INC Ransomware

INC Ransomware is a ransomware strain that has been used by the INC Ransom group since at least 2023 against multiple industry sectors worldwide. INC Ransomware can employ partial encryption combined with multi-threading to speed encryption.[1][2][3]

ID: S1139
Type: MALWARE
Platforms: Windows
Contributors: Matt Anderson, @‌nosecurething, Huntress
Version: 1.0
Created: 06 June 2024
Last Modified: 28 October 2024

Techniques Used

Domain ID Name Use
Enterprise T1047 Windows管理规范

INC Ransomware has the ability to use wmic.exe to spread to multiple endpoints within a compromised environment.[2][3]

Enterprise T1140 反混淆/解码文件或信息

INC Ransomware can run CryptStringToBinaryA to decrypt base64 content containing its ransom note.[4]

Enterprise T1120 外围设备发现

INC Ransomware can identify external USB and hard drives for encryption and printers to print ransom notes.[4]

Enterprise T1486 数据加密以实现影响

INC Ransomware can encrypt data on victim systems, including through the use of partial encryption and multi-threading to speed encryption.[1][2][4][5][1]

Enterprise T1083 文件和目录发现

INC Ransomware can receive command line arguments to encrypt specific files and directories.[4][1]

Enterprise T1489 服务停止

INC Ransomware can issue a command to kill a process on compromised hosts.[4]

Enterprise T1106 本机API

INC Ransomware can use the API DeviceIoControl to resize the allocated space for and cause the deletion of volume shadow copy snapshots.[4]

Enterprise T1570 横向工具传输

INC Ransomware can push its encryption executable to multiple endpoints within compromised infrastructure.[2]

Enterprise T1491 .001 篡改: Internal Defacement

INC Ransomware has the ability to change the background wallpaper image to display the ransom note.[4][3]

Enterprise T1082 系统信息发现

INC Ransomware can discover and mount hidden drives to encrypt them.[4]

Enterprise T1490 系统恢复抑制

INC Ransomware can delete volume shadow copy backups from victim machines.[4]

Enterprise T1135 网络共享发现

INC Ransomware has the ability to check for shared network drives to encrypt.[4]

Enterprise T1652 设备驱动程序探测

INC Ransomware can verify the presence of specific drivers on compromised hosts including Microsoft Print to PDF and Microsoft XPS Document Writer.[4]

Enterprise T1057 进程发现

INC Ransomware can use the Microsoft Win32 Restart Manager to kill processes with a specific handle or that are accessing resources it wants to encrypt.[4]

Enterprise T1566 钓鱼

INC Ransomware campaigns have used spearphishing emails for initial access.[1]

Groups That Use This Software

ID Name References
G1032 INC Ransom

[4][3]

References