Skip to content

Hide Navigation Hide TOC

BoxCaon - S0651 (919a056e-5104-43b9-ad55-2ac929108b71)

BoxCaon is a Windows backdoor that was used by IndigoZebra in a 2021 spearphishing campaign against Afghan government officials. BoxCaon's name stems from similarities shared with the malware family xCaon.(Citation: Checkpoint IndigoZebra July 2021)

Cluster A Galaxy A Cluster B Galaxy B Level
BoxCaon - S0651 (919a056e-5104-43b9-ad55-2ac929108b71) Malware System Network Configuration Discovery - T1016 (707399d6-ab3e-4963-9315-d9d3818cd6a0) Attack Pattern 1
BoxCaon - S0651 (919a056e-5104-43b9-ad55-2ac929108b71) Malware Local Data Staging - T1074.001 (1c34f7aa-9341-4a48-bfab-af22e51aca6c) Attack Pattern 1
BoxCaon - S0651 (919a056e-5104-43b9-ad55-2ac929108b71) Malware File and Directory Discovery - T1083 (7bc57495-ea59-4380-be31-a64af124ef18) Attack Pattern 1
BoxCaon - S0651 (919a056e-5104-43b9-ad55-2ac929108b71) Malware Ingress Tool Transfer - T1105 (e6919abc-99f9-4c6c-95a5-14761e7b2add) Attack Pattern 1
Native API - T1106 (391d824f-0ef1-47a0-b0ee-c59a75e27670) Attack Pattern BoxCaon - S0651 (919a056e-5104-43b9-ad55-2ac929108b71) Malware 1
BoxCaon - S0651 (919a056e-5104-43b9-ad55-2ac929108b71) Malware Boot or Logon Autostart Execution - T1547 (1ecb2399-e8ba-4f6b-8ba7-5c27d49405cf) Attack Pattern 1
Data from Local System - T1005 (3c4a2599-71ee-4405-ba1e-0e28414b4bc5) Attack Pattern BoxCaon - S0651 (919a056e-5104-43b9-ad55-2ac929108b71) Malware 1
BoxCaon - S0651 (919a056e-5104-43b9-ad55-2ac929108b71) Malware Obfuscated Files or Information - T1027 (b3d682b6-98f2-4fb0-aa3b-b4df007ca70a) Attack Pattern 1
BoxCaon - S0651 (919a056e-5104-43b9-ad55-2ac929108b71) Malware Bidirectional Communication - T1102.002 (be055942-6e63-49d7-9fa1-9cb7d8a8f3f4) Attack Pattern 1
BoxCaon - S0651 (919a056e-5104-43b9-ad55-2ac929108b71) Malware Exfiltration Over C2 Channel - T1041 (92d7da27-2d91-488e-a00c-059dc162766d) Attack Pattern 1
BoxCaon - S0651 (919a056e-5104-43b9-ad55-2ac929108b71) Malware Windows Command Shell - T1059.003 (d1fcf083-a721-4223-aedf-bf8960798d62) Attack Pattern 1
BoxCaon - S0651 (919a056e-5104-43b9-ad55-2ac929108b71) Malware Exfiltration to Cloud Storage - T1567.002 (bf1b6176-597c-4600-bfcd-ac989670f96b) Attack Pattern 1
Local Data Staging - T1074.001 (1c34f7aa-9341-4a48-bfab-af22e51aca6c) Attack Pattern Data Staged - T1074 (7dd95ff6-712e-4056-9626-312ea4ab4c5e) Attack Pattern 2
Web Service - T1102 (830c9528-df21-472c-8c14-a036bf17d665) Attack Pattern Bidirectional Communication - T1102.002 (be055942-6e63-49d7-9fa1-9cb7d8a8f3f4) Attack Pattern 2
Windows Command Shell - T1059.003 (d1fcf083-a721-4223-aedf-bf8960798d62) Attack Pattern Command and Scripting Interpreter - T1059 (7385dfaf-6886-4229-9ecd-6fd678040830) Attack Pattern 2
Exfiltration Over Web Service - T1567 (40597f16-0963-4249-bf4c-ac93b7fb9807) Attack Pattern Exfiltration to Cloud Storage - T1567.002 (bf1b6176-597c-4600-bfcd-ac989670f96b) Attack Pattern 2