File name: | SandboxieInstall-533-1.exe |
Full analysis: | https://app.any.run/tasks/5b6b6464-fbe9-48fb-b20f-224897045535 |
Verdict: | Malicious activity |
Analysis date: | February 22, 2020, 02:21:33 |
OS: | Windows 7 Professional Service Pack 1 (build: 7601, 32 bit) |
Indicators: | |
MIME: | application/x-dosexec |
File info: | PE32 executable (GUI) Intel 80386, for MS Windows |
MD5: | FD95E7DF93EBC6A67799A118D5E449C4 |
SHA1: | C3A2076483189B4DF9973D13E3854B6C72A3FD1A |
SHA256: | D6C88106023C810657F13A34935DF1C6C70B44A016F1BBD16BD7252B8D90B88C |
SSDEEP: | 98304:c3lqmd8JtRk02+C/bXPBK9cpDJqj/3vcGFv/tFCLBOfBQlrg2KuMc79nIdKKT:cAmdeR+RKiLqj3vcG9/tULkuh1KkAT |
.exe | | | Win64 Executable (generic) (76.4) |
---|---|---|
.exe | | | Win32 Executable (generic) (12.4) |
.exe | | | Generic Win/DOS Executable (5.5) |
.exe | | | DOS Executable Generic (5.5) |
MachineType: | Intel 386 or later, and compatibles |
---|---|
TimeStamp: | 2019:12:17 01:49:34+01:00 |
PEType: | PE32 |
LinkerVersion: | 14 |
CodeSize: | 42496 |
InitializedDataSize: | 6097920 |
UninitializedDataSize: | - |
EntryPoint: | 0x1490 |
OSVersion: | 6 |
ImageVersion: | - |
SubsystemVersion: | 6 |
Subsystem: | Windows GUI |
FileVersionNumber: | 5.33.1.0 |
ProductVersionNumber: | 5.33.1.0 |
FileFlagsMask: | 0x003f |
FileFlags: | (none) |
FileOS: | Windows NT 32-bit |
ObjectFileType: | Dynamic link library |
FileSubtype: | - |
LanguageCode: | English (U.S.) |
CharacterSet: | Unicode |
Comments: | - |
CompanyName: | Sandboxie Holdings, LLC |
FileDescription: | Sandboxie Installer |
FileVersion: | 5.33.1 |
InternalName: | SandboxieInstall |
LegalCopyright: | Copyright © 2004-2019 by Sandboxie Holdings, LLC |
LegalTrademarks: | - |
OriginalFileName: | SandboxieInstall.exe |
PrivateBuild: | - |
ProductName: | Sandboxie |
ProductVersion: | 5.33.1 |
SpecialBuild: | - |
Architecture: | IMAGE_FILE_MACHINE_I386 |
---|---|
Subsystem: | IMAGE_SUBSYSTEM_WINDOWS_GUI |
Compilation Date: | 17-Dec-2019 00:49:34 |
Detected languages: |
|
Debug artifacts: |
|
Comments: | - |
CompanyName: | Sandboxie Holdings, LLC |
FileDescription: | Sandboxie Installer |
FileVersion: | 5.33.1 |
InternalName: | SandboxieInstall |
LegalCopyright: | Copyright © 2004-2019 by Sandboxie Holdings, LLC |
LegalTrademarks: | - |
OriginalFilename: | SandboxieInstall.exe |
PrivateBuild: | - |
ProductName: | Sandboxie |
ProductVersion: | 5.33.1 |
SpecialBuild: | - |
Magic number: | MZ |
---|---|
Bytes on last page of file: | 0x0090 |
Pages in file: | 0x0003 |
Relocations: | 0x0000 |
Size of header: | 0x0004 |
Min extra paragraphs: | 0x0000 |
Max extra paragraphs: | 0xFFFF |
Initial SS value: | 0x0000 |
Initial SP value: | 0x00B8 |
Checksum: | 0x0000 |
Initial IP value: | 0x0000 |
Initial CS value: | 0x0000 |
Overlay number: | 0x0000 |
OEM identifier: | 0x0000 |
OEM information: | 0x0000 |
Address of NE header: | 0x00000108 |
Signature: | PE |
---|---|
Machine: | IMAGE_FILE_MACHINE_I386 |
Number of sections: | 6 |
Time date stamp: | 17-Dec-2019 00:49:34 |
Pointer to Symbol Table: | 0x00000000 |
Number of symbols: | 0 |
Size of Optional Header: | 0x00E0 |
Characteristics: |
|
Name | Virtual Address | Virtual Size | Raw Size | Charateristics | Entropy |
---|---|---|---|---|---|
.text | 0x00001000 | 0x0000A5D7 | 0x0000A600 | IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ | 6.64564 |
.rdata | 0x0000C000 | 0x00005864 | 0x00005A00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 4.84921 |
.data | 0x00012000 | 0x000011A8 | 0x00000800 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE | 2.00394 |
.gfids | 0x00014000 | 0x000000AC | 0x00000200 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 1.41893 |
.rsrc | 0x00015000 | 0x005C8EF0 | 0x005C9000 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ | 7.9885 |
.reloc | 0x005DE000 | 0x00000DC8 | 0x00000E00 | IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ | 6.51081 |
Title | Entropy | Size | Codepage | Language | Type |
---|---|---|---|---|---|
1 | 4.89623 | 392 | UNKNOWN | English - United States | RT_MANIFEST |
2 | 3.05563 | 4264 | UNKNOWN | English - United States | RT_ICON |
101 | 2.12663 | 34 | UNKNOWN | English - United States | RT_GROUP_ICON |
3232 | 7.988 | 2710272 | UNKNOWN | English - United States | RT_RCDATA |
6464 | 7.99148 | 3347288 | UNKNOWN | English - United States | RT_RCDATA |
KERNEL32.dll |
USER32.dll |
PID | CMD | Path | Indicators | Parent process |
---|---|---|---|---|
3420 | "C:\Users\admin\AppData\Local\Temp\SandboxieInstall-533-1.exe" | C:\Users\admin\AppData\Local\Temp\SandboxieInstall-533-1.exe | — | explorer.exe |
User: admin Company: Sandboxie Holdings, LLC Integrity Level: MEDIUM Description: Sandboxie Installer Exit code: 3221226540 Version: 5.33.1 | ||||
3740 | "C:\Users\admin\AppData\Local\Temp\SandboxieInstall-533-1.exe" | C:\Users\admin\AppData\Local\Temp\SandboxieInstall-533-1.exe | explorer.exe | |
User: admin Company: Sandboxie Holdings, LLC Integrity Level: HIGH Description: Sandboxie Installer Exit code: 0 Version: 5.33.1 | ||||
1492 | "C:\Users\admin\AppData\Local\Temp\SandboxieInstall-533-1.exe" | C:\Users\admin\AppData\Local\Temp\SandboxieInstall-32-bit-10909171.exe | SandboxieInstall-533-1.exe | |
User: admin Company: Sandboxie Holdings, LLC Integrity Level: HIGH Description: Sandboxie Installer Exit code: 0 Version: 5.33.1 | ||||
3200 | "C:\Users\admin\AppData\Local\Temp\nst779B.tmp\KmdUtil.exe" /lang=1033 scandll | C:\Users\admin\AppData\Local\Temp\nst779B.tmp\KmdUtil.exe | — | SandboxieInstall-32-bit-10909171.exe |
User: admin Integrity Level: HIGH Exit code: 0 | ||||
3392 | "C:\Users\admin\AppData\Local\Temp\nst779B.tmp\KmdUtil.exe" /lang=1033 stop SbieSvc | C:\Users\admin\AppData\Local\Temp\nst779B.tmp\KmdUtil.exe | — | SandboxieInstall-32-bit-10909171.exe |
User: admin Integrity Level: HIGH Exit code: 0 | ||||
3768 | "C:\Users\admin\AppData\Local\Temp\nst779B.tmp\KmdUtil.exe" /lang=1033 stop SbieDrv | C:\Users\admin\AppData\Local\Temp\nst779B.tmp\KmdUtil.exe | — | SandboxieInstall-32-bit-10909171.exe |
User: admin Integrity Level: HIGH Exit code: 0 | ||||
3160 | "C:\Users\admin\AppData\Local\Temp\nst779B.tmp\KmdUtil.exe" /lang=1033 install SbieDrv "C:\Program Files\Sandboxie\SbieDrv.sys" type=kernel start=demand "msgfile=C:\Program Files\Sandboxie\SbieMsg.dll" altitude=86900 | C:\Users\admin\AppData\Local\Temp\nst779B.tmp\KmdUtil.exe | — | SandboxieInstall-32-bit-10909171.exe |
User: admin Integrity Level: HIGH Exit code: 0 | ||||
3868 | "C:\Users\admin\AppData\Local\Temp\nst779B.tmp\KmdUtil.exe" /lang=1033 install SbieSvc "\"C:\Program Files\Sandboxie\SbieSvc.exe"\" type=own start=auto "display=Sandboxie Service" group=UIGroup "msgfile=C:\Program Files\Sandboxie\SbieMsg.dll" | C:\Users\admin\AppData\Local\Temp\nst779B.tmp\KmdUtil.exe | — | SandboxieInstall-32-bit-10909171.exe |
User: admin Integrity Level: HIGH Exit code: 0 | ||||
3320 | "C:\Users\admin\AppData\Local\Temp\nst779B.tmp\KmdUtil.exe" /lang=1033 start SbieSvc | C:\Users\admin\AppData\Local\Temp\nst779B.tmp\KmdUtil.exe | — | SandboxieInstall-32-bit-10909171.exe |
User: admin Integrity Level: HIGH Exit code: 0 | ||||
3872 | "C:\Program Files\Sandboxie\SbieSvc.exe" | C:\Program Files\Sandboxie\SbieSvc.exe | — | services.exe |
User: SYSTEM Company: Sandboxie Holdings, LLC Integrity Level: SYSTEM Description: Sandboxie Service Exit code: 0 Version: 5.33.1 |
PID | Process | Filename | Type | |
---|---|---|---|---|
1492 | SandboxieInstall-32-bit-10909171.exe | C:\Users\admin\AppData\Local\Temp\CabDC71.tmp | — | |
MD5:— | SHA256:— | |||
1492 | SandboxieInstall-32-bit-10909171.exe | C:\Users\admin\AppData\Local\Temp\TarDC72.tmp | — | |
MD5:— | SHA256:— | |||
1492 | SandboxieInstall-32-bit-10909171.exe | C:\Users\admin\AppData\Local\Temp\nst779B.tmp\ioSpecial.ini | text | |
MD5:46B143EF87FE483C4EB56A5A973B297C | SHA256:E7D4F36E0A6A8238922F3D484939766AE5D9D741C1832C05AFCACE33E74D53A8 | |||
1492 | SandboxieInstall-32-bit-10909171.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894 | der | |
MD5:09631FF0C2F31AA07F21DD04689B1EFC | SHA256:8214E64354888C2F3C333378AFB0D1D8C7BBC9562F004DF7CA8BE20C534A8B83 | |||
1492 | SandboxieInstall-32-bit-10909171.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\Content\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62 | der | |
MD5:43AC500D589FCFAF053FB988CDC3B1C9 | SHA256:8839AC6BF994C13BF6102DE97F2023983DECF556104DD4602D77D4798B94A26D | |||
1492 | SandboxieInstall-32-bit-10909171.exe | C:\Users\admin\AppData\Local\Temp\nst779B.tmp\SbieDll.dll | executable | |
MD5:0B42458EF423FF9AACD7B3D124FA47B7 | SHA256:E107004C3FDD464CF193B485223D050A9F5C70E286289FD7426A16FD91E63978 | |||
1492 | SandboxieInstall-32-bit-10909171.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\B66240B0F6C84BD4857ABA60CF5CE4A0_5043E0F5DF723415C9EECC201C838A62 | binary | |
MD5:18799EE16591B63EE690E7EFEF732384 | SHA256:F70BDBED72794830533C3960E014C1B7DAB0289CE0C2ED853A64126FE0839A30 | |||
1492 | SandboxieInstall-32-bit-10909171.exe | C:\Users\admin\AppData\LocalLow\Microsoft\CryptnetUrlCache\MetaData\BAD725C80F9E10846F35D039A996E4A8_88B6AE015495C1ECC395D19C1DD02894 | binary | |
MD5:C5E92E96A9D4F45C25639A2A453D05FD | SHA256:C2137FB54C95557D0C6B68057FFA187D50F4FD3989346DE0E38FF409E3A0D070 | |||
1492 | SandboxieInstall-32-bit-10909171.exe | C:\Program Files\Sandboxie\SbieSvc.exe | executable | |
MD5:794949EABF492FF11839DD8330ABD803 | SHA256:9F64AAD8F1EBA3A5A29815B84968A64984B7B3FCC67AE8315FD42C631A97816B | |||
1492 | SandboxieInstall-32-bit-10909171.exe | C:\Users\admin\AppData\Local\Temp\nst779B.tmp\Warning.ini | text | |
MD5:4D358B27A971751E0C517061C948D96A | SHA256:74EE005CEB920094D99AA274ED37429EFE439FBC10E9D238C78DB4C836018A17 |
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
---|---|---|---|---|---|---|---|---|---|
1492 | SandboxieInstall-32-bit-10909171.exe | GET | 200 | 13.35.254.192:80 | http://o.ss2.us//MEowSDBGMEQwQjAJBgUrDgMCGgUABBSLwZ6EW5gdYc9UaSEaaLjjETNtkAQUv1%2B30c7dH4b0W1Ws3NcQwg6piOcCCQCnDkpMNIK3fw%3D%3D | US | der | 1.70 Kb | whitelisted |
1492 | SandboxieInstall-32-bit-10909171.exe | GET | 200 | 13.35.254.226:80 | http://ocsp.rootg2.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBSIfaREXmfqfJR3TkMYnD7O5MhzEgQUnF8A36oB1zArOIiiuG1KnPIRkYMCEwZ%2FlEoqJ83z%2BsKuKwH5CO65xMY%3D | US | der | 1.51 Kb | whitelisted |
1492 | SandboxieInstall-32-bit-10909171.exe | GET | 200 | 143.204.208.23:80 | http://ocsp.rootca1.amazontrust.com/MFQwUjBQME4wTDAJBgUrDgMCGgUABBRPWaOUU8%2B5VZ5%2Fa9jFTaU9pkK3FAQUhBjMhTTsvAyUlC4IWZzHshBOCggCEwZ%2FlFeFh%2Bisd96yUzJbvJmLVg0%3D | US | der | 1.39 Kb | shared |
PID | Process | IP | Domain | ASN | CN | Reputation |
---|---|---|---|---|---|---|
1492 | SandboxieInstall-32-bit-10909171.exe | 143.204.208.23:80 | ocsp.rootca1.amazontrust.com | — | US | whitelisted |
1492 | SandboxieInstall-32-bit-10909171.exe | 13.35.254.192:80 | o.ss2.us | — | US | unknown |
1492 | SandboxieInstall-32-bit-10909171.exe | 143.204.202.29:443 | www.sandboxie.com | — | US | suspicious |
1492 | SandboxieInstall-32-bit-10909171.exe | 13.35.254.226:80 | ocsp.rootg2.amazontrust.com | — | US | whitelisted |
Domain | IP | Reputation |
---|---|---|
www.sandboxie.com |
| shared |
o.ss2.us |
| whitelisted |
ocsp.rootg2.amazontrust.com |
| whitelisted |
ocsp.rootca1.amazontrust.com |
| shared |