Analysis
-
max time kernel
151s -
max time network
156s -
platform
windows10-2004_x64 -
resource
win10v2004-20220812-en -
resource tags
arch:x64arch:x86image:win10v2004-20220812-enlocale:en-usos:windows10-2004-x64system -
submitted
06-02-2023 21:40
Static task
static1
Behavioral task
behavioral1
Sample
GlassWireSetup.exe
Resource
win7-20221111-en
General
-
Target
GlassWireSetup.exe
-
Size
66.0MB
-
MD5
cbdff02625ef580bf509b60832bf06c3
-
SHA1
fd3ce416b3d8e4ce1af8b310a89e2ef58d25c263
-
SHA256
cc6174aa776a0b1bc29c8a466de095e281cc9a238dee7363196dbbdbb7bb2873
-
SHA512
4c2e645780466e58015e678c3dbd2041cdd39089d50d2afe7c250b5aa813023ff2b23a57cc0fe31986e4fb0f50f374feb5b45315e47da144f74875341a1f3964
-
SSDEEP
1572864:uHAyCN598RzIxTnHF7d1pXTygI9hbl0rcmjXFcI9BKvBiSVwzfZf4:ugJyoTHz1ByV1Sr3FcIXiALzW
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
GlassWireSetup.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ GlassWireSetup.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
GlassWireSetup.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion GlassWireSetup.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion GlassWireSetup.exe -
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
Processes:
GlassWireSetup.exedescription ioc process Key value queried \REGISTRY\USER\S-1-5-21-2629973501-4017243118-3254762364-1000\Control Panel\International\Geo\Nation GlassWireSetup.exe -
Loads dropped DLL 3 IoCs
Processes:
GlassWireSetup.exepid process 3852 GlassWireSetup.exe 3852 GlassWireSetup.exe 3852 GlassWireSetup.exe -
Processes:
GlassWireSetup.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA GlassWireSetup.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
GlassWireSetup.exepid process 3852 GlassWireSetup.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s). Likely ransomware behaviour.
Processes
-
C:\Users\Admin\AppData\Local\Temp\GlassWireSetup.exe"C:\Users\Admin\AppData\Local\Temp\GlassWireSetup.exe"1⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks computer location settings
- Loads dropped DLL
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
Network
MITRE ATT&CK Matrix ATT&CK v6
Replay Monitor
Loading Replay Monitor...
Downloads
-
C:\Users\Admin\AppData\Local\Temp\nsd9D7E.tmp\System.dllFilesize
12KB
MD5cff85c549d536f651d4fb8387f1976f2
SHA1d41ce3a5ff609df9cf5c7e207d3b59bf8a48530e
SHA2568dc562cda7217a3a52db898243de3e2ed68b80e62ddcb8619545ed0b4e7f65a8
SHA512531d6328daf3b86d85556016d299798fa06fefc81604185108a342d000e203094c8c12226a12bd6e1f89b0db501fb66f827b610d460b933bd4ab936ac2fd8a88
-
C:\Users\Admin\AppData\Local\Temp\nsd9D7E.tmp\nsDialogs.dllFilesize
9KB
MD56c3f8c94d0727894d706940a8a980543
SHA10d1bcad901be377f38d579aafc0c41c0ef8dcefd
SHA25656b96add1978b1abba286f7f8982b0efbe007d4a48b3ded6a4d408e01d753fe2
SHA5122094f0e4bb7c806a5ff27f83a1d572a5512d979eefda3345baff27d2c89e828f68466d08c3ca250da11b01fc0407a21743037c25e94fbe688566dd7deaebd355
-
C:\Users\Admin\AppData\Local\Temp\nsd9D7E.tmp\nsihelper.dllFilesize
4.6MB
MD5af3014521035887c994e3a4ecaba8993
SHA1b1d811f1575fd829de79c5f50c6842a003430bb5
SHA25658af17b511a39a1b6fae3a4d7502e7560fec376ba11005c106d061cb317bdfb4
SHA5126eb78bc59aff57d78706e92132d1445b734cb22e1de147c0cba77a51af50665607c08f55b9067cd8d33da23f02e568f58393c818848427da62562b325e05f547
-
memory/3852-138-0x0000000074310000-0x0000000074FED000-memory.dmpFilesize
12.9MB
-
memory/3852-136-0x0000000074310000-0x0000000074FED000-memory.dmpFilesize
12.9MB
-
memory/3852-137-0x0000000074310000-0x0000000074FED000-memory.dmpFilesize
12.9MB
-
memory/3852-134-0x0000000074310000-0x0000000074FED000-memory.dmpFilesize
12.9MB
-
memory/3852-139-0x0000000074310000-0x0000000074FED000-memory.dmpFilesize
12.9MB
-
memory/3852-140-0x0000000074310000-0x0000000074FED000-memory.dmpFilesize
12.9MB
-
memory/3852-141-0x0000000074310000-0x0000000074FED000-memory.dmpFilesize
12.9MB
-
memory/3852-142-0x0000000074310000-0x0000000074FED000-memory.dmpFilesize
12.9MB
-
memory/3852-135-0x0000000077CD0000-0x0000000077E73000-memory.dmpFilesize
1.6MB
-
memory/3852-144-0x0000000077CD0000-0x0000000077E73000-memory.dmpFilesize
1.6MB