Dropbox.exe
- File Path:
C:\Program Files (x86)\Dropbox\Client\Dropbox.exe
- Description: Dropbox
Hashes
Type | Hash |
---|---|
MD5 | 8B86CFBDD8AA0FCA798090E78677BB16 |
SHA1 | A7B71D32C09A04608BB19122478B8AAD54033CD5 |
SHA256 | DBA125BF993E85C19F1DC367209D0DC05AF6196EF82844C941996B498DCE27A9 |
SHA384 | EEC38B855BB9DABFF341DBA77A925E7E140BBEB3D1CC2CD3D3D616729FB7020FF1D6143B9931D791A503FACCF3808CD3 |
SHA512 | 656438A06C7DAC8C28AB1519C33E0E79D2195AC26C1E8A8E19E22D24519B542438497ADD064448035D1B3282DA6C1C0EEBD655C6FE5C74DB0EEC4BE13EA25366 |
SSDEEP | 49152:hi7J14JiLbcw6I7KkaJVwM/WCetkpNgBIW8NR8tAOfAbv4FqWJ:o8JUbcw6kM/WCetkpNsM2fh |
IMP | 5C208DACC226E6F96D1BC6311616F9B5 |
PESHA1 | F69A02AF2EF17B79690F98E015094E671FA09261 |
PE256 | F045FBAEC86CA6AC44DAB2078FBAFC1FE79304EE9C8305523EF6A4DE0D0BE9FF |
Runtime Data
Usage (stderr):
!! dropbox: assigning process to named job object dbx2244
!! dropbox: assigned process to named job object with handle 00000208
dropbox: loading watchdog
dropbox: loaded watchdog. executing watchdog_main
!! dropbox: assigning process to named job object dbx5464
!! dropbox: assigned process to named job object with handle 00000208
dropbox: loading watchdog
dropbox: loaded watchdog. executing watchdog_main
dropbox: starting main app
dropbox: package full name is <unpackaged>
dropbox: loading bootstrap
dropbox: initializing
dropbox: initializing python 3.7.9
dropbox: setting program path 'C:\Program Files (x86)\Dropbox\Client\Dropbox.exe'
dropbox: setting python path 'C:\Program Files (x86)\Dropbox\Client\106.4.368;C:\Program Files (x86)\Dropbox\Client\106.4.368\python-packages.zip'
!! dropbox: assigning process to named job object dbx3592
!! dropbox: assigned process to named job object with handle 00000224
dropbox: loading watchdog
dropbox: loaded watchdog. executing watchdog_main
dropbox: python initialized
dropbox: running dropbox
dropbox: setting args
dropbox: enabling allocator metrics
dropbox: applying overrides
dropbox: running main script
dropbox: load fq extension 'C:\\Program Files (x86)\\Dropbox\\Client\\106.4.368\\tornado.speedups.cp37-win32.pyd'
dropbox: load fq extension 'C:\\Program Files (x86)\\Dropbox\\Client\\106.4.368\\cryptography.hazmat.bindings._constant_time.cp37-win32.pyd'
dropbox: load fq extension 'C:\\Program Files (x86)\\Dropbox\\Client\\106.4.368\\cryptography.hazmat.bindings._openssl.cp37-win32.pyd'
dropbox: load fq extension 'C:\\Program Files (x86)\\Dropbox\\Client\\106.4.368\\cryptography.hazmat.bindings._padding.cp37-win32.pyd'
dropbox: load fq extension 'C:\\Program Files (x86)\\Dropbox\\Client\\106.4.368\\apex._apex.cp37-win32.pyd'
dropbox: load fq extension 'C:\\Program Files (x86)\\Dropbox\\Client\\106.4.368\\psutil._psutil_windows.cp37-win32.pyd'
dropbox: load fq extension 'C:\\Program Files (x86)\\Dropbox\\Client\\106.4.368\\win32com.shell.shell.cp37-win32.pyd'
Child Processes:
Dropbox.exe Dropbox.exe
Open Handles:
Path | Type |
---|---|
(R-D) C:\Windows\System32\en-US\kernel32.dll.mui | File |
(R-D) C:\Windows\System32\en-US\KernelBase.dll.mui | File |
(RW-) C:\Program Files (x86)\Dropbox\Client\106.4.368 | File |
(RW-) C:\Windows | File |
(RW-) C:\Windows\WinSxS\x86_microsoft.windows.common-controls_6595b64144ccf1df_6.0.19041.488_none_11b1e5df2ffd8627 | File |
(RW-) C:\xCyclopedia | File |
\BaseNamedObjects\NLS_CodePage_1252_3_2_0_0 | Section |
\BaseNamedObjects\NLS_CodePage_437_3_2_0_0 | Section |
\Sessions\1\BaseNamedObjects\windows_shell_global_counters | Section |
\Sessions\1\Windows\Theme2547664911 | Section |
\Windows\Theme3854699184 | Section |
Loaded Modules:
Path |
---|
C:\Program Files (x86)\Dropbox\Client\Dropbox.exe |
C:\Windows\SYSTEM32\ntdll.dll |
C:\Windows\System32\wow64.dll |
C:\Windows\System32\wow64cpu.dll |
C:\Windows\System32\wow64win.dll |
Signature
- Status: Signature verified.
- Serial:
08557A49A29FFD9253CA5AC8780F2C95
- Thumbprint:
00D9C6C496925FFD914772B0B79F6E873B6AB8F2
- Issuer: CN=DigiCert SHA2 Assured ID Code Signing CA, OU=www.digicert.com, O=DigiCert Inc, C=US
- Subject: CN=”Dropbox, Inc”, O=”Dropbox, Inc”, L=San Francisco, S=California, C=US
File Metadata
- Original Filename: Dropbox.exe
- Product Name: Dropbox
- Company Name: Dropbox, Inc.
- File Version: 106.4.368
- Product Version: 106.4.368
- Language: English (United States)
- Legal Copyright: Dropbox, Inc.
- Machine Type: 32-bit
File Scan
- VirusTotal Detections: 0/71
- VirusTotal Link: https://www.virustotal.com/gui/file/dba125bf993e85c19f1dc367209d0dc05af6196ef82844c941996b498dce27a9/detection/
File Similarity (ssdeep match)
File | Score |
---|---|
C:\program files (x86)\Dropbox\Client\Dropbox.exe | 72 |
Possible Misuse
The following table contains possible examples of Dropbox.exe
being misused. While Dropbox.exe
is not inherently malicious, its legitimate functionality can be abused for malicious purposes.
Source | Source File | Example | License |
---|---|---|---|
sigma | proxy_apt40.yml | title: APT40 Dropbox Tool User Agent |
DRL 1.0 |
sigma | proxy_apt40.yml | description: Detects suspicious user agent string of APT40 Dropbox tool |
DRL 1.0 |
sigma | proxy_apt40.yml | r-dns: 'api.dropbox.com' |
DRL 1.0 |
sigma | proc_access_win_susp_proc_access_lsass.yml | # Generic Filter for 0x1410 filter (caused by so many programs like DropBox updates etc.) |
DRL 1.0 |
sigma | proc_creation_win_netsh_fw_add.yml | - '\netsh.exe advfirewall firewall add rule name=Dropbox dir=in action=allow "program=C:\Program Files (x86)\Dropbox\Client\Dropbox.exe" enable=yes profile=Any' |
DRL 1.0 |
sigma | proc_creation_win_netsh_fw_add.yml | - '\netsh.exe advfirewall firewall add rule name=Dropbox dir=in action=allow "program=C:\Program Files\Dropbox\Client\Dropbox.exe" enable=yes profile=Any' |
DRL 1.0 |
sigma | registry_event_asep_reg_keys_modification_wow6432node.yml | - '\Dropbox\Client\Dropbox.exe' |
DRL 1.0 |
sigma | registry_event_persistence_search_order.yml | - '\AppData\Roaming\Dropbox\' |
DRL 1.0 |
sigma | registry_event_removal_com_hijacking_registry_key.yml | Image\|endswith: '\Dropbox.exe' |
DRL 1.0 |
sigma | registry_event_removal_com_hijacking_registry_key.yml | TargetObject\|startswith: 'HKCR\Dropbox.' |
DRL 1.0 |
sigma | net_dns_high_subdomain_rate.yml | - "dropbox.com" |
DRL 1.0 |
sigma | net_dns_large_domain_name.yml | - "dropbox.com" |
DRL 1.0 |
malware-ioc | misp-machete-event.json | "value": "https://www.dropbox.com/s/m38rq5hx5ydrg07/zingapur?dl=1", |
© ESET 2014-2018 |
signature-base | apt_hiddencobra_bankshot.yar | $a1 = “live.dropbox.com” fullword ascii | CC BY-NC 4.0 |
signature-base | apt_indetectables_rat.yar | $x2 = “URLDownloadToFileA 0, "https://dl.dropbox.com/u/105015858/nome.exe", "c:\nome.exe", 0, 0” fullword wide | CC BY-NC 4.0 |
signature-base | apt_indetectables_rat.yar | $s5 = “https://dl.dropbox.com/u/105015858” wide | CC BY-NC 4.0 |
signature-base | apt_khrat.yar | $x1 = “http.open "POST", "http://update.upload-dropbox[.]com/docs/tz/GetProcess.php",False,"","" “ fullword ascii | CC BY-NC 4.0 |
signature-base | apt_nanocore_rat.yar | $x1 = “C:\Users\Logintech\Dropbox\Projects\New folder\Latest\Benchmark\Benchmark\obj\Release\Benchmark.pdb” fullword ascii | CC BY-NC 4.0 |
signature-base | crime_ransom_darkside.yar | $dropboxAPI = “Dropbox-API-Arg” | CC BY-NC 4.0 |
signature-base | gen_mal_scripts.yar | $x2 = “script:https://www.dropbox.com” ascii | CC BY-NC 4.0 |
stockpile | 3ce95a28-25fc-4a7e-a0cd-0fdb190e2081.yml | name: Exfil Compressed Archive to Dropbox |
Apache-2.0 |
stockpile | 3ce95a28-25fc-4a7e-a0cd-0fdb190e2081.yml | description: This will exfiltrate an archive to Dropbox. |
Apache-2.0 |
stockpile | 3ce95a28-25fc-4a7e-a0cd-0fdb190e2081.yml | $TargetFilePath = "/#{dropbox.target.dir}/$RemoteName"; |
Apache-2.0 |
stockpile | 3ce95a28-25fc-4a7e-a0cd-0fdb190e2081.yml | $ApiKey = "#{dropbox.api.key}"; |
Apache-2.0 |
stockpile | 3ce95a28-25fc-4a7e-a0cd-0fdb190e2081.yml | $req.Headers.Add("Dropbox-API-Arg", $arg); |
Apache-2.0 |
stockpile | 3ce95a28-25fc-4a7e-a0cd-0fdb190e2081.yml | --header "Authorization: Bearer #{dropbox.api.key}" |
Apache-2.0 |
stockpile | 3ce95a28-25fc-4a7e-a0cd-0fdb190e2081.yml | --header "Dropbox-API-Arg: {\"path\": \"/#{dropbox.target.dir}/$RemoteName\",\"mode\": \"add\",\"autorename\": true,\"mute\": false,\"strict_conflict\": false}" |
Apache-2.0 |
MIT License. Copyright (c) 2020-2021 Strontic.