Play interactive tourEdit tour

Windows Analysis Report SecuriteInfo.com.Trojan.Win32.Save.a.6750.dll

Overview

General Information

Sample Name:SecuriteInfo.com.Trojan.Win32.Save.a.6750.dll
Analysis ID:493990
MD5:fc7ded75d61bce35c93fda507fce8270
SHA1:0039159b50144a3013c3b36e6b4bccde1267fbc3
SHA256:24be39964bf5ce9ad6f87badd1a714ae14688447668a7e83342bf3d0731a4ef6
Tags:dll
Infos:

Most interesting Screenshot:

Detection

Score:48
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Multi AV Scanner detection for submitted file
Uses 32bit PE files
PE file contains an invalid checksum
Program does not show much activity (idle)
Creates a process in suspended mode (likely to inject code)

Classification

RansomwareSpreadingPhishingBankerTrojan / BotAdwareSpywareExploiterEvaderMinercleansuspiciousmalicious
  • System is w10x64
  • loaddll32.exe (PID: 6256 cmdline: loaddll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.6750.dll' MD5: 72FCD8FB0ADC38ED9050569AD673650E)
    • cmd.exe (PID: 3240 cmdline: cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.6750.dll',#1 MD5: F3BDBE3BB6F734E357235F4D5898582D)
      • rundll32.exe (PID: 1808 cmdline: rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.6750.dll',#1 MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 3532 cmdline: rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.6750.dll,sfjzuie MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
    • rundll32.exe (PID: 4528 cmdline: rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.6750.dll',sfjzuie MD5: D7CA562B0DB4F4DD0F03A89A1FDAD63D)
  • cleanup

Malware Configuration

No configs have been found

Yara Overview

No yara matches

Sigma Overview

No Sigma rule has matched

Jbx Signature Overview

Click to jump to signature section

Show All Signature Results

AV Detection:

barindex
Multi AV Scanner detection for submitted file
Source: SecuriteInfo.com.Trojan.Win32.Save.a.6750.dllVirustotal: Detection: 15%Perma Link
Source: SecuriteInfo.com.Trojan.Win32.Save.a.6750.dllReversingLabs: Detection: 24%
Source: SecuriteInfo.com.Trojan.Win32.Save.a.6750.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL, RELOCS_STRIPPED
Source: SecuriteInfo.com.Trojan.Win32.Save.a.6750.dllStatic PE information: 32BIT_MACHINE, EXECUTABLE_IMAGE, DLL, RELOCS_STRIPPED
Source: SecuriteInfo.com.Trojan.Win32.Save.a.6750.dllVirustotal: Detection: 15%
Source: SecuriteInfo.com.Trojan.Win32.Save.a.6750.dllReversingLabs: Detection: 24%
Source: C:\Windows\System32\loaddll32.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
Source: classification engineClassification label: mal48.winDLL@9/0@0/0
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.6750.dll,sfjzuie
Source: unknownProcess created: C:\Windows\System32\loaddll32.exe loaddll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.6750.dll'
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.6750.dll',#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.6750.dll,sfjzuie
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.6750.dll',#1
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.6750.dll',sfjzuie
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\cmd.exe cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.6750.dll',#1Jump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.6750.dll,sfjzuieJump to behavior
Source: C:\Windows\System32\loaddll32.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.6750.dll',sfjzuieJump to behavior
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.6750.dll',#1Jump to behavior
Source: SecuriteInfo.com.Trojan.Win32.Save.a.6750.dllStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
Source: SecuriteInfo.com.Trojan.Win32.Save.a.6750.dllStatic PE information: real checksum: 0x12062 should be: 0x8673
Source: initial sampleStatic PE information: section name: .data entropy: 7.73273531146
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: C:\Windows\SysWOW64\rundll32.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\System32\loaddll32.exeThread delayed: delay time: 120000Jump to behavior
Source: all processesThread injection, dropped files, key value created, disk infection and DNS query: no activity detected
Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\rundll32.exe rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.6750.dll',#1Jump to behavior

Mitre Att&ck Matrix

Initial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionExfiltrationCommand and ControlNetwork EffectsRemote Service EffectsImpact
Valid AccountsWindows Management InstrumentationPath InterceptionProcess Injection11Rundll321OS Credential DumpingVirtualization/Sandbox Evasion1Remote ServicesData from Local SystemExfiltration Over Other Network MediumData ObfuscationEavesdrop on Insecure Network CommunicationRemotely Track Device Without AuthorizationModify System Partition
Default AccountsScheduled Task/JobBoot or Logon Initialization ScriptsBoot or Logon Initialization ScriptsVirtualization/Sandbox Evasion1LSASS MemorySystem Information Discovery1Remote Desktop ProtocolData from Removable MediaExfiltration Over BluetoothJunk DataExploit SS7 to Redirect Phone Calls/SMSRemotely Wipe Data Without AuthorizationDevice Lockout
Domain AccountsAt (Linux)Logon Script (Windows)Logon Script (Windows)Software Packing1Security Account ManagerQuery RegistrySMB/Windows Admin SharesData from Network Shared DriveAutomated ExfiltrationSteganographyExploit SS7 to Track Device LocationObtain Device Cloud BackupsDelete Device Data
Local AccountsAt (Windows)Logon Script (Mac)Logon Script (Mac)Process Injection11NTDSSystem Network Configuration DiscoveryDistributed Component Object ModelInput CaptureScheduled TransferProtocol ImpersonationSIM Card SwapCarrier Billing Fraud
Cloud AccountsCronNetwork Logon ScriptNetwork Logon ScriptObfuscated Files or Information1LSA SecretsRemote System DiscoverySSHKeyloggingData Transfer Size LimitsFallback ChannelsManipulate Device CommunicationManipulate App Store Rankings or Ratings
Hide Legend

Legend:

  • Process
  • Signature
  • Created File
  • DNS/IP Info
  • Is Dropped
  • Is Windows Process
  • Number of created Registry Values
  • Number of created Files
  • Visual Basic
  • Delphi
  • Java
  • .Net C# or VB.NET
  • C, C++ or other language
  • Is malicious
  • Internet
behaviorgraph top1 signatures2 2 Behavior Graph ID: 493990 Sample: SecuriteInfo.com.Trojan.Win... Startdate: 30/09/2021 Architecture: WINDOWS Score: 48 17 Multi AV Scanner detection for submitted file 2->17 7 loaddll32.exe 1 2->7         started        process3 process4 9 cmd.exe 1 7->9         started        11 rundll32.exe 7->11         started        13 rundll32.exe 7->13         started        process5 15 rundll32.exe 9->15         started       

Thumbnails

This section contains all screenshots as thumbnails, including those not shown in the slideshow.

windows-stand
SourceDetectionScannerLabelLink
SecuriteInfo.com.Trojan.Win32.Save.a.6750.dll15%VirustotalBrowse
SecuriteInfo.com.Trojan.Win32.Save.a.6750.dll24%ReversingLabsWin32.Trojan.Phonzy
No Antivirus matches
No Antivirus matches
No Antivirus matches
No Antivirus matches

Download Network PCAP: filteredfull

No contacted domains info
No contacted IP infos

General Information

Joe Sandbox Version:33.0.0 White Diamond
Analysis ID:493990
Start date:30.09.2021
Start time:08:21:16
Joe Sandbox Product:CloudBasic
Overall analysis duration:0h 5m 0s
Hypervisor based Inspection enabled:false
Report type:full
Sample file name:SecuriteInfo.com.Trojan.Win32.Save.a.6750.dll
Cookbook file name:default.jbs
Analysis system description:Windows 10 64 bit v1803 with Office Professional Plus 2016, Chrome 85, IE 11, Adobe Reader DC 19, Java 8 Update 211
Run name:Run with higher sleep bypass
Number of analysed new started processes analysed:21
Number of new started drivers analysed:0
Number of existing processes analysed:0
Number of existing drivers analysed:0
Number of injected processes analysed:0
Technologies:
  • HCA enabled
  • EGA enabled
  • HDC enabled
  • AMSI enabled
Analysis Mode:default
Analysis stop reason:Timeout
Detection:MAL
Classification:mal48.winDLL@9/0@0/0
EGA Information:Failed
HDC Information:Failed
HCA Information:
  • Successful, ratio: 100%
  • Number of executed functions: 0
  • Number of non-executed functions: 0
Cookbook Comments:
  • Adjust boot time
  • Enable AMSI
  • Sleeps bigger than 120000ms are automatically reduced to 1000ms
  • Found application associated with file extension: .dll
  • Stop behavior analysis, all processes terminated
Warnings:
  • Exclude process from analysis (whitelisted): BackgroundTransferHost.exe, backgroundTaskHost.exe, svchost.exe, wuapihost.exe
  • Excluded IPs from analysis (whitelisted): 23.211.6.115, 23.203.80.193, 51.104.136.2, 20.82.210.154, 80.67.82.211, 80.67.82.235, 20.54.110.249, 40.112.88.60
  • Excluded domains from analysis (whitelisted): displaycatalog-rp-europe.md.mp.microsoft.com.akadns.net, neu-displaycatalogrp.frontdoor.bigcatalog.commerce.microsoft.com, ris-prod.trafficmanager.net, asf-ris-prod-neu.northeurope.cloudapp.azure.com, store-images.s-microsoft.com-c.edgekey.net, settings-win.data.microsoft.com, iris-de-prod-azsc-neu-b.northeurope.cloudapp.azure.com, a1449.dscg2.akamai.net, arc.msn.com, settingsfd-geo.trafficmanager.net, e11290.dspg.akamaiedge.net, ris.api.iris.microsoft.com, e12564.dspb.akamaiedge.net, go.microsoft.com, consumer-displaycatalogrp-aks2aks-europe.md.mp.microsoft.com.akadns.net, store-images.s-microsoft.com, go.microsoft.com.edgekey.net, arc.trafficmanager.net, displaycatalog.mp.microsoft.com, img-prod-cms-rt-microsoft-com.akamaized.net, displaycatalog-rp.md.mp.microsoft.com.akadns.net
  • Not all processes where analyzed, report is missing behavior information
No simulations
No context
No context
No context
No context
No context
No created / dropped files found

Static File Info

General

File type:PE32 executable (DLL) (native) Intel 80386, for MS Windows
Entropy (8bit):6.8371162796570015
TrID:
  • Win32 Dynamic Link Library (generic) (1002004/3) 98.43%
  • Win32 Device Driver (generic) (12004/3) 1.18%
  • Generic Win/DOS Executable (2004/3) 0.20%
  • DOS Executable Generic (2002/1) 0.20%
  • Autodesk FLIC Image File (extensions: flc, fli, cel) (7/3) 0.00%
File name:SecuriteInfo.com.Trojan.Win32.Save.a.6750.dll
File size:19968
MD5:fc7ded75d61bce35c93fda507fce8270
SHA1:0039159b50144a3013c3b36e6b4bccde1267fbc3
SHA256:24be39964bf5ce9ad6f87badd1a714ae14688447668a7e83342bf3d0731a4ef6
SHA512:0095f57fd5c7001f218f62f21c0a4623b128850edb3fe1a2980037f9101250c8178989601e0b8dbabc9cecd2079a6049a6efbd066880a8eb880a27e389601db2
SSDEEP:384:4OQuiCzcXBWIOrJ0mDGFVTJWYRPWnFaZyuVAOwuumD6md5:jQuiCzOX6C3EYRPWnUjV/w7memd5
File Content Preview:MZ......................@...............................................!..L.!This program cannot be run in DOS mode....$........>..Q_.CQ_.CQ_.C"=.B^_.CQ_.Cx_.C.*.BP_.C.*.BP_.C.*iCP_.C.*.BP_.CRichQ_.C........................PE..L.....Ta...........!.....&.

File Icon

Icon Hash:74f0e4ecccdce0e4

General

Entrypoint:0x10000000
Entrypoint Section:
Digitally signed:false
Imagebase:0x10000000
Subsystem:native
Image File Characteristics:32BIT_MACHINE, EXECUTABLE_IMAGE, DLL, RELOCS_STRIPPED
DLL Characteristics:NO_SEH, NX_COMPAT
Time Stamp:0x6154FF92 [Thu Sep 30 00:06:42 2021 UTC]
TLS Callbacks:
CLR (.Net) Version:
OS Version Major:6
OS Version Minor:0
File Version Major:6
File Version Minor:0
Subsystem Version Major:6
Subsystem Version Minor:0
Import Hash:c5e7a9cbc43a8c509a6d920e6fe9f56a
Instruction
dec ebp
pop edx
nop
add byte ptr [ebx], al
add byte ptr [eax], al
add byte ptr [eax+eax], al
add byte ptr [eax], al
NameVirtual AddressVirtual Size Is in Section
IMAGE_DIRECTORY_ENTRY_EXPORT0x50e00x48.rdata
IMAGE_DIRECTORY_ENTRY_IMPORT0x52240xa0.rdata
IMAGE_DIRECTORY_ENTRY_RESOURCE0x80000x1e0.rsrc
IMAGE_DIRECTORY_ENTRY_EXCEPTION0x00x0
IMAGE_DIRECTORY_ENTRY_SECURITY0x00x0
IMAGE_DIRECTORY_ENTRY_BASERELOC0x00x0
IMAGE_DIRECTORY_ENTRY_DEBUG0x50c00x1c.rdata
IMAGE_DIRECTORY_ENTRY_COPYRIGHT0x00x0
IMAGE_DIRECTORY_ENTRY_GLOBALPTR0x00x0
IMAGE_DIRECTORY_ENTRY_TLS0x00x0
IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG0x00x0
IMAGE_DIRECTORY_ENTRY_BOUND_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_IAT0x50000xc0.rdata
IMAGE_DIRECTORY_ENTRY_DELAY_IMPORT0x00x0
IMAGE_DIRECTORY_ENTRY_COM_DESCRIPTOR0x00x0
IMAGE_DIRECTORY_ENTRY_RESERVED0x00x0
NameVirtual AddressVirtual SizeRaw SizeXored PEZLIB ComplexityFile TypeEntropyCharacteristics
.text0x10000x25270x2600False0.468236019737data5.98653583847IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_READ
.bss0x40000x100x0False0empty0.0IMAGE_SCN_MEM_WRITE, IMAGE_SCN_CNT_UNINITIALIZED_DATA, IMAGE_SCN_MEM_READ
.rdata0x50000x5a80x600False0.484375data4.41088634285IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_READ
.data0x60000x1b7d0x1c00False0.869698660714data7.73273531146IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_WRITE, IMAGE_SCN_MEM_READ
.rsrc0x80000x1e00x200False0.525390625data4.70317269765IMAGE_SCN_CNT_INITIALIZED_DATA, IMAGE_SCN_MEM_DISCARDABLE, IMAGE_SCN_MEM_READ
NameRVASizeTypeLanguageCountry
RT_MANIFEST0x80600x17dXML 1.0 document textEnglishUnited States
DLLImport
SHLWAPI.dllStrRChrW
KERNEL32.dllGetComputerNameExW, lstrcmpiA, lstrcmpiW, GetComputerNameExA, lstrcpyW, lstrlenA, lstrlenW, EnumResourceTypesA, HeapAlloc, GetProcessHeap, lstrcpyA
ODBC32.dllCursorLibTransact
MAPI32.dll
WINSPOOL.DRVDeletePrinterDriverW, DocumentPropertiesW, DeleteMonitorW, GetPrinterDataExA, DeletePrinterConnectionA
CRYPT32.dllCertStrToNameA, CryptMsgCountersignEncoded, CertAddEncodedCTLToStore, CryptHashPublicKeyInfo
SHELL32.dllSHGetDataFromIDListA, SHBrowseForFolderW
NameOrdinalAddress
sfjzuie10x10003130
Language of compilation systemCountry where language is spokenMap
EnglishUnited States

Network Behavior

Download Network PCAP: filteredfull

TimestampSource PortDest PortSource IPDest IP
Sep 30, 2021 08:22:11.910547018 CEST6464653192.168.2.48.8.8.8
Sep 30, 2021 08:22:11.931586027 CEST53646468.8.8.8192.168.2.4
Sep 30, 2021 08:22:13.667448997 CEST6529853192.168.2.48.8.8.8
Sep 30, 2021 08:22:13.689143896 CEST53652988.8.8.8192.168.2.4
Sep 30, 2021 08:22:13.849858999 CEST5912353192.168.2.48.8.8.8
Sep 30, 2021 08:22:13.878493071 CEST53591238.8.8.8192.168.2.4
Sep 30, 2021 08:22:41.618395090 CEST5453153192.168.2.48.8.8.8
Sep 30, 2021 08:22:41.636101007 CEST53545318.8.8.8192.168.2.4
Sep 30, 2021 08:23:16.452830076 CEST4971453192.168.2.48.8.8.8
Sep 30, 2021 08:23:16.480808973 CEST53497148.8.8.8192.168.2.4
Sep 30, 2021 08:23:19.949408054 CEST5802853192.168.2.48.8.8.8
Sep 30, 2021 08:23:19.977643013 CEST53580288.8.8.8192.168.2.4
Sep 30, 2021 08:23:35.347182989 CEST5309753192.168.2.48.8.8.8
Sep 30, 2021 08:23:35.431720018 CEST53530978.8.8.8192.168.2.4
Sep 30, 2021 08:23:35.998404026 CEST4925753192.168.2.48.8.8.8
Sep 30, 2021 08:23:36.061352015 CEST53492578.8.8.8192.168.2.4
Sep 30, 2021 08:23:36.464598894 CEST6238953192.168.2.48.8.8.8
Sep 30, 2021 08:23:36.492300034 CEST53623898.8.8.8192.168.2.4
Sep 30, 2021 08:23:36.518635035 CEST4991053192.168.2.48.8.8.8
Sep 30, 2021 08:23:36.539016962 CEST53499108.8.8.8192.168.2.4
Sep 30, 2021 08:23:36.903758049 CEST5585453192.168.2.48.8.8.8
Sep 30, 2021 08:23:36.928200006 CEST53558548.8.8.8192.168.2.4
Sep 30, 2021 08:23:37.447397947 CEST6454953192.168.2.48.8.8.8
Sep 30, 2021 08:23:37.466849089 CEST53645498.8.8.8192.168.2.4
Sep 30, 2021 08:23:37.895561934 CEST6315353192.168.2.48.8.8.8
Sep 30, 2021 08:23:37.915538073 CEST53631538.8.8.8192.168.2.4
Sep 30, 2021 08:23:38.405030966 CEST5299153192.168.2.48.8.8.8
Sep 30, 2021 08:23:38.431299925 CEST53529918.8.8.8192.168.2.4
Sep 30, 2021 08:23:39.099848032 CEST5370053192.168.2.48.8.8.8
Sep 30, 2021 08:23:39.152040005 CEST53537008.8.8.8192.168.2.4
Sep 30, 2021 08:23:40.210956097 CEST5172653192.168.2.48.8.8.8
Sep 30, 2021 08:23:40.271764040 CEST53517268.8.8.8192.168.2.4
Sep 30, 2021 08:23:40.758810043 CEST5679453192.168.2.48.8.8.8
Sep 30, 2021 08:23:40.779084921 CEST53567948.8.8.8192.168.2.4
Sep 30, 2021 08:23:56.067137957 CEST5653453192.168.2.48.8.8.8
Sep 30, 2021 08:23:56.095444918 CEST53565348.8.8.8192.168.2.4
Sep 30, 2021 08:23:57.479154110 CEST5662753192.168.2.48.8.8.8
Sep 30, 2021 08:23:57.507731915 CEST53566278.8.8.8192.168.2.4
Sep 30, 2021 08:24:30.312864065 CEST5662153192.168.2.48.8.8.8
Sep 30, 2021 08:24:30.340914011 CEST53566218.8.8.8192.168.2.4

Code Manipulations

Statistics

CPU Usage

Click to jump to process

Memory Usage

Click to jump to process

Behavior

Click to jump to process

System Behavior

Start time:08:22:24
Start date:30/09/2021
Path:C:\Windows\System32\loaddll32.exe
Wow64 process (32bit):true
Commandline:loaddll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.6750.dll'
Imagebase:0xfa0000
File size:893440 bytes
MD5 hash:72FCD8FB0ADC38ED9050569AD673650E
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:moderate
Start time:08:22:25
Start date:30/09/2021
Path:C:\Windows\SysWOW64\cmd.exe
Wow64 process (32bit):true
Commandline:cmd.exe /C rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.6750.dll',#1
Imagebase:0x11d0000
File size:232960 bytes
MD5 hash:F3BDBE3BB6F734E357235F4D5898582D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Start time:08:22:25
Start date:30/09/2021
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.6750.dll,sfjzuie
Imagebase:0xef0000
File size:61952 bytes
MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Start time:08:22:25
Start date:30/09/2021
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.6750.dll',#1
Imagebase:0xef0000
File size:61952 bytes
MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high
Start time:08:22:29
Start date:30/09/2021
Path:C:\Windows\SysWOW64\rundll32.exe
Wow64 process (32bit):true
Commandline:rundll32.exe 'C:\Users\user\Desktop\SecuriteInfo.com.Trojan.Win32.Save.a.6750.dll',sfjzuie
Imagebase:0xef0000
File size:61952 bytes
MD5 hash:D7CA562B0DB4F4DD0F03A89A1FDAD63D
Has elevated privileges:true
Has administrator privileges:true
Programmed in:C, C++ or other language
Reputation:high

Disassembly

Code Analysis