If it's not about a problem in the program
-
RonC
- Posts: 245
- Joined: Thu Jul 27, 2006 2:07 pm
- Location: Funchal, Madeira
Post
by RonC » Sun Oct 27, 2013 12:38 pm
I see there's only one post on this term, and that's hidden away in
Anything Else -- a discussion between perhaps three forum members, who mutually decide they really don't know what to do about it.

Because
Cryptolocker Ransomware has recently become a very hot topic, has anyone actually tested this against Sandboxie? Is there any special configuration advice to make certain Sandboxie users have maximum protection?
P.S.: General knowledge is the user has to 'run' an executable to install it, but one report said a 'cracked' web site may infect a user who simply clicks on a link.
RonC
Windows 7 Pro SP1 (32-bit)
-
Peter2150
- Posts: 879
- Joined: Tue Mar 27, 2007 9:46 pm
- Location: Washington DC
Post
by Peter2150 » Sun Oct 27, 2013 3:53 pm
As long as it executes in the sandbox you should be fine. I have tested other variations of this kind of malware in the past and what happens is it runs, but writes the encrypted files in the sandbox. They are deleted when you delete the sandbox.
Pete
-
RonC
- Posts: 245
- Joined: Thu Jul 27, 2006 2:07 pm
- Location: Funchal, Madeira
Post
by RonC » Sun Oct 27, 2013 6:20 pm
Peter2150 wrote:... it runs, but writes the encrypted files in the sandbox. They are deleted when you delete the sandbox.
Pete
Thanks, Pete!
Were you doing a test with just a few data files, perhaps in a virtual machine, to see where the encrypted files were written? Or, was it on a system with a many, many data files, large enough to fill the sandbox and more?
If yes, do you recall what happens, at that point? Does the malware halt until more space is created?
RonC
Windows 7 Pro SP1 (32-bit)
-
Peter2150
- Posts: 879
- Joined: Tue Mar 27, 2007 9:46 pm
- Location: Washington DC
Post
by Peter2150 » Sun Oct 27, 2013 7:56 pm
RonC wrote:Peter2150 wrote:... it runs, but writes the encrypted files in the sandbox. They are deleted when you delete the sandbox.
Pete
Thanks, Pete!
Were you doing a test with just a few data files, perhaps in a virtual machine, to see where the encrypted files were written? Or, was it on a system with a many, many data files, large enough to fill the sandbox and more?
If yes, do you recall what happens, at that point? Does the malware halt until more space is created?
There is a limit on the size of the file copied, but I don't believe there is a limit on how much data is in the sandbox.
-
RonC
- Posts: 245
- Joined: Thu Jul 27, 2006 2:07 pm
- Location: Funchal, Madeira
Post
by RonC » Mon Oct 28, 2013 10:42 am
OK, thanks!
I think - the conclusion is, in summary, Cryptolocker will do no more than fill the sandbox with encrypted files, to be discarded when the box is emptied, leaving the originals intact.

Then, Sandboxie provides total protection against Cryptolocker
-- until we hear from Tzuk, to say otherwise. Or to say, the Configuration File needs special settings to make sure.
RonC
Windows 7 Pro SP1 (32-bit)
-
tzuk
- Sandboxie Founder

- Posts: 16076
- Joined: Tue Jun 22, 2004 12:57 pm
Post
by tzuk » Mon Oct 28, 2013 2:11 pm
I don't have first hand experience with ransomware but reports I've heard so far are in line with what Pete said, encrypted copies of files are placed in the sandbox, but original copies outside the sandbox are untouched. That is of course with default settings, as files to which there is direct/full access may indeed be modified outside the sandbox.
tzuk
-
Peter2150
- Posts: 879
- Joined: Tue Mar 27, 2007 9:46 pm
- Location: Washington DC
Post
by Peter2150 » Mon Oct 28, 2013 2:57 pm
One other point. I keep all important documents in My Documents and all my sandboxes block access to that area.
The other obvious thing is all the important documents are backed up in several different ways.
Pete
-
Blues
- Posts: 214
- Joined: Sun May 10, 2009 7:37 pm
- Location: Blue Ridge Mtns
Post
by Blues » Mon Oct 28, 2013 3:03 pm
Peter2150 wrote:One other point. I keep all important documents in My Documents and all my sandboxes block access to that area.
The other obvious thing is all the important documents are backed up in several different ways.
Pete
+1, Pete. And in the one sandbox where I do allow access to such documents, for word processing etc., I do not allow internet access by any program, nor is any other program allowed to start/run.
.
(And of course I keep updated images of my hard drive just in case.)
Blues
Real-Time: Sandboxie (Lifetime), Online Armor Premium, Webroot SecureAnywhere AV
On Demand: Shadow Defender, MBAM Pro, HitmanPro, Drive Snapshot / Macrium Reflect
-
bs1
- Posts: 565
- Joined: Fri May 16, 2008 12:32 pm
Post
by bs1 » Mon Oct 28, 2013 4:01 pm
I use to block access to My Documents. But anymore my preference is to use Write-Only Access. For my purposes, it accomplishes the same thing in terms of keeping spying eyes away from personal information, but doesn't interfere with my testing of sandboxed software like Block Access occasionally did.
-
ad18888
- Posts: 68
- Joined: Sat Jan 19, 2013 1:37 pm
Post
by ad18888 » Mon Oct 28, 2013 5:43 pm
I think trick is to not allow programs access outside Sandboxie.
-
bs1
- Posts: 565
- Joined: Fri May 16, 2008 12:32 pm
Post
by bs1 » Mon Oct 28, 2013 10:23 pm
ad18888 wrote:I think trick is to not allow programs access outside Sandboxie.
No, the trick is layered protection. Restricted access + write only (or blocked) access + Dropped Rights as appropriate.
-
SuffolkPunch
- Posts: 27
- Joined: Mon Dec 01, 2008 5:24 am
- Location: UK
Post
by SuffolkPunch » Sat Nov 16, 2013 11:55 am
tzuk wrote:I don't have first hand experience with ransomware but reports I've heard so far are in line with what Pete said, encrypted copies of files are placed in the sandbox, but original copies outside the sandbox are untouched. That is of course with default settings, as files to which there is direct/full access may indeed be modified outside the sandbox.
So, if office-outlook has been given direct access to a mail folder outside the sandbox it's running in, and I click on a link in an email that then launches cryptolocker in the sandbox, does cryptolocker also have direct access to the mail folder outside the sandbox?
-
Guest10
- Posts: 5124
- Joined: Sun Apr 27, 2008 5:24 pm
- Location: Ohio, USA
Post
by Guest10 » Sat Nov 16, 2013 2:41 pm
SuffolkPunch wrote:tzuk wrote:...encrypted copies of files are placed in the sandbox, but original copies outside the sandbox are untouched. That is of course with default settings, as files to which there is direct/full access may indeed be modified outside the sandbox.
So, if office-outlook has been given direct access to a mail folder outside the sandbox it's running in, and I click on a link in an email that then launches cryptolocker in the sandbox, does cryptolocker also have direct access to the mail folder outside the sandbox?
The direct access template for Outlook specifies that only outlook.exe has direct access to the folder outside of the sandbox.
So unless you set up your own Direct Access setting to the folder, and you did not specify that the direct access applies only to "outlook.exe", then no other .exe program using that sandbox can use the Direct Access setting.
Examples:
OpenFilepath=(Outlook's mail folder)
All programs have direct access since no program name was specified in the setting.
OpenFilePath=
outlook.exe,(Outlook's mail folder)
Only outlook.exe has direct access to the folder.
This is the way the Sandboxie template for Outlook is written. No other .exe program has Direct Access to the folder.
Paul
Win 10 Home 64-bit (w/admin rights) - Zone Alarm Pro Firewall, MalwareBytes Premium A/V, Cyberfox, Thunderbird
Sandboxie user since March 2007
-
SuffolkPunch
- Posts: 27
- Joined: Mon Dec 01, 2008 5:24 am
- Location: UK
Post
by SuffolkPunch » Sun Nov 17, 2013 3:08 am
Guest10 wrote:The direct access template for Outlook specifies that only outlook.exe has direct access to the folder outside of the sandbox.
So unless you set up your own Direct Access setting to the folder, and you did not specify that the direct access applies only to "outlook.exe", then no other .exe program using that sandbox can use the Direct Access setting.
Examples:
OpenFilepath=(Outlook's mail folder)
All programs have direct access since no program name was specified in the setting.
OpenFilePath=outlook.exe,(Outlook's mail folder)
Only outlook.exe has direct access to the folder.
This is the way the Sandboxie template for Outlook is written. No other .exe program has Direct Access to the folder.
Thanks - I have granted direct access to he mail folder outside the sandbox (\\SERVERNAME\outlook) just to outlook.exe. So, I should be protected against cryptolocker.
Incidentally, where does Sandboxie record that OpenFilePath=outlook.exe,\\SERVERNAME\outlook? I can't find it in the C:\Program Files\Sandboxie\template.ini.
(Update: have just found that 'Configure/Edit Configuration' gives access to Sandboxie.ini and it's in there.)
Who is online
Users browsing this forum: No registered users and 1 guest