top title background image
flash

rocroc.exe

Status: finished
Submission Time: 2023-03-20 08:38:16 +01:00
Malicious
Trojan
Evader
FormBook

Comments

Tags

  • exe
  • Formbook

Details

  • Analysis ID:
    830303
  • API (Web) ID:
    1197397
  • Analysis Started:
    2023-03-20 08:46:27 +01:00
  • Analysis Finished:
    2023-03-20 08:56:57 +01:00
  • MD5:
    b7e5425d0daea66fc85e360a0b0d760d
  • SHA1:
    505084085e1ae2666b7b6d15ea82e4d249cbf85c
  • SHA256:
    06fbb80f37ae3534d8d87fe5444da0a09f10e45b8f2882c9e9fe89e879d380c7
  • Technologies:

Joe Sandbox

Engine Download Report Detection Info
malicious
malicious
Score: 100
System: Windows 10 x64 22H2 with Office Professional Plus 2019, Chrome 117, Firefox 118, Adobe Reader DC 23, Java 8 Update 381, 7zip 23.01

Third Party Analysis Engines

malicious
Score: 29/39
malicious
malicious

IPs

IP Country Detection
160.121.108.17
South Africa
192.185.52.247
United States

Domains

Name IP Detection
www.senriki.net
160.121.108.17
www.kk156.net
192.185.52.247
www.aq993.cyou
0.0.0.0
Click to see the 1 hidden entries
www.alaaeldinsoft.com
0.0.0.0

URLs

Name Detection
http://www.kk156.net/re29/?0DK4Qn=GULsnGSHMoQzF5BSBaA7IgErJIrC6IG18OGrAG0wV2/PJUf48ccOVKgRcy3msHjKmovQQ592kQ==&nPW=WdYdbB1p3b2H7x
http://www.senriki.net/re29/?0DK4Qn=yRhazfKsHirG6nKYYI6mAz5vTQUNqz4sZ9ZrGGOS+9vLvJ0EFUwbGotar2I3eQhiIGPXkjmVOg==&nPW=WdYdbB1p3b2H7x
www.senriki.net/re29/
Click to see the 68 hidden entries
http://www.fxtcb8.site/re29/www.dikevolesas.info
http://www.1whxgd.top
http://www.corollacompany.africa/re29/
http://nsis.sf.net/NSIS_ErrorError
https://47.116.3.86:29920/kok/logo.png
http://www.alaaeldinsoft.com/re29/
http://www.fxtcb8.siteReferer:
http://www.corollacompany.africa/re29/www.detoxshopbr.store
http://www.senriki.net/re29/www.alaaeldinsoft.com
http://www.fxtcb8.site/re29/
https://www.zoty1116.com:30120/register/?i_code=4627044
http://www.langlalang.comReferer:
http://www.kk156.net
http://www.langlalang.com/re29/
http://www.senriki.netReferer:
http://www.detoxshopbr.storeReferer:
http://www.autoitscript.com/autoit3/J
http://www.barnstorm-music.comReferer:
http://www.defi88.com/re29/
http://www.jabberglotty.com/re29/
http://www.corollacompany.africaReferer:
http://www.dikevolesas.info/re29/
http://www.jabberglotty.comReferer:
http://www.follred.com/re29/
http://www.acorsgroup.com/re29/www.fxtcb8.site
http://www.dikevolesas.info
http://www.follred.com
http://www.aq993.cyouReferer:
http://www.alaaeldinsoft.comReferer:
http://www.defi88.comReferer:
http://www.jabberglotty.com
http://www.senriki.net/re29/
http://www.acorsgroup.comReferer:
http://www.kk156.net/re29/
http://www.detoxshopbr.store/re29/
http://www.corollacompany.africa
http://www.1whxgd.topReferer:
http://www.detoxshopbr.store
http://www.dikevolesas.infoReferer:
http://www.acorsgroup.com
http://www.hagfiw.xyz/re29/www.langlalang.com
http://www.hagfiw.xyz
http://www.jabberglotty.com/re29/www.acorsgroup.com
http://www.hagfiw.xyz/re29/
http://www.aq993.cyou/re29/www.barnstorm-music.com
http://www.fxtcb8.site
http://www.langlalang.com
http://www.senriki.net
http://www.acorsgroup.com/re29/
http://www.barnstorm-music.com/re29/
http://www.barnstorm-music.com
http://www.langlalang.com/re29/www.defi88.com
http://www.barnstorm-music.com/re29/www.1whxgd.top
http://www.1whxgd.top/re29/www.hagfiw.xyz
http://www.aq993.cyou/re29/
http://www.1whxgd.top/re29/
http://www.kk156.net/re29/www.senriki.net
http://www.defi88.com/re29/www.corollacompany.africa
http://www.kk156.netReferer:
http://www.aq993.cyou
http://www.hagfiw.xyzReferer:
http://www.follred.com/re29/R
http://www.alaaeldinsoft.com
http://www.detoxshopbr.store/re29/www.jabberglotty.com
http://www.follred.comReferer:
http://www.alaaeldinsoft.com/re29/www.aq993.cyou
http://www.dikevolesas.info/re29/www.follred.com
http://www.defi88.com

Dropped files

Name File Type Hashes Detection
C:\Users\user\AppData\Local\Temp\nmtargerx.exe
PE32 executable (GUI) Intel 80386, for MS Windows
#
C:\Users\user\AppData\Local\Microsoft\PenWorkspace\DiscoverCacheData.dat
JSON data
#
C:\Users\user\AppData\Local\Temp\nsoFB77.tmp
data
#
Click to see the 2 hidden entries
C:\Users\user\AppData\Local\Temp\rimgurbkmm.edy
data
#
C:\Users\user\AppData\Local\Temp\scrzuow.py
data
#