| File name: | SandboxieInstall-533-1.exe |
| Full analysis: | https://app.any.run/tasks/5b6b6464-fbe9-48fb-b20f-224897045535 |
| Verdict: | Malicious activity |
| Analysis date: | February 22, 2020, 02:21:33 |
| OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
| Indicators: | |
| MIME: | application/x-dosexec |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
| MD5: | FD95E7DF93EBC6A67799A118D5E449C4 |
| SHA1: | C3A2076483189B4DF9973D13E3854B6C72A3FD1A |
| SHA256: | D6C88106023C810657F13A34935DF1C6C70B44A016F1BBD16BD7252B8D90B88C |
| SSDEEP: | 98304:c3lqmd8JtRk02+C/bXPBK9cpDJqj/3vcGFv/tFCLBOfBQlrg2KuMc79nIdKKT:cAmdeR+RKiLqj3vcG9/tULkuh1KkAT |
| .exe | | | Win64 Executable (generic) (76.4) |
|---|---|---|
| .exe | | | Win32 Executable (generic) (12.4) |
| .exe | | | Generic Win/DOS Executable (5.5) |
| .exe | | | DOS Executable Generic (5.5) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2019:12:17 01:49:34+01:00 |
| PEType: | PE32 |
| LinkerVersion: | 14 |
| CodeSize: | 42496 |
| InitializedDataSize: | 6097920 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x1490 |
| OSVersion: | 6 |
| ImageVersion: | - |
| SubsystemVersion: | 6 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 5.33.1.0 |
| ProductVersionNumber: | 5.33.1.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Windows NT 32-bit |
| ObjectFileType: | Dynamic link library |
| FileSubtype: | - |
| LanguageCode: | English (U.S.) |
| CharacterSet: | Unicode |
| Comments: | - |
| CompanyName: | Sandboxie Holdings, LLC |
| FileDescription: | Sandboxie Installer |
| FileVersion: | 5.33.1 |
| InternalName: | SandboxieInstall |
| LegalCopyright: | Copyright © 2004-2019 by Sandboxie Holdings, LLC |
| LegalTrademarks: | - |
| OriginalFileName: | SandboxieInstall.exe |
| PrivateBuild: | - |
| ProductName: | Sandboxie |
| ProductVersion: | 5.33.1 |
| SpecialBuild: | - |
| Architecture: | IMAGE_FILE_MACHINE_I386 |
|---|---|
| Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_GUI |
| Compilation Date: | 17-Dec-2019 00:49:34 |
| Detected languages: |
|
| Debug artifacts: |
|
| Comments: | - |
| CompanyName: | Sandboxie Holdings, LLC |
| FileDescription: | Sandboxie Installer |
| FileVersion: | 5.33.1 |
| InternalName: | SandboxieInstall |
| LegalCopyright: | Copyright © 2004-2019 by Sandboxie Holdings, LLC |
| LegalTrademarks: | - |
| OriginalFilename: | SandboxieInstall.exe |
| PrivateBuild: | - |
| ProductName: | Sandboxie |
| ProductVersion: | 5.33.1 |
| SpecialBuild: | - |
| Magic number: | MZ |
|---|---|
| Bytes on last page of file: | 0x0090 |
| Pages in file: | 0x0003 |
| Relocations: | 0x0000 |
| Size of header: | 0x0004 |
| Min extra paragraphs: | 0x0000 |
| Max extra paragraphs: | 0xFFFF |
| Initial SS value: | 0x0000 |
| Initial SP value: | 0x00B8 |
| Checksum: | 0x0000 |
| Initial IP value: | 0x0000 |
| Initial CS value: | 0x0000 |
| Overlay number: | 0x0000 |
| OEM identifier: | 0x0000 |
| OEM information: | 0x0000 |
| Address of NE header: | 0x00000108 |
| Signature: | PE |
|---|---|
| Machine: | IMAGE_FILE_MACHINE_I386 |
| Number of sections: | 6 |
| Time date stamp: | 17-Dec-2019 00:49:34 |
| Pointer to Symbol Table: | 0x00000000 |
| Number of symbols: | 0 |
| Size of Optional Header: | 0x00E0 |
| Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
|---|---|---|---|---|---|
.text | 0x00001000 | 0x0000A5D7 | 0x0000A600 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.64564 |
.rdata | 0x0000C000 | 0x00005864 | 0x00005A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 4.84921 |
.data | 0x00012000 | 0x000011A8 | 0x00000800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 2.00394 |
.gfids | 0x00014000 | 0x000000AC | 0x00000200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 1.41893 |
.rsrc | 0x00015000 | 0x005C8EF0 | 0x005C9000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.9885 |
.reloc | 0x005DE000 | 0x00000DC8 | 0x00000E00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 6.51081 |
Title | Entropy | Size | Codepage | Language | Type |
|---|---|---|---|---|---|
1 | 4.89623 | 392 | UNKNOWN | English - United States | RT_MANIFEST |
2 | 3.05563 | 4264 | UNKNOWN | English - United States | RT_ICON |
101 | 2.12663 | 34 | UNKNOWN | English - United States | RT_GROUP_ICON |
3232 | 7.988 | 2710272 | UNKNOWN | English - United States | RT_RCDATA |
6464 | 7.99148 | 3347288 | UNKNOWN | English - United States | RT_RCDATA |
KERNEL32.dll |
USER32.dll |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 376 | "C:\Program Files\Sandboxie\Start.exe" run_sbie_ctrl | C:\Program Files\Sandboxie\Start.exe | — | SandboxieInstall-32-bit-10909171.exe | |||||||||||
User: admin Company: Sandboxie Holdings, LLC Integrity Level: HIGH Description: Sandboxie Start Exit code: 1 Version: 5.33.1 Modules
| |||||||||||||||
| 836 | "C:\Program Files\Sandboxie\SbieSvc.exe" | C:\Program Files\Sandboxie\SbieSvc.exe | — | services.exe | |||||||||||
User: SYSTEM Company: Sandboxie Holdings, LLC Integrity Level: SYSTEM Description: Sandboxie Service Exit code: 0 Version: 5.33.1 Modules
| |||||||||||||||
| 1440 | "C:\Program Files\Sandboxie\SbieSvc.exe" | C:\Program Files\Sandboxie\SbieSvc.exe | — | services.exe | |||||||||||
User: SYSTEM Company: Sandboxie Holdings, LLC Integrity Level: SYSTEM Description: Sandboxie Service Exit code: 0 Version: 5.33.1 Modules
| |||||||||||||||
| 1492 | "C:\Users\admin\AppData\Local\Temp\SandboxieInstall-533-1.exe" | C:\Users\admin\AppData\Local\Temp\SandboxieInstall-32-bit-10909171.exe | SandboxieInstall-533-1.exe | ||||||||||||
User: admin Company: Sandboxie Holdings, LLC Integrity Level: HIGH Description: Sandboxie Installer Exit code: 0 Version: 5.33.1 Modules
| |||||||||||||||
| 2376 | "C:\Program Files\Sandboxie\SbieSvc.exe" | C:\Program Files\Sandboxie\SbieSvc.exe | — | services.exe | |||||||||||
User: SYSTEM Company: Sandboxie Holdings, LLC Integrity Level: SYSTEM Description: Sandboxie Service Exit code: 0 Version: 5.33.1 Modules
| |||||||||||||||
| 2392 | "C:\Program Files\Sandboxie\SbieSvc.exe" | C:\Program Files\Sandboxie\SbieSvc.exe | — | services.exe | |||||||||||
User: SYSTEM Company: Sandboxie Holdings, LLC Integrity Level: SYSTEM Description: Sandboxie Service Exit code: 0 Version: 5.33.1 Modules
| |||||||||||||||
| 2480 | "C:\Program Files\Sandboxie\SbieSvc.exe" | C:\Program Files\Sandboxie\SbieSvc.exe | — | services.exe | |||||||||||
User: SYSTEM Company: Sandboxie Holdings, LLC Integrity Level: SYSTEM Description: Sandboxie Service Exit code: 0 Version: 5.33.1 Modules
| |||||||||||||||
| 2492 | "C:\Program Files\Sandboxie\SbieSvc.exe" | C:\Program Files\Sandboxie\SbieSvc.exe | — | services.exe | |||||||||||
User: SYSTEM Company: Sandboxie Holdings, LLC Integrity Level: SYSTEM Description: Sandboxie Service Exit code: 0 Version: 5.33.1 Modules
| |||||||||||||||
| 3160 | "C:\Users\admin\AppData\Local\Temp\nst779B.tmp\KmdUtil.exe" /lang=1033 install SbieDrv "C:\Program Files\Sandboxie\SbieDrv.sys" type=kernel start=demand "msgfile=C:\Program Files\Sandboxie\SbieMsg.dll" altitude=86900 | C:\Users\admin\AppData\Local\Temp\nst779B.tmp\KmdUtil.exe | — | SandboxieInstall-32-bit-10909171.exe | |||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| 3200 | "C:\Users\admin\AppData\Local\Temp\nst779B.tmp\KmdUtil.exe" /lang=1033 scandll | C:\Users\admin\AppData\Local\Temp\nst779B.tmp\KmdUtil.exe | — | SandboxieInstall-32-bit-10909171.exe | |||||||||||
User: admin Integrity Level: HIGH Exit code: 0 Modules
| |||||||||||||||
| (PID) Process: | (1492) SandboxieInstall-32-bit-10909171.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings |
| Operation: | write | Name: | ProxyEnable |
Value: 0 | |||
| (PID) Process: | (1492) SandboxieInstall-32-bit-10909171.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\Connections |
| Operation: | write | Name: | SavedLegacySettings |
Value: 46000000A1000000010000000000000000000000000000000000000000000000C0E333BBEAB1D301000000000000000000000000020000001700000000000000FE800000000000007D6CB050D9C573F70B000000000000006D00330032005C004D00530049004D004700330032002E0064006C000100000004AA400014AA4000040000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000000002000000C0A8016400000000000000000000000000000000000000000800000000000000805D3F00983740000008000002000000000000600000002060040000B8A94000020000008802000060040000B8A9400004000000F8010000B284000088B64000B84B400043003A000000000000000000000000000000000000000000 | |||
| (PID) Process: | (1492) SandboxieInstall-32-bit-10909171.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | UNCAsIntranet |
Value: 0 | |||
| (PID) Process: | (1492) SandboxieInstall-32-bit-10909171.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\ZoneMap |
| Operation: | write | Name: | AutoDetect |
Value: 1 | |||
| (PID) Process: | (1492) SandboxieInstall-32-bit-10909171.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content |
| Operation: | write | Name: | CachePrefix |
Value: | |||
| (PID) Process: | (1492) SandboxieInstall-32-bit-10909171.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (1492) SandboxieInstall-32-bit-10909171.exe | Key: | HKEY_CURRENT_USER\Software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
| (PID) Process: | (1492) SandboxieInstall-32-bit-10909171.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\MuiCache\12B\52C64B7E |
| Operation: | write | Name: | LanguageList |
Value: en-US | |||
| (PID) Process: | (1492) SandboxieInstall-32-bit-10909171.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\CDD4EEAE6000AC7F40C3802C171E30148030C072 |
| Operation: | write | Name: | Blob |
Value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| |||
| (PID) Process: | (1492) SandboxieInstall-32-bit-10909171.exe | Key: | HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\SystemCertificates\ROOT\Certificates\A43489159A520F0D93D032CCAF37E7FE20A8B419 |
| Operation: | write | Name: | Blob |
Value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| |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 1492 | SandboxieInstall-32-bit-10909171.exe | C:\Users\admin\AppData\Local\Temp\CabDC71.tmp | — | |
MD5:— | SHA256:— | |||
| 1492 | SandboxieInstall-32-bit-10909171.exe | C:\Users\admin\AppData\Local\Temp\TarDC72.tmp | — | |
MD5:— | SHA256:— | |||
| 3740 | SandboxieInstall-533-1.exe | C:\Users\admin\AppData\Local\Temp\SandboxieInstall-32-bit-10909171.exe | executable | |
MD5:— | SHA256:— | |||
| 1492 | SandboxieInstall-32-bit-10909171.exe | C:\Users\admin\AppData\Local\Temp\nst779B.tmp\ioSpecial.ini | text | |
MD5:— | SHA256:— | |||
| 1492 | SandboxieInstall-32-bit-10909171.exe | C:\Users\admin\AppData\Local\Temp\nst779B.tmp\KmdUtil.exe | executable | |
MD5:— | SHA256:— | |||
| 1492 | SandboxieInstall-32-bit-10909171.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62 | binary | |
MD5:— | SHA256:— | |||
| 1492 | SandboxieInstall-32-bit-10909171.exe | C:\Users\admin\AppData\Local\Temp\nst779B.tmp\SbieDll.dll | executable | |
MD5:— | SHA256:— | |||
| 1492 | SandboxieInstall-32-bit-10909171.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894 | der | |
MD5:— | SHA256:— | |||
| 1492 | SandboxieInstall-32-bit-10909171.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894 | binary | |
MD5:— | SHA256:— | |||
| 1492 | SandboxieInstall-32-bit-10909171.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62 | der | |
MD5:— | SHA256:— | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
1492 | SandboxieInstall-32-bit-10909171.exe | GET | 200 | 13.35.254.226:80 | http://ocsp.rootg2.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBSIfaREXmfqfJR3TkMYnD7O5MhzEgQUnF8A36oB1zArOIiiuG1KnPIRkYMCEwZ%2FlEoqJ83z%2BsKuKwH5CO65xMY%3D | US | der | 1.51 Kb | whitelisted |
1492 | SandboxieInstall-32-bit-10909171.exe | GET | 200 | 143.204.208.23:80 | http://ocsp.rootca1.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBRPWaOUU8%2B5VZ5%2Fa9jFTaU9pkK3FAQUhBjMhTTsvAyUlC4IWZzHshBOCggCEwZ%2FlFeFh%2Bisd96yUzJbvJmLVg0%3D | US | der | 1.39 Kb | shared |
1492 | SandboxieInstall-32-bit-10909171.exe | GET | 200 | 13.35.254.192:80 | http://o.ss2.us//MEowSDBGMEQwQjAJBgUrDgMCGgUABBSLwZ6EW5gdYc9UaSEaaLjjETNtkAQUv1%2B30c7dH4b0W1Ws3NcQwg6piOcCCQCnDkpMNIK3fw%3D%3D | US | der | 1.70 Kb | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
1492 | SandboxieInstall-32-bit-10909171.exe | 143.204.202.29:443 | www.sandboxie.com | — | US | suspicious |
1492 | SandboxieInstall-32-bit-10909171.exe | 13.35.254.192:80 | o.ss2.us | — | US | unknown |
1492 | SandboxieInstall-32-bit-10909171.exe | 13.35.254.226:80 | ocsp.rootg2.amazontrust.com | — | US | whitelisted |
1492 | SandboxieInstall-32-bit-10909171.exe | 143.204.208.23:80 | ocsp.rootca1.amazontrust.com | — | US | whitelisted |
Domain | IP | Reputation |
|---|---|---|
www.sandboxie.com |
| shared |
o.ss2.us |
| whitelisted |
ocsp.rootg2.amazontrust.com |
| whitelisted |
ocsp.rootca1.amazontrust.com |
| shared |