Overview
overview
9Static
static
7GlassWireSetup.exe
windows7-x64
9GlassWireSetup.exe
windows10-2004-x64
9$PLUGINSDI...St.exe
windows7-x64
9$PLUGINSDI...St.exe
windows10-2004-x64
9$PLUGINSDI...nu.dll
windows7-x64
3$PLUGINSDI...nu.dll
windows10-2004-x64
3$PLUGINSDI...em.dll
windows7-x64
3$PLUGINSDI...em.dll
windows10-2004-x64
3$PLUGINSDI...gs.dll
windows7-x64
3$PLUGINSDI...gs.dll
windows10-2004-x64
3$PLUGINSDI...ec.dll
windows7-x64
3$PLUGINSDI...ec.dll
windows10-2004-x64
3$PLUGINSDI...er.dll
windows7-x64
9$PLUGINSDI...er.dll
windows10-2004-x64
9$PLUGINSDI...86.exe
windows7-x64
7$PLUGINSDI...86.exe
windows10-2004-x64
7GWCtlSrv.exe
windows7-x64
9GWCtlSrv.exe
windows10-2004-x64
9GWEventLog.dll
windows7-x64
9GWEventLog.dll
windows10-2004-x64
9GWIdlMon.exe
windows7-x64
9GWIdlMon.exe
windows10-2004-x64
9GWUnlock.exe
windows7-x64
9GWUnlock.exe
windows10-2004-x64
9GWUpgradeMonitor.exe
windows7-x64
9GWUpgradeMonitor.exe
windows10-2004-x64
9GlassWire.exe
windows7-x64
9GlassWire.exe
windows10-2004-x64
9Qt5Core.dll
windows7-x64
1Qt5Core.dll
windows10-2004-x64
3Qt5Gui.dll
windows7-x64
1Qt5Gui.dll
windows10-2004-x64
1Analysis
-
max time kernel
92s -
max time network
125s -
platform
windows10-2004_x64 -
resource
win10v2004-20240508-en -
resource tags
arch:x64arch:x86image:win10v2004-20240508-enlocale:en-usos:windows10-2004-x64system -
submitted
30-06-2024 07:11
Behavioral task
behavioral1
Sample
GlassWireSetup.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
GlassWireSetup.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/GWInstSt.exe
Resource
win7-20231129-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/GWInstSt.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win7-20240611-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/StartMenu.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win7-20240508-en
Behavioral task
behavioral8
Sample
$PLUGINSDIR/System.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral9
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win7-20240508-en
Behavioral task
behavioral10
Sample
$PLUGINSDIR/nsDialogs.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral11
Sample
$PLUGINSDIR/nsExec.dll
Resource
win7-20240611-en
Behavioral task
behavioral12
Sample
$PLUGINSDIR/nsExec.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral13
Sample
$PLUGINSDIR/nsihelper.dll
Resource
win7-20240220-en
Behavioral task
behavioral14
Sample
$PLUGINSDIR/nsihelper.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral15
Sample
$PLUGINSDIR/vc_redist.x86.exe
Resource
win7-20240221-en
Behavioral task
behavioral16
Sample
$PLUGINSDIR/vc_redist.x86.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral17
Sample
GWCtlSrv.exe
Resource
win7-20240508-en
Behavioral task
behavioral18
Sample
GWCtlSrv.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral19
Sample
GWEventLog.dll
Resource
win7-20240419-en
Behavioral task
behavioral20
Sample
GWEventLog.dll
Resource
win10v2004-20240508-en
Behavioral task
behavioral21
Sample
GWIdlMon.exe
Resource
win7-20231129-en
Behavioral task
behavioral22
Sample
GWIdlMon.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral23
Sample
GWUnlock.exe
Resource
win7-20240611-en
Behavioral task
behavioral24
Sample
GWUnlock.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral25
Sample
GWUpgradeMonitor.exe
Resource
win7-20240611-en
Behavioral task
behavioral26
Sample
GWUpgradeMonitor.exe
Resource
win10v2004-20240611-en
Behavioral task
behavioral27
Sample
GlassWire.exe
Resource
win7-20240220-en
Behavioral task
behavioral28
Sample
GlassWire.exe
Resource
win10v2004-20240508-en
Behavioral task
behavioral29
Sample
Qt5Core.dll
Resource
win7-20231129-en
Behavioral task
behavioral30
Sample
Qt5Core.dll
Resource
win10v2004-20240611-en
Behavioral task
behavioral31
Sample
Qt5Gui.dll
Resource
win7-20240419-en
Behavioral task
behavioral32
Sample
Qt5Gui.dll
Resource
win10v2004-20240611-en
General
-
Target
GWEventLog.dll
-
Size
4.5MB
-
MD5
1e1b855cd1cc8bc00c0dbb0fad8e75dd
-
SHA1
e77da5a642e76da25f20726d7490ac9333d1ca2d
-
SHA256
a97e9c4955460de4449b509198363ca5e35e31b29ea07766741744b559614fa8
-
SHA512
339fff314fc5d16e78ff3755200e7cccb2dbb8d8a040a8c3f532dd9aecf6ae0563fc2ea44be55558dda2d036aa878f0e37e716b502528eec64ffca98b73a79ed
-
SSDEEP
98304:PmnQGvFmplY+XPmgh/vxqPYhc335Z2nRfe5bWGHtXbVkOz0jC64GBT8T:PKmpBmCwleRfCbWLzjChGxW
Malware Config
Signatures
-
Identifies VirtualBox via ACPI registry values (likely anti-VM) 2 TTPs 1 IoCs
Processes:
rundll32.exedescription ioc process Key opened \REGISTRY\MACHINE\HARDWARE\ACPI\DSDT\VBOX__ rundll32.exe -
Checks BIOS information in registry 2 TTPs 2 IoCs
BIOS information is often read in order to detect sandboxing environments.
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\SystemBiosVersion rundll32.exe Key value queried \REGISTRY\MACHINE\HARDWARE\DESCRIPTION\System\VideoBiosVersion rundll32.exe -
Processes:
rundll32.exedescription ioc process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA rundll32.exe -
Suspicious use of NtSetInformationThreadHideFromDebugger 1 IoCs
Processes:
rundll32.exepid process 212 rundll32.exe -
Program crash 1 IoCs
Processes:
WerFault.exepid pid_target process target process 2596 212 WerFault.exe rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
Processes:
rundll32.exedescription pid process target process PID 3288 wrote to memory of 212 3288 rundll32.exe rundll32.exe PID 3288 wrote to memory of 212 3288 rundll32.exe rundll32.exe PID 3288 wrote to memory of 212 3288 rundll32.exe rundll32.exe
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\GWEventLog.dll,#11⤵
- Suspicious use of WriteProcessMemory
-
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\GWEventLog.dll,#12⤵
- Identifies VirtualBox via ACPI registry values (likely anti-VM)
- Checks BIOS information in registry
- Checks whether UAC is enabled
- Suspicious use of NtSetInformationThreadHideFromDebugger
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 212 -s 6603⤵
- Program crash
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 212 -ip 2121⤵
Network
MITRE ATT&CK Matrix ATT&CK v13
Replay Monitor
Loading Replay Monitor...
Downloads
-
memory/212-0-0x00000000770C4000-0x00000000770C6000-memory.dmpFilesize
8KB
-
memory/212-1-0x0000000073ED0000-0x0000000074B2F000-memory.dmpFilesize
12.4MB
-
memory/212-2-0x0000000073ED0000-0x0000000074B2F000-memory.dmpFilesize
12.4MB
-
memory/212-3-0x0000000073ED0000-0x0000000074B2F000-memory.dmpFilesize
12.4MB
-
memory/212-4-0x0000000073ED0000-0x0000000074B2F000-memory.dmpFilesize
12.4MB
-
memory/212-5-0x0000000073ED0000-0x0000000074B2F000-memory.dmpFilesize
12.4MB
-
memory/212-8-0x0000000073ED0000-0x0000000074B2F000-memory.dmpFilesize
12.4MB
-
memory/212-7-0x0000000073ED0000-0x0000000074B2F000-memory.dmpFilesize
12.4MB
-
memory/212-6-0x0000000073ED0000-0x0000000074B2F000-memory.dmpFilesize
12.4MB
-
memory/212-9-0x0000000073ED0000-0x0000000074B2F000-memory.dmpFilesize
12.4MB