Report generated with Buster Sandbox Analyzer 1.88 at 15:01:46 on 13/02/2015
[ General information ]
* File name: C:\Users\Abdelkarim\Desktop\test\Frankony.exe
[ Changes to filesystem ]
* Creates file C:\Windows\Microsoft.NET\Framework\v2.0.50727\config\enterprisesec.config.cch
* Creates file C:\Windows\Microsoft.NET\Framework\v2.0.50727\config\security.config.cch
* Creates file C:\Users\Abdelkarim\AppData\Local\Microsoft\CLR_v2.0_32\UsageLogs\Frankony.exe.log
* Modifies file C:\Users\Abdelkarim\AppData\Local\Microsoft\Windows\WebCache\V01.chk
* Creates file C:\Users\Abdelkarim\AppData\Local\Temp\RarSFX0\ComponentFactory.Krypton.Toolkit.dll
* Creates file C:\Users\Abdelkarim\AppData\Local\Temp\RarSFX0\Frankony.exe
* Creates file C:\Users\Abdelkarim\AppData\Local\Temp\RarSFX0\Frankony.exe.config
[ Changes to registry ]
* Creates value "NukeOnDelete=00000001" in key HKEY_LOCAL_MACHINE\software\microsoft\Windows\CurrentVersion\Explorer\BitBucket
* Creates value "UseGlobalSettings=00000001" in key HKEY_LOCAL_MACHINE\software\microsoft\Windows\CurrentVersion\Explorer\BitBucket
* Modifies value "NukeOnDelete=00000001" in key HKEY_CURRENT_USER\software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{4e06393b-978c-11e4-974c-806e6f6e6963}
old value empty
* Modifies value "NukeOnDelete=00000001" in key HKEY_CURRENT_USER\software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{9644160d-4a86-11e4-9717-806e6f6e6963}
old value empty
* Modifies value "NukeOnDelete=00000001" in key HKEY_CURRENT_USER\software\Microsoft\Windows\CurrentVersion\Explorer\BitBucket\Volume\{9644160e-4a86-11e4-9717-806e6f6e6963}
old value empty
* Empties value "CachePrefix" in key HKEY_CURRENT_USER\software\Microsoft\Windows\CurrentVersion\Internet Settings\5.0\Cache\Content
old value "CachePrefix=0000"
* Creates value "(Default)=31" in key HKEY_CURRENT_USER\software\SandboxAutoExec
* Creates value "Frankony.exe.FriendlyAppName=Frankony.exe" in key HKEY_CURRENT_USER\software\classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache\C:\Users\Abdelkarim\Desktop\test
binary data=4600720061006E006B006F006E0079002E006500780065000000
* Creates value "Frankony.exe.FriendlyAppName=Frankony" in key HKEY_CURRENT_USER\software\classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache\C:\Sandbox\Abdelkarim\DefaultBox\user\current\AppData\Local\Temp\RarSFX0
binary data=4600720061006E006B006F006E0079000000
* Creates value "Frankony.exe.ApplicationCompany=Efham Computer" in key HKEY_CURRENT_USER\software\classes\Local Settings\Software\Microsoft\Windows\Shell\MuiCache\C:\Sandbox\Abdelkarim\DefaultBox\user\current\AppData\Local\Temp\RarSFX0
binary data=45006600680061006D00200043006F006D00700075007400650072000000
[ Network services ]
[ Process/window/string information ]
* Keylogger functionality.
* Gets system default language ID.
* Gets input locale identifiers.
* Gets computer name.
* Checks for debuggers.
* Opens a service named "PcaSvc".
* Starts a service.
* Creates an event named "Global\CorDBIPCSetupSyncEvent_5276".
* Creates an event named "83ca2bfd-5c03-43ac-b5c8-b21304f54f2f1.0Event".
* Creates an event named "83ca2bfd-5c03-43ac-b5c8-b21304f54f2f1.0Event2".
* Creates a mutex "Global\.net clr networking".
* Enables privilege SeShutdownPrivilege.
* Enables privilege SeCreatePagefilePrivilege.
* Creates process "C:\Program Files\Cyberfox\Cyberfox.exe, "C:\Program Files\Cyberfox\Cyberfox.exe" -osint -url "http://www.efhamcomputer.com/", C:\Users\Abdelkarim\AppData\Local\Temp\RarSFX0".
* Injects code into process "C:\Program Files\Cyberfox\Cyberfox.exe".
* Enables process privileges.
* Sleeps 10 seconds.