Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
90s -
max time network
146s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
04/01/2025, 14:50
Static task
static1
Behavioral task
behavioral1
Sample
Insomnia.zip
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
Insomnia.zip
Resource
win10v2004-20241007-en
Behavioral task
behavioral3
Sample
Insomnia_(password_2222).zip
Resource
win7-20240708-en
Behavioral task
behavioral4
Sample
Insomnia_(password_2222).zip
Resource
win10v2004-20241007-en
General
-
Target
Insomnia.zip
-
Size
160.6MB
-
MD5
c654fe3ac13d7381357755cec81c86fc
-
SHA1
9ee108a6a408432125e3ae8b14215fa43e29aa49
-
SHA256
934b98909d53f6571dc3a5c357fbbb8a8e9fb5af46b3c77f11a9f6abcceafb38
-
SHA512
e56a7c073689f2739561e4611acb4a9533858a4089065711c39605c8e8765b85808271b7012160be9cd5cddda53bc8835227557aea66f30850224831c94fad2c
-
SSDEEP
3145728:zvRQc9ujylZkkjS4YMOyEXrgHTSkJc0/5n3adrWXJsK:9TojUiKYxTXrme0Jcrm/
Malware Config
Extracted
lumma
https://abruptyopsn.shop/api
https://wholersorie.shop/api
https://framekgirus.shop/api
https://tirepublicerj.shop/api
https://noisycuttej.shop/api
https://rabidcowse.shop/api
https://cloudewahsj.shop/api
Signatures
-
Lumma family
-
Executes dropped EXE 2 IoCs
pid Process 3408 Insomnia.exe 5000 Insomnia.exe -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Insomnia.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Insomnia.exe -
Suspicious behavior: EnumeratesProcesses 8 IoCs
pid Process 3408 Insomnia.exe 3408 Insomnia.exe 3628 7zFM.exe 3628 7zFM.exe 5000 Insomnia.exe 5000 Insomnia.exe 3628 7zFM.exe 3628 7zFM.exe -
Suspicious behavior: GetForegroundWindowSpam 1 IoCs
pid Process 3628 7zFM.exe -
Suspicious use of AdjustPrivilegeToken 5 IoCs
description pid Process Token: SeRestorePrivilege 3628 7zFM.exe Token: 35 3628 7zFM.exe Token: SeSecurityPrivilege 3628 7zFM.exe Token: SeSecurityPrivilege 3628 7zFM.exe Token: SeSecurityPrivilege 3628 7zFM.exe -
Suspicious use of FindShellTrayWindow 5 IoCs
pid Process 3628 7zFM.exe 3628 7zFM.exe 3628 7zFM.exe 3628 7zFM.exe 3628 7zFM.exe -
Suspicious use of WriteProcessMemory 6 IoCs
description pid Process procid_target PID 3628 wrote to memory of 3408 3628 7zFM.exe 92 PID 3628 wrote to memory of 3408 3628 7zFM.exe 92 PID 3628 wrote to memory of 3408 3628 7zFM.exe 92 PID 3628 wrote to memory of 5000 3628 7zFM.exe 94 PID 3628 wrote to memory of 5000 3628 7zFM.exe 94 PID 3628 wrote to memory of 5000 3628 7zFM.exe 94
Processes
-
C:\Program Files\7-Zip\7zFM.exe"C:\Program Files\7-Zip\7zFM.exe" "C:\Users\Admin\AppData\Local\Temp\Insomnia.zip"1⤵
- Suspicious behavior: EnumeratesProcesses
- Suspicious behavior: GetForegroundWindowSpam
- Suspicious use of AdjustPrivilegeToken
- Suspicious use of FindShellTrayWindow
- Suspicious use of WriteProcessMemory
PID:3628 -
C:\Users\Admin\AppData\Local\Temp\7zOC2E23C38\Insomnia.exe"C:\Users\Admin\AppData\Local\Temp\7zOC2E23C38\Insomnia.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:3408
-
-
C:\Users\Admin\AppData\Local\Temp\7zOC2E52D68\Insomnia.exe"C:\Users\Admin\AppData\Local\Temp\7zOC2E52D68\Insomnia.exe"2⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious behavior: EnumeratesProcesses
PID:5000
-