Analysis
-
max time kernel
94s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20241007-en -
resource tags
arch:x64arch:x86image:win10v2004-20241007-enlocale:en-usos:windows10-2004-x64system -
submitted
09-01-2025 10:39
Static task
static1
Behavioral task
behavioral1
Sample
Insomnia.exe
Resource
win7-20240903-en
General
-
Target
Insomnia.exe
-
Size
5.0MB
-
MD5
e33c8a921ebb408f81e97e4fc5210696
-
SHA1
1aa7b8fd7ebe4cc124a92db223689c20ef50d4a5
-
SHA256
e683fc5582f346d3c1e1e20f888c0fae1e978acf348f4e8c79f68378dca1288b
-
SHA512
19cd67a93281aa0eb20f9f8d6d13df976f0ec021e947288e74a7b4bc8a8ec673fd6fc056ab359e82f2571e867c15d26660a3f41fe74b0eb1b33c19f6cb66c61e
-
SSDEEP
49152:pFf8RRWuQFfMau8lRam6N0qkUb2GDtZ2kQ/7Wz3+VksmYVQMqEi33ozVZd7v6x11:pZ8kFfMP3m6N9DbL2kgqMqEi33oNc
Malware Config
Extracted
lumma
https://cloudewahsj.shop/api
https://rabidcowse.shop/api
https://noisycuttej.shop/api
https://tirepublicerj.shop/api
https://framekgirus.shop/api
https://wholersorie.shop/api
https://abruptyopsn.shop/api
https://nearycrepso.shop/api
Signatures
-
Lumma family
-
Suspicious use of SetThreadContext 1 IoCs
description pid Process procid_target PID 1668 set thread context of 2304 1668 Insomnia.exe 95 -
System Location Discovery: System Language Discovery 1 TTPs 2 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Insomnia.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language BitLockerToGo.exe -
Suspicious use of WriteProcessMemory 9 IoCs
description pid Process procid_target PID 1668 wrote to memory of 2304 1668 Insomnia.exe 95 PID 1668 wrote to memory of 2304 1668 Insomnia.exe 95 PID 1668 wrote to memory of 2304 1668 Insomnia.exe 95 PID 1668 wrote to memory of 2304 1668 Insomnia.exe 95 PID 1668 wrote to memory of 2304 1668 Insomnia.exe 95 PID 1668 wrote to memory of 2304 1668 Insomnia.exe 95 PID 1668 wrote to memory of 2304 1668 Insomnia.exe 95 PID 1668 wrote to memory of 2304 1668 Insomnia.exe 95 PID 1668 wrote to memory of 2304 1668 Insomnia.exe 95
Processes
-
C:\Users\Admin\AppData\Local\Temp\Insomnia.exe"C:\Users\Admin\AppData\Local\Temp\Insomnia.exe"1⤵
- Suspicious use of SetThreadContext
- System Location Discovery: System Language Discovery
- Suspicious use of WriteProcessMemory
PID:1668 -
C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"C:\Windows\BitLockerDiscoveryVolumeContents\BitLockerToGo.exe"2⤵
- System Location Discovery: System Language Discovery
PID:2304
-