Analysis
-
max time kernel
35s -
max time network
36s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-01-2025 10:29
Static task
static1
General
-
Target
Insomnia.exe
-
Size
5.0MB
-
MD5
e33c8a921ebb408f81e97e4fc5210696
-
SHA1
1aa7b8fd7ebe4cc124a92db223689c20ef50d4a5
-
SHA256
e683fc5582f346d3c1e1e20f888c0fae1e978acf348f4e8c79f68378dca1288b
-
SHA512
19cd67a93281aa0eb20f9f8d6d13df976f0ec021e947288e74a7b4bc8a8ec673fd6fc056ab359e82f2571e867c15d26660a3f41fe74b0eb1b33c19f6cb66c61e
-
SSDEEP
49152:pFf8RRWuQFfMau8lRam6N0qkUb2GDtZ2kQ/7Wz3+VksmYVQMqEi33ozVZd7v6x11:pZ8kFfMP3m6N9DbL2kgqMqEi33oNc
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
Signatures
-
Lumma family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 828 set thread context of 644 828 Insomnia.exe 97 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Insomnia.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 828 wrote to memory of 644 828 Insomnia.exe 97 PID 828 wrote to memory of 644 828 Insomnia.exe 97 PID 828 wrote to memory of 644 828 Insomnia.exe 97 PID 828 wrote to memory of 644 828 Insomnia.exe 97 PID 828 wrote to memory of 644 828 Insomnia.exe 97 PID 828 wrote to memory of 644 828 Insomnia.exe 97 PID 828 wrote to memory of 644 828 Insomnia.exe 97 PID 828 wrote to memory of 644 828 Insomnia.exe 97 PID 828 wrote to memory of 644 828 Insomnia.exe 97
Processes
-
C:\Users\Admin\AppData\Local\Temp\Insomnia.exe"C:\Users\Admin\AppData\Local\Temp\Insomnia.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:828 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"2⤵
- System Location Discovery: System Language Discovery
PID:644
-