Overview
overview
10Static
static
3sandboxie-5-69-6.exe
windows11-21h2-x64
$PLUGINSDI...ns.dll
windows11-21h2-x64
$PLUGINSDI...il.exe
windows11-21h2-x64
10$PLUGINSDI...LL.dll
windows11-21h2-x64
8$PLUGINSDI...ll.dll
windows11-21h2-x64
1$PLUGINSDI...sg.dll
windows11-21h2-x64
1$PLUGINSDI...em.dll
windows11-21h2-x64
332/SbieDll.dll
windows11-21h2-x64
332/SbieSvc.exe
windows11-21h2-x64
3KmdUtil.exe
windows11-21h2-x64
1SandboxieBITS.exe
windows11-21h2-x64
1SandboxieCrypto.exe
windows11-21h2-x64
1SandboxieD...ch.exe
windows11-21h2-x64
8SandboxieRpcSs.exe
windows11-21h2-x64
1SandboxieWUAU.exe
windows11-21h2-x64
1SbieCtrl.exe
windows11-21h2-x64
1SbieDll.dll
windows11-21h2-x64
1SbieDrv.sys
windows11-21h2-x64
1SbieIni.exe
windows11-21h2-x64
1SbieMsg.dll
windows11-21h2-x64
1SbieSvc.exe
windows11-21h2-x64
1SboxHostDll.dll
windows11-21h2-x64
1Start.exe
windows11-21h2-x64
1UpdUtil.exe
windows11-21h2-x64
1whatsnew.html
windows11-21h2-x64
3Analysis
-
max time kernel
1498s -
max time network
1471s -
platform
windows11-21h2_x64 -
resource
win11-20240802-en -
resource tags
arch:x64arch:x86image:win11-20240802-enlocale:en-usos:windows11-21h2-x64system -
submitted
21-08-2024 19:34
Static task
static1
Behavioral task
behavioral1
Sample
sandboxie-5-69-6.exe
Resource
win11-20240802-en
Behavioral task
behavioral2
Sample
$PLUGINSDIR/InstallOptions.dll
Resource
win11-20240802-en
Behavioral task
behavioral3
Sample
$PLUGINSDIR/KmdUtil.exe
Resource
win11-20240802-en
Behavioral task
behavioral4
Sample
$PLUGINSDIR/LangDLL.dll
Resource
win11-20240802-en
Behavioral task
behavioral5
Sample
$PLUGINSDIR/SbieDll.dll
Resource
win11-20240802-en
Behavioral task
behavioral6
Sample
$PLUGINSDIR/SbieMsg.dll
Resource
win11-20240802-en
Behavioral task
behavioral7
Sample
$PLUGINSDIR/System.dll
Resource
win11-20240802-en
Behavioral task
behavioral8
Sample
32/SbieDll.dll
Resource
win11-20240802-en
Behavioral task
behavioral9
Sample
32/SbieSvc.exe
Resource
win11-20240802-en
Behavioral task
behavioral10
Sample
KmdUtil.exe
Resource
win11-20240802-en
Behavioral task
behavioral11
Sample
SandboxieBITS.exe
Resource
win11-20240802-en
Behavioral task
behavioral12
Sample
SandboxieCrypto.exe
Resource
win11-20240802-en
Behavioral task
behavioral13
Sample
SandboxieDcomLaunch.exe
Resource
win11-20240802-en
Behavioral task
behavioral14
Sample
SandboxieRpcSs.exe
Resource
win11-20240802-en
Behavioral task
behavioral15
Sample
SandboxieWUAU.exe
Resource
win11-20240802-en
Behavioral task
behavioral16
Sample
SbieCtrl.exe
Resource
win11-20240802-en
Behavioral task
behavioral17
Sample
SbieDll.dll
Resource
win11-20240802-en
Behavioral task
behavioral18
Sample
SbieDrv.sys
Resource
win11-20240802-en
Behavioral task
behavioral19
Sample
SbieIni.exe
Resource
win11-20240802-en
Behavioral task
behavioral20
Sample
SbieMsg.dll
Resource
win11-20240802-en
Behavioral task
behavioral21
Sample
SbieSvc.exe
Resource
win11-20240802-en
Behavioral task
behavioral22
Sample
SboxHostDll.dll
Resource
win11-20240802-en
Behavioral task
behavioral23
Sample
Start.exe
Resource
win11-20240802-en
Behavioral task
behavioral24
Sample
UpdUtil.exe
Resource
win11-20240802-en
Behavioral task
behavioral25
Sample
whatsnew.html
Resource
win11-20240802-en
General
-
Target
$PLUGINSDIR/System.dll
-
Size
10KB
-
MD5
0ff5120f1afd0f295c2baa0f7192d3f8
-
SHA1
bde842d5d11005dcb4ff1d4ea97da31865477697
-
SHA256
4ca5bf1beb4b802914c4d3e2f37861f6ba5ecf969cfeadf5855edf58f647a721
-
SHA512
e049ffd7aace8d136eee007ee4f8dbc2ae8f3dce79d1c633d9654392240f8215787df8a6d08085257db51f28ff2a8023a13333dda3ea7f9bdc8b9c57b605f0a0
-
SSDEEP
192:Xv+cJZE61KRWJQO6tFiUdK7ckD4k7l1XRBm0w+NiHi1nSJ:Xf6rtFRdbQ1W+fn8
Malware Config
Signatures
-
Program crash 1 IoCs
pid pid_target Process procid_target 1104 4340 WerFault.exe 81 -
System Location Discovery: System Language Discovery 1 TTPs 1 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language rundll32.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 556 wrote to memory of 4340 556 rundll32.exe 81 PID 556 wrote to memory of 4340 556 rundll32.exe 81 PID 556 wrote to memory of 4340 556 rundll32.exe 81
Processes
-
C:\Windows\system32\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#11⤵
- Suspicious use of WriteProcessMemory
PID:556 -
C:\Windows\SysWOW64\rundll32.exerundll32.exe C:\Users\Admin\AppData\Local\Temp\$PLUGINSDIR\System.dll,#12⤵
- System Location Discovery: System Language Discovery
PID:4340 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 4340 -s 4603⤵
- Program crash
PID:1104
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 4340 -ip 43401⤵PID:2828