Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
nvbbzu.xml

Overview

General Information

Sample Name:nvbbzu.xml (renamed file extension from xml to dll)
Analysis ID:674157
MD5:60aafd76fbfa15db34a0b2f93df5eea9
SHA1:a968c42da887544c4f46aa9924914022be44a40a
SHA256:46aa7de354f23ab96c0c4bf31a8ef06e6c2cf257dadce53d0a7f6e7d49a1fb6a
Infos:

Detection

Dridex Dropper
Score:64
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Dridex dropper found
Tries to detect sandboxes / dynamic malware analysis system (file name check)
Machine Learning detection for sample
Uses 32bit PE files
Contains functionality to call native functions
Sample file is different than original file name gathered from version info
Program does not show much activity (idle)
Uses code obfuscation techniques (call, push, ret)
Creates a process in suspended mode (likely to inject code)
Checks if the current process is being debugged
PE file contains sections with non-standard names
Detected potential crypto function

Classification

  • System is w10x64
  • loaddll32.exe (PID: 3224 cmdline: loaddll32.exe "C:\Users\user\Desktop\nvbbzu.dll" MD5: 7DEB5DB86C0AC789123DEC286286B938)
    • cmd.exe (PID: 5016 cmdline: cmd.exe /C rundll32.exe "C:\Users\user\Desktop\nvbbzu.dll",#1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • rundll32.exe (PID: 5104 cmdline: rundll32.exe "C:\Users\user\Desktop\nvbbzu.dll",#1 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
  • cleanup
No configs have been found
No yara matches
No Sigma rule has matched
No Snort rule has matched

Click to jump to signature section

Show All Signature Results

AV Detection

barindex
Source: nvbbzu.dllVirustotal: Detection: 48%Perma Link
Source: nvbbzu.dllMetadefender: Detection: 28%Perma Link
Source: nvbbzu.dllJoe Sandbox ML: detected
Source: nvbbzu.dllStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
Source: Binary string: xP+=_.pdbd? source: nvbbzu.dll
Source: Binary string: xP+=_.pdb source: nvbbzu.dll

E-Banking Fraud

barindex
Source: Initial fileSignature Results: Dridex dropper behavior
Source: nvbbzu.dllStatic PE information: EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_00931000 NtCreateThreadEx,
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04A41000 NtCreateThreadEx,
Source: nvbbzu.dllBinary or memory string: OriginalFilenameciide4.dll( vs nvbbzu.dll
Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_00864210
Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_00863FA4
Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_00861000
Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_0086110C
Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_00863AF4
Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_008620F0
Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_00864A1C
Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_00864D98
Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_00932990
Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_00933190
Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_00931000
Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_00931A37
Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_00933A20
Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_00932D90
Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_00933C90
Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_00933EB0
Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_009315D0
Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_009342D0
Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_00931350
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04974210
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04973AF4
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_049720F0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04974A1C
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04974D98
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04973FA4
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04971000
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04A42990
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04A43190
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04A43A20
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04A41A37
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04A41000
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04A43EB0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04A42D90
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04A43C90
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04A415D0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04A442D0
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_04A41350
Source: nvbbzu.dllStatic PE information: Section: .CRT0 ZLIB complexity 0.9951186852952454
Source: nvbbzu.dllStatic PE information: Section: .crt1 ZLIB complexity 0.9950722536426381
Source: nvbbzu.dllVirustotal: Detection: 48%
Source: nvbbzu.dllMetadefender: Detection: 28%
Source: nvbbzu.dllStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiers
Source: classification engineClassification label: mal64.bank.evad.winDLL@5/0@0/0
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\nvbbzu.dll",#1
Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe "C:\Users\user\Desktop\nvbbzu.dll"
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\nvbbzu.dll",#1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\nvbbzu.dll",#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe "C:\Users\user\Desktop\nvbbzu.dll",#1
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\nvbbzu.dll",#1
Source: nvbbzu.dllStatic file information: File size 1511424 > 1048576
Source: Binary string: xP+=_.pdbd? source: nvbbzu.dll
Source: Binary string: xP+=_.pdb source: nvbbzu.dll
Source: C:\Windows\System32\loaddll32.exeCode function: 1_2_008641F4 push esi; mov dword ptr [esp], ecx
Source: C:\Windows\SysWOW64\rundll32.exeCode function: 4_2_049741F4 push esi; mov dword ptr [esp], ecx
Source: nvbbzu.dllStatic PE information: section name: .CRT0
Source: nvbbzu.dllStatic PE information: section name: .crt1
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOX

Malware Analysis System Evasion

barindex
Source: C:\Windows\System32\loaddll32.exeSection loaded: \KnownDlls32\testapp.exe
Source: C:\Windows\SysWOW64\rundll32.exeSection loaded: \KnownDlls32\testapp.exe
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\loaddll32.exeProcess queried: DebugPort
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe "C:\Users\user\Desktop\nvbbzu.dll",#1
Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath Interception11
Process Injection
11
Virtualization/Sandbox Evasion
OS Credential Dumping11
Security Software Discovery
Remote Services1
Archive Collected Data
Exfiltration Over Other Network Medium1
Encrypted Channel
Eavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization Scripts1
Rundll32
LSASS Memory11
Virtualization/Sandbox Evasion
Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)1
Software Packing
Security Account Manager1
System Information Discovery
SMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)11
Process Injection
NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon Script1
Obfuscated Files or Information
LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet

This section contains all screenshots as thumbnails, including those not shown in the slideshow.


windows-stand
SourceDetectionScannerLabelLink
nvbbzu.dll49%VirustotalBrowse
nvbbzu.dll29%MetadefenderBrowse
nvbbzu.dll100%Joe Sandbox ML
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches
No contacted domains info
No contacted IP infos
Joe Sandbox Version:35.0.0 Citrine
Analysis ID:674157
Start date and time: 27/07/202209:56:312022-07-27 09:56:31 +02:00
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 6m 40s
Hypervisor based Inspection enabled:false
Report type:light
Sample file name:nvbbzu.xml (renamed file extension from xml to dll)
Cookbook file name:default.jbs
Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
Number of analysed new started processes analysed:34
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:MAL
Classification:mal64.bank.evad.winDLL@5/0@0/0
EGA Information:
  • Successful, ratio: 100%
HDC Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Adjust boot time
  • Enable AMSI
  • Override analysis time to 240s for rundll32
  • Exclude process from analysis (whitelisted): MpCmdRun.exe, audiodg.exe, BackgroundTransferHost.exe, RuntimeBroker.exe, WMIADAP.exe, backgroundTaskHost.exe, SgrmBroker.exe, conhost.exe, svchost.exe, wuapihost.exe
  • Excluded IPs from analysis (whitelisted): 23.211.6.115
  • Excluded domains from analysis (whitelisted): www.bing.com, fs.microsoft.com, ctldl.windowsupdate.com, store-images.s-microsoft.com-c.edgekey.net, time.windows.com, arc.msn.com, ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, login.live.com, store-images.s-microsoft.com, sls.update.microsoft.com, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net
  • Not all processes where analyzed, report is missing behavior information
No simulations
No context
No context
No context
No context
No context
No created / dropped files found
File type:PE32 executable (DLL) (GUI) Intel 80386, for MS Windows
Entropy (8bit):7.935740919082391
TrID:
  • Win32 Dynamic Link Library (generic) (1002004/3) 99.60%
  • Generic Win/DOS Executable (2004/3) 0.20%
  • DOS Executable Generic (2002/1) 0.20%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:nvbbzu.dll
File size:1511424
MD5:60aafd76fbfa15db34a0b2f93df5eea9
SHA1:a968c42da887544c4f46aa9924914022be44a40a
SHA256:46aa7de354f23ab96c0c4bf31a8ef06e6c2cf257dadce53d0a7f6e7d49a1fb6a
SHA512:479cc535c1919db804ec4c68537798fe6ab58fa7f6684cdc3f0ba35ce76632aff90997ae7314ee5012620a672ad00d2b564fa409dc31a4eba1d0248d63194880
SSDEEP:24576:Hdm2mGTXVABupDnsuAq7xwrPMscrKRC8G56elJiPp1E3dnsMu9n0Y7vo4EKa0ew8:HOGTXVAQsnPMRmk8yMPcdZu9n3E/0dAT
TLSH:6265F1F43D22E493E20B5C35325992633769AF2F454D9CC96CAD00CCC4A2EA79AFE535
File Content Preview:MZ......................@...................................,...gf..#...#...#...*.......*.......=U...... .z.....^~{.w....c......MZe.$...*...w... .G.h...MZ........E.1...^~G.......V. ... .z......^..R.....S.....^~F.....=U......#........Y..a....Y.......UF....
Icon Hash:74f0e4ecccdce0e4
Entrypoint:0x401118
Entrypoint Section:.text
Digitally signed:false
Imagebase:0x400000
Subsystem:windows gui
Image File Characteristics:EXECUTABLE_IMAGE, 32BIT_MACHINE, DLL
DLL Characteristics:GUARD_CF
Time Stamp:0x411098E1 [Wed Aug 4 08:05:53 2004 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:5
OS Version Minor:0
File Version Major:5
File Version Minor:0
Subsystem Version Major:5
Subsystem Version Minor:0
Import Hash:cc6005bdfb7408430874b385b3fa9363
Instruction
mov eax, edx
mov edx, 00000067h
add dword ptr [00425534h], edi
lea eax, dword ptr [00425540h]
add dword ptr [eax], esp
cmp edx, 66h
jne 00007F5990727BD7h
call 00007F5990727AAEh
lea eax, dword ptr [00425538h]
mov dword ptr [eax], ebx
mov eax, esi
add dword ptr [00425530h], eax
mov edx, ebp
add dword ptr [0042553Ch], edx
call 00007F5990727BB3h
inc eax
ret
mov dword ptr [ebp+00h], eax
push ebp
mov ebp, esp
and esp, FFFFFFF8h
sub esp, 78h
xor eax, eax
mov dword ptr [esp+68h], eax
mov eax, dword ptr [esp+68h]
mov dword ptr [esp+6Ch], 0000030Bh
mov ecx, esp
lea edx, dword ptr [esp+6Ch]
mov dword ptr [ecx+08h], edx
lea edx, dword ptr [esp+70h]
mov dword ptr [ecx+04h], edx
mov dword ptr [ecx+0Ch], 000005C1h
mov dword ptr [ecx], 00820F62h
mov ecx, dword ptr [00403044h]
mov dword ptr [esp+64h], eax
call ecx
sub esp, 10h
mov ecx, esp
mov dword ptr [ecx+04h], 00000380h
mov dword ptr [ecx], 00D8B267h
mov ecx, dword ptr [00403124h]
mov dword ptr [esp+60h], eax
call ecx
sub esp, 08h
xor ecx, ecx
mov dword ptr [esp+5Ch], eax
mov dword ptr [esp+58h], ecx
mov eax, dword ptr [esp+58h]
mov ecx, eax
and ecx, 0000000Fh
cmp ecx, 00000002h
mov dword ptr [esp+54h], eax
jne 00007F5990727BDEh
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IMPORT0x46cc0xf0.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x16d0000x350.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x16e0000x2c1c.reloc
IMAGE_DIRECTORY_ENTRY_DEBUG0x00x0
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x30000x178.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x1b4e0x2000False0.51171875data5.337400275912443IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
.rdata0x30000x202f0x3000False0.19856770833333334data4.699681580901602IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x60000x203000x20000False0.33522796630859375data6.825176440670153IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.CRT00x270000xa2c610xa3000False0.9951186852952454data7.9950313512995645IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.crt10xca0000xa2cc50xa3000False0.9950722536426381data7.9949535185054375IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ, IMAGE_SCN_MEM_WRITE
.rsrc0x16d0000x3500x1000False0.1044921875data0.8940808274374962IMAGE_SCN_TYPE_DSECT, IMAGE_SCN_MEM_READ
.reloc0x16e0000x399a0x4000False0.17364501953125data4.892382486928004IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountry
RT_VERSION0x16d0600x2f0SysEx File - IDPEnglishUnited States
DLLImport
WS2_32.dllsend
WININET.dllFindFirstUrlCacheEntryExW
USER32.dllGetWindowLongW, LoadCursorA, GetWindowDC, IsCharUpperA, DefMDIChildProcW, GetMenuItemID, FindWindowA, GetMenuBarInfo, GetScrollBarInfo, LoadKeyboardLayoutA, GetMenuStringA, GetWindowTextA, GetTabbedTextExtentA, GetUpdateRgn
WINSPOOL.DRVGetPrinterA
KERNEL32.dllGetFileAttributesA, FlushConsoleInputBuffer, GetDateFormatA, EnumTimeFormatsA, FindNextVolumeMountPointW, DeleteCriticalSection, GlobalGetAtomNameA, lstrcpynW, GetProfileIntW, GetStartupInfoA, GetComputerNameExW, GetLastError, LoadLibraryExA, GetPrivateProfileIntA, GetCPInfo, GetTempPathA, GetTapePosition, Module32Next, DeleteTimerQueue, GetConsoleWindow, GetTapeStatus, VirtualProtect, GlobalAddAtomW, GetLocalTime, GetUserDefaultUILanguage, GetSystemInfo, FindActCtxSectionStringW, GetQueuedCompletionStatus, GetWindowsDirectoryA, DebugBreak, FlushViewOfFile, GenerateConsoleCtrlEvent, GetLogicalDriveStringsW, CloseHandle, GetCurrentThreadId, OutputDebugStringA, LoadLibraryW, GetModuleHandleA, GetUserDefaultLangID, SetTapePosition, OpenProcess, GetFileTime
ADVAPI32.dllGetWindowsAccountDomainSid, GetSecurityDescriptorDacl, DeleteService, LogonUserExW, NotifyBootConfigStatus, EnumServicesStatusW
CRYPT32.dllCryptGetDefaultOIDFunctionAddress
GDI32.dllEndDoc, GetRasterizerCaps, ExtEscape, ExcludeClipRect, GetTextExtentExPointA, ExtTextOutW, FrameRgn, GetPaletteEntries, PolyPolyline, GetCurrentObject, GetOutlineTextMetricsW
OLEAUT32.dllVariantCopyInd
msvcrt.dllfputws, strspn, toupper, fseek
SHELL32.dllExtractIconExA
Language of compilation systemCountry where language is spokenMap
EnglishUnited States
No network behavior found

Click to jump to process

Target ID:1
Start time:09:57:34
Start date:27/07/2022
Path:C:\Windows\System32\loaddll32.exe
Wow64 process (32bit):true
Commandline:loaddll32.exe "C:\Users\user\Desktop\nvbbzu.dll"
Imagebase:0xca0000
File size:116736 bytes
MD5 hash:7DEB5DB86C0AC789123DEC286286B938
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

Target ID:2
Start time:09:57:34
Start date:27/07/2022
Path:C:\Windows\SysWOW64\cmd.exe
Wow64 process (32bit):true
Commandline:cmd.exe /C rundll32.exe "C:\Users\user\Desktop\nvbbzu.dll",#1
Imagebase:0x1190000
File size:232960 bytes
MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

Target ID:4
Start time:09:57:35
Start date:27/07/2022
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe "C:\Users\user\Desktop\nvbbzu.dll",#1
Imagebase:0x3e0000
File size:61952 bytes
MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

No disassembly