read-only) \??\L: 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe File opened (read-only) \??\O: 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe File opened (read-only) \??\R: 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe File opened (read-only) \??\S: 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe File opened (read-only) \??\F: 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe File opened (read-only) \??\A: 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe File opened (read-only) \??\J: 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe File opened (read-only) \??\K: 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe File opened (read-only) \??\U: 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe File opened (read-only) \??\V: 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe File opened (read-only) \??\T: 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe File opened (read-only) \??\W: 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe File opened (read-only) \??\Z: 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe File opened (read-only) \??\I: 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe File opened (read-only) \??\M: 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe File opened (read-only) \??\P: 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe File opened (read-only) \??\Q: 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe -
Drops file in System32 directory 3 IoCs
description ioc Process File created C:\Windows\system32\spool\PRINTERS\00002.SPL 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe File created C:\Windows\system32\spool\PRINTERS\00003.SPL 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe File created C:\Windows\system32\spool\PRINTERS\PP00nvauawdrd56wpq5zkt513z.TMP printfilterpipelinesvc.exe -
Sets desktop wallpaper using registry 2 TTPs 1 IoCs
description ioc Process Set value (str) \REGISTRY\USER\S-1-5-21-4089630652-1596403869-279772308-1000\Control Panel\Desktop\Wallpaper = "C:\\Users\\Admin\\AppData\\Local\\Temp\\\\background-image.jpg" 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe -
Checks processor information in registry 2 TTPs 3 IoCs
Processor information is often read in order to detect sandboxing environments.
description ioc Process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\~MHz ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\CentralProcessor\0\ProcessorNameString ONENOTE.EXE Key opened \REGISTRY\MACHINE\Hardware\Description\System\CentralProcessor\0 ONENOTE.EXE -
Enumerates system info in registry 2 TTPs 3 IoCs
description ioc Process Key opened \REGISTRY\MACHINE\Hardware\Description\System\BIOS ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemFamily ONENOTE.EXE Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\BIOS\SystemSKU ONENOTE.EXE -
Suspicious behavior: EnumeratesProcesses 2 IoCs
pid Process 5864 ONENOTE.EXE 5864 ONENOTE.EXE -
Suspicious use of AdjustPrivilegeToken 64 IoCs
description pid Process Token: SeTakeOwnershipPrivilege 2448 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 2448 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 2448 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 2448 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 2448 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 2448 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 2448 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 2448 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 2448 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 2448 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 2448 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 2448 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 2448 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 2448 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 2448 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 2448 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 2448 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 2448 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 2448 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 2448 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 2448 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 2448 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 2448 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 2448 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 2448 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 2448 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 2448 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 2448 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 2448 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 2448 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 2448 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 2448 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 2448 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 2448 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 2448 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 2448 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 2448 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 2448 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 2448 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 2448 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 2448 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 2448 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 2448 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 2448 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 2448 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 2448 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 2448 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 2448 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 2448 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 2448 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 2448 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 2448 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 2448 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 2448 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 2448 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 2448 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 2448 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 2448 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 2448 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 2448 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 2448 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 2448 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 2448 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe Token: SeTakeOwnershipPrivilege 2448 2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe -
Suspicious use of SetWindowsHookEx 13 IoCs
pid Process 5864 ONENOTE.EXE 5864 ONENOTE.EXE 5864 ONENOTE.EXE 5864 ONENOTE.EXE 5864 ONENOTE.EXE 5864 ONENOTE.EXE 5864 ONENOTE.EXE 5864 ONENOTE.EXE 5864 ONENOTE.EXE 5864 ONENOTE.EXE 5864 ONENOTE.EXE 5864 ONENOTE.EXE 5864 ONENOTE.EXE -
Suspicious use of WriteProcessMemory 2 IoCs
description pid Process procid_target PID 5772 wrote to memory of 5864 5772 printfilterpipelinesvc.exe 93 PID 5772 wrote to memory of 5864 5772 printfilterpipelinesvc.exe 93
Processes
-
C:\Users\Admin\AppData\Local\Temp\2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe"C:\Users\Admin\AppData\Local\Temp\2025-01-29_1c68214c3be2091c5e3ae3e88723fa77_inc_luca-stealer.exe"1⤵
- Enumerates connected drives
- Drops file in System32 directory
- Sets desktop wallpaper using registry
- System Location Discovery: System Language Discovery
- Suspicious use of AdjustPrivilegeToken
PID:2448
-
C:\Windows\system32\svchost.exeC:\Windows\system32\svchost.exe -k PrintWorkflow -s PrintWorkflowUserSvc1⤵PID:5564
-
C:\Windows\system32\printfilterpipelinesvc.exeC:\Windows\system32\printfilterpipelinesvc.exe -Embedding1⤵
- Drops file in System32 directory
- Suspicious use of WriteProcessMemory
PID:5772 -
C:\Program Files\Microsoft Office\root\Office16\ONENOTE.EXE/insertdoc "C:\Users\Admin\AppData\Local\Microsoft\Windows\INetCache\{18F8F1B5-3864-43F8-951F-18347E4B1CFB}.xps" 1338267210176200002⤵
- Checks processor information in registry
- Enumerates system info in registry
- Suspicious behavior: EnumeratesProcesses
- Suspicious use of SetWindowsHookEx
PID:5864
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
8KB
MD534f874203a017e2d5aacd6bd8d985024
SHA1410b3d4c803a26565666f4d2bf771e797285a1b9
SHA2562829a286b2e7656fa9be12dbb3be729288e3447f81859074b841bcb87883eeab
SHA5124c97c277a8e1e55245f41756522affef9674f655b51321d0c0dd4a5c8d891ab328449d288d823694e2020fc8032d26f905fb1a4e1112e5c62008ab440b74d412
-
Filesize
3KB
MD5b21d5a685326353521ac108806183836
SHA1f07cd27d74c3800534a8e3aff49fbe7e2c5ffffc
SHA25623c42337f79f4bda06bb3949fc16f636626dcecadae7114ec43adf1d8ba9d493
SHA512dff09eb0edca6b3c7b9f3c6b1d3f054fd5a9e1ea98a71e201b746982d159429fc141a57977a3c0d5bd985e0b2593b1d8a56a452aa5525f841b53c3b6fa7d7b18
-
Filesize
64KB
MD5fcd6bcb56c1689fcef28b57c22475bad
SHA11adc95bebe9eea8c112d40cd04ab7a8d75c4f961
SHA256de2f256064a0af797747c2b97505dc0b9f3df0de4f489eac731c23ae9ca9cc31
SHA51273e4153936dab198397b74ee9efc26093dda721eaab2f8d92786891153b45b04265a161b169c988edb0db2c53124607b6eaaa816559c5ce54f3dbc9fa6a7a4b2
-
Filesize
4KB
MD5c9e31ceaa0b67d99ba5b428778617410
SHA1171fc5f295b3beacf56223daff6ad82da6555fbc
SHA256473ba86e9453fa05abd3e307a947abb1549ab7aeeddd37dc689e37650a151c83
SHA512616b2c79204694977346ec50f098e52a3c1088e23c922c460f7b82d3cce92bbf4f860c641f07489a785a94cf306a1219ad9d83dba797c05fa51245eac8e62e28
-
Filesize
4KB
MD5afc89a4927eec1be0b3e24437a14de91
SHA128988fa341342ccf1a6bc87d1fa482f7cffcb059
SHA256d92f57fbe370ceebabd1be30c57676732311aed95997bf6973f859989f80a4b8
SHA5129fd3b19cd05ed0fd8fa0bb182519b1b24f8ea7927e596c6b1698c38d5610a3352f4034392a8eb6967299f543bcc880defa7c7bd9af58b6e643c294153f1e1672