INC Ransom

INC Ransom is a ransomware and data extortion threat group associated with the deployment of INC Ransomware that has been active since at least July 2023. INC Ransom has targeted organizations worldwide most commonly in the industrial, healthcare, and education sectors in the US and Europe.[1][2][3][4]

ID: G1032
Associated Groups: GOLD IONIC
Contributors: Matt Anderson, @‌nosecurething, Huntress
Version: 1.0
Created: 06 June 2024
Last Modified: 28 October 2024

Associated Group Descriptions

Name Description
GOLD IONIC

[3]

Techniques Used

Domain ID Name Use
Enterprise T1047 Windows管理规范

INC Ransom has used WMIC to deploy ransomware.[2][5][6]

Enterprise T1537 传输数据至云账户

INC Ransom has used Megasync to exfiltrate data to the cloud.[3]

Enterprise T1036 .005 伪装: Match Legitimate Name or Location

INC Ransom has named a PsExec executable winupd to mimic a legitimate Windows update file.[5][6]

Enterprise T1190 利用公开应用程序漏洞

INC Ransom has exploited known vulnerabilities including CVE-2023-3519 in Citrix NetScaler for initial access.[6][4]

Enterprise T1059 .003 命令与脚本解释器: Windows Command Shell

INC Ransom has used cmd.exe to launch malicious payloads.[5]

Enterprise T1562 .001 妨碍防御: Disable or Modify Tools

INC Ransom can use SystemSettingsAdminFlows.exe, a native Windows utility, to disable Windows Defender.[7]

Enterprise T1071 应用层协议

INC Ransom has used valid accounts over RDP to connect to targeted systems.[5]

Enterprise T1560 .001 归档收集数据: Archive via Utility

INC Ransom has used 7-Zip and WinRAR to archive collected data prior to exfiltration.[5][3][6][7]

Enterprise T1074 数据分段

INC Ransom has staged data on compromised hosts prior to exfiltration.[5][6]

Enterprise T1486 数据加密以实现影响

INC Ransom has used INC Ransomware to encrypt victim's data.[4][5][1][3][2][6]

Enterprise T1078 有效账户

INC Ransom has used compromised valid accounts for access to victim environments.[2][5][6][7]

Enterprise T1069 .002 权限组发现: Domain Groups

INC Ransom has enumerated domain groups on targeted hosts.[5]

Enterprise T1570 横向工具传输

INC Ransom has used a rapid succession of copy commands to install a file encryption executable across multiple endpoints within compromised infrastructure.[5][3]

Enterprise T1070 .004 移除指标: File Deletion

INC Ransom has uninstalled tools from compromised endpoints after use.[7]

Enterprise T1569 .002 系统服务: Service Execution

INC Ransom has run a file encryption executable via Service Control Manager/7045;winupd,%SystemRoot%\winupd.exe,user mode service,demand start,LocalSystem.[5]

Enterprise T1049 系统网络连接发现

INC Ransom has used RDP to test network connections.[6]

Enterprise T1135 网络共享发现

INC Ransom has used Internet Explorer to view folders on other systems.[5]

Enterprise T1046 网络服务发现

INC Ransom has used NETSCAN.EXE for internal reconnaissance.[6][4]

Enterprise T1588 .002 获取能力: Tool

INC Ransom has acquired and used several tools including MegaSync, AnyDesk, esentutl and PsExec.[2][5][6][7][4]

Enterprise T1657 财务窃取

INC Ransom has stolen and encrypted victim's data in order to extort payment for keeping it private or decrypting it.[2][1][3][6][4]

Enterprise T1087 .002 账号发现: Domain Account

INC Ransom has scanned for domain admin accounts in compromised environments.[6]

Enterprise T1105 输入工具传输

INC Ransom has downloaded tools to compromised servers including Advanced IP Scanner. [5][7]

Enterprise T1021 .001 远程服务: Remote Desktop Protocol

INC Ransom has used RDP to move laterally.[2][5][6][7]

Enterprise T1219 远程访问软件

INC Ransom has used AnyDesk and PuTTY on compromised systems.[5][6][7][4]

Enterprise T1566 钓鱼

INC Ransom has used phishing to gain initial access.[6][4]

Software

ID Name References Techniques
S0552 AdFind [3] 域信任发现, 权限组发现: Domain Groups, 系统网络配置发现, 账号发现: Domain Account, 远程系统发现
S0404 esentutl [6][4] 从本地系统获取数据, 操作系统凭证转储: NTDS, 横向工具传输, 直接卷访问, 输入工具传输, 隐藏伪装: NTFS File Attributes
S1139 INC Ransomware [2][3] Windows管理规范, 反混淆/解码文件或信息, 外围设备发现, 数据加密以实现影响, 文件和目录发现, 服务停止, 本机API, 横向工具传输, 篡改: Internal Defacement, 系统信息发现, 系统恢复抑制, 网络共享发现, 设备驱动程序探测, 进程发现, 钓鱼
S0039 Net [7] 创建账户: Local Account, 创建账户: Domain Account, 密码策略发现, 权限组发现: Domain Groups, 权限组发现: Local Groups, 移除指标: Network Share Connection Removal, 系统时间发现, 系统服务: Service Execution, 系统服务发现, 系统网络连接发现, 网络共享发现, 账号发现: Domain Account, 账号发现: Local Account, 账号操控: Additional Local or Domain Groups, 远程服务: SMB/Windows Admin Shares, 远程系统发现
S0359 Nltest [5] 域信任发现, 系统网络配置发现, 远程系统发现
S0029 PsExec [2][5][3][6] 创建或修改系统进程: Windows Service, 创建账户: Domain Account, 横向工具传输, 系统服务: Service Execution, 远程服务: SMB/Windows Admin Shares
S1040 Rclone [7] 归档收集数据: Archive via Utility, 数据传输大小限制, 文件和目录发现, 替代协议渗出: Exfiltration Over Asymmetric Encrypted Non-C2 Protocol, 替代协议渗出: Exfiltration Over Unencrypted Non-C2 Protocol, 通过网络服务渗出: Exfiltration to Cloud Storage
S0183 Tor [3][6][4] 代理: Multi-hop Proxy, 加密通道: Asymmetric Cryptography

References