Here's a video:
https://onedrive.live.com/redir?resid=B14B8601740A2DFA!459&authkey=!ANmpxrWHEPwVHsM&ithint=video,avi
The screen is black when the UAC alert appears.
Maybe it was created by him?I'll ask IcY if he can download your sample to decompile it and see if it uses the same bypass technique that he discovered.
Maybe it was created by him?
Nooooooooooo Many considered it sacred,and had a great faith in itHey guys Aura here,
I was just wondering if you were aware that there's a 0-day in every version of Sandboxie right now. As it been reported it already or not ? If not, I'll add more information to it. If it is, just close this thread please.
It's a 0-day that have been discovered by one of my friend on HF. He reported it to Sandboxie but didn't get a reply for it yet. He made 2-3 videos showing it and even Teamviewed into one of my Windows 7 Professional SP1 64-bits VM to show me it and it worked flawlessly.
What do you think ?
Nooooooooooo Many considered it sacred,and had a great faith in it
No. But it probably would be possible to do more than opening windows outside the sandbox.The question is : does the malware did some changes in the system AFTER the sandbox contents is deleted?
If no, sbie works as it should
No. But it probably would be possible to do more than opening windows outside the sandbox.
The question is : does the malware did some changes in the system AFTER the sandbox contents is deleted?
If no, sbie works as it should
IcY successfully accessed my desktop and was able to run a .bat file that did output a .txt file in random folders that weren't inside the Sandboxie environment.
and does this txt file was still present after the sandbox is closed and its content deleted?
It was still present after the Sandbox was closed yes. But I couldn't tell for the content. Usually, I empty the Sandbox after every use but I don't remember in this case. I'll get IcY to re-do it, test that and comeback to you after. I'll also ask him if he can modify something in the registry or delete a folder on my system like that too.
Let's wait for the reply regarding the other bypass.Hello-
We have reviewed the information you have provided and determined that the malware is not actually escaping the sandbox, but is displaying a native message box, which does not get closed when the sandbox is restored. The remainder of the malware attack was fully contained.
Thank you for the report.
Regards,
Sandboxie Support
support@sandboxie.com
Let's wait for the reply regarding the other bypass.
still waiting lol; by the way from what i understand it is not a "0-day" that it is mentioned but a "potential" vulnerability, so the thread title should be edited