Loading Joe Sandbox Report ...

Edit tour

Windows Analysis Report
RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe

Overview

General Information

Sample name:RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe
Analysis ID:1566628
MD5:973306ff45c5b4ee7333db7a5ef7a0f9
SHA1:32c7065633f821f72f2c2af4a572414cdd79ea91
SHA256:dec26f7cc646acdff30d90fae8837623c70870ed0cc9020930f95b53b6b730db
Tags:exeuser-adrian__luca
Infos:

Detection

Remcos
Score:100
Range:0 - 100
Whitelisted:false
Confidence:100%

Signatures

Contains functionality to bypass UAC (CMSTPLUA)
Detected Remcos RAT
Found malware configuration
Malicious sample detected (through community Yara rule)
Multi AV Scanner detection for dropped file
Multi AV Scanner detection for submitted file
Sigma detected: Drops script at startup location
Sigma detected: Remcos
Suricata IDS alerts for network traffic
System process connects to network (likely due to code injection or exploit)
Yara detected Remcos RAT
Yara detected UAC Bypass using CMSTP
AI detected suspicious sample
Binary is likely a compiled AutoIt script file
C2 URLs / IPs found in malware configuration
Contains functionality to inject code into remote processes
Contains functionality to register a low level keyboard hook
Contains functionality to steal Chrome passwords or cookies
Contains functionality to steal Firefox passwords or cookies
Contains functionalty to change the wallpaper
Delayed program exit found
Drops VBS files to the startup folder
Initial sample is a PE file and has a suspicious name
Machine Learning detection for dropped file
Machine Learning detection for sample
Maps a DLL or memory area into another process
Sigma detected: WScript or CScript Dropper
Switches to a custom stack to bypass stack traces
Tries to harvest and steal browser information (history, passwords, etc)
Tries to steal Instant Messenger accounts or passwords
Tries to steal Mail credentials (via file / registry access)
Uses dynamic DNS services
Windows Scripting host queries suspicious COM object (likely to drop second stage)
Writes to foreign memory regions
Yara detected WebBrowserPassView password recovery tool
Contains functionality for read data from the clipboard
Contains functionality to block mouse and keyboard input (often used to hinder debugging)
Contains functionality to call native functions
Contains functionality to check if a debugger is running (IsDebuggerPresent)
Contains functionality to check if a debugger is running (OutputDebugString,GetLastError)
Contains functionality to check if a window is minimized (may be used to check if an application is visible)
Contains functionality to communicate with device drivers
Contains functionality to download and launch executables
Contains functionality to dynamically determine API calls
Contains functionality to enumerate process and check for explorer.exe or svchost.exe (often used for thread injection)
Contains functionality to enumerate running services
Contains functionality to execute programs as a different user
Contains functionality to launch a control a shell (cmd.exe)
Contains functionality to launch a process as a different user
Contains functionality to launch a program with higher privileges
Contains functionality to modify clipboard data
Contains functionality to open a port and listen for incoming connection (possibly a backdoor)
Contains functionality to query CPU information (cpuid)
Contains functionality to query locales information (e.g. system language)
Contains functionality to read the PEB
Contains functionality to read the clipboard data
Contains functionality to retrieve information about pressed keystrokes
Contains functionality to shutdown / reboot the system
Contains functionality to simulate keystroke presses
Contains functionality to simulate mouse events
Contains functionality which may be used to detect a debugger (GetProcessHeap)
Creates a process in suspended mode (likely to inject code)
Creates a start menu entry (Start Menu\Programs\Startup)
Detected TCP or UDP traffic on non-standard ports
Detected potential crypto function
Drops PE files
Enables debug privileges
Extensive use of GetProcAddress (often used to hide API calls)
Found WSH timer for Javascript or VBS script (likely evasive script)
Found a high number of Window / User specific system calls (may be a loop to detect user behavior)
Found decision node followed by non-executed suspicious APIs
Found evaded block containing many API calls
Found large amount of non-executed APIs
Found potential string decryption / allocating functions
HTTP GET or POST without a user agent
IP address seen in connection with other malware
Internet Provider seen in connection with other malware
May sleep (evasive loops) to hinder dynamic analysis
OS version to string mapping found (often used in BOTs)
Potential key logger detected (key state polling based)
Queries the volume information (name, serial number etc) of a device
Sigma detected: Uncommon Svchost Parent Process
Sigma detected: WSF/JSE/JS/VBA/VBE File Execution Via Cscript/Wscript
Stores files to the Windows start menu directory
Suricata IDS alerts with low severity for network traffic
Uses 32bit PE files
Uses Microsoft's Enhanced Cryptographic Provider
Uses code obfuscation techniques (call, push, ret)
Yara detected Keylogger Generic
Yara signature match

Classification

  • System is w10x64
  • RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe (PID: 7332 cmdline: "C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe" MD5: 973306FF45C5B4EE7333DB7A5EF7A0F9)
    • schoollike.exe (PID: 7392 cmdline: "C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe" MD5: 973306FF45C5B4EE7333DB7A5EF7A0F9)
      • svchost.exe (PID: 7432 cmdline: "C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
        • svchost.exe (PID: 7816 cmdline: C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\user\AppData\Local\Temp\mtmppeccgqygscehvklzfdreddodq" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
        • svchost.exe (PID: 7824 cmdline: C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\user\AppData\Local\Temp\mtmppeccgqygscehvklzfdreddodq" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
        • svchost.exe (PID: 7832 cmdline: C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\user\AppData\Local\Temp\wnsiqxnvuzqluislmugbiidvdjfejiom" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
        • svchost.exe (PID: 7848 cmdline: C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\user\AppData\Local\Temp\ypxsq" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
  • wscript.exe (PID: 7532 cmdline: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\schoollike.vbs" MD5: A47CBE969EA935BDD3AB568BB126BC80)
    • schoollike.exe (PID: 7580 cmdline: "C:\Users\user\AppData\Local\penstocks\schoollike.exe" MD5: 973306FF45C5B4EE7333DB7A5EF7A0F9)
      • svchost.exe (PID: 7596 cmdline: "C:\Users\user\AppData\Local\penstocks\schoollike.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
      • schoollike.exe (PID: 7604 cmdline: "C:\Users\user\AppData\Local\penstocks\schoollike.exe" MD5: 973306FF45C5B4EE7333DB7A5EF7A0F9)
        • svchost.exe (PID: 7628 cmdline: "C:\Users\user\AppData\Local\penstocks\schoollike.exe" MD5: 1ED18311E3DA35942DB37D15FA40CC5B)
  • cleanup
NameDescriptionAttributionBlogpost URLsLink
Remcos, RemcosRATRemcos (acronym of Remote Control & Surveillance Software) is a commercial Remote Access Tool to remotely control computers.Remcos is advertised as legitimate software which can be used for surveillance and penetration testing purposes, but has been used in numerous hacking campaigns.Remcos, once installed, opens a backdoor on the computer, granting full access to the remote user.Remcos is developed by the cybersecurity company BreakingSecurity.
  • APT33
  • The Gorgon Group
  • UAC-0050
https://malpedia.caad.fkie.fraunhofer.de/details/win.remcos
{"Host:Port:Password": ["netflixyoutubebrowser.duckdns.org:34043:1"], "Assigned name": "WORK", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-CDDRK8", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
SourceRuleDescriptionAuthorStrings
00000003.00000002.3825727194.0000000003230000.00000004.00000020.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
    00000002.00000002.1387521807.0000000000990000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
      00000002.00000002.1387521807.0000000000990000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_RemcosYara detected Remcos RATJoe Security
        00000002.00000002.1387521807.0000000000990000.00000004.00001000.00020000.00000000.sdmpJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
          00000002.00000002.1387521807.0000000000990000.00000004.00001000.00020000.00000000.sdmpWindows_Trojan_Remcos_b296e965unknownunknown
          • 0x6aaf8:$a1: Remcos restarted by watchdog!
          • 0x6b070:$a3: %02i:%02i:%02i:%03i
          Click to see the 51 entries
          SourceRuleDescriptionAuthorStrings
          7.2.schoollike.exe.35e0000.1.unpackJoeSecurity_Keylogger_GenericYara detected Keylogger GenericJoe Security
            7.2.schoollike.exe.35e0000.1.unpackJoeSecurity_RemcosYara detected Remcos RATJoe Security
              7.2.schoollike.exe.35e0000.1.unpackJoeSecurity_UACBypassusingCMSTPYara detected UAC Bypass using CMSTPJoe Security
                7.2.schoollike.exe.35e0000.1.unpackWindows_Trojan_Remcos_b296e965unknownunknown
                • 0x69ef8:$a1: Remcos restarted by watchdog!
                • 0x6a470:$a3: %02i:%02i:%02i:%03i
                7.2.schoollike.exe.35e0000.1.unpackREMCOS_RAT_variantsunknownunknown
                • 0x64194:$str_a1: C:\Windows\System32\cmd.exe
                • 0x64110:$str_a3: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                • 0x64110:$str_a4: /k %windir%\System32\reg.exe ADD HKLM\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System /v EnableLUA /t REG_DWOR
                • 0x64610:$str_a5: \AppData\Local\Google\Chrome\User Data\Default\Login Data
                • 0x64c10:$str_b1: CreateObject("Scripting.FileSystemObject").DeleteFile(Wscript.ScriptFullName)
                • 0x64204:$str_b2: Executing file:
                • 0x6503c:$str_b3: GetDirectListeningPort
                • 0x64a00:$str_b4: Set fso = CreateObject("Scripting.FileSystemObject")
                • 0x64b80:$str_b7: \update.vbs
                • 0x6422c:$str_b9: Downloaded file:
                • 0x64218:$str_b10: Downloading file:
                • 0x642bc:$str_b12: Failed to upload file:
                • 0x65004:$str_b13: StartForward
                • 0x65024:$str_b14: StopForward
                • 0x64ad8:$str_b15: fso.DeleteFile "
                • 0x64a6c:$str_b16: On Error Resume Next
                • 0x64b08:$str_b17: fso.DeleteFolder "
                • 0x642ac:$str_b18: Uploaded file:
                • 0x6426c:$str_b19: Unable to delete:
                • 0x64aa0:$str_b20: while fso.FileExists("
                • 0x64749:$str_c0: [Firefox StoredLogins not found]
                Click to see the 55 entries

                System Summary

                barindex
                Source: Process startedAuthor: Margaritis Dimitrios (idea), Florian Roth (Nextron Systems), oscd.community: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\schoollike.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\schoollike.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 3504, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\schoollike.vbs" , ProcessId: 7532, ProcessName: wscript.exe
                Source: Process startedAuthor: Florian Roth (Nextron Systems): Data: Command: "C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe", CommandLine: "C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe", ParentImage: C:\Users\user\AppData\Local\penstocks\schoollike.exe, ParentProcessId: 7392, ParentProcessName: schoollike.exe, ProcessCommandLine: "C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe", ProcessId: 7432, ProcessName: svchost.exe
                Source: Process startedAuthor: Michael Haag: Data: Command: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\schoollike.vbs" , CommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\schoollike.vbs" , CommandLine|base64offset|contains: , Image: C:\Windows\System32\wscript.exe, NewProcessName: C:\Windows\System32\wscript.exe, OriginalFileName: C:\Windows\System32\wscript.exe, ParentCommandLine: , ParentImage: , ParentProcessId: 3504, ProcessCommandLine: "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\schoollike.vbs" , ProcessId: 7532, ProcessName: wscript.exe
                Source: Process startedAuthor: vburov: Data: Command: "C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe", CommandLine: "C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe", CommandLine|base64offset|contains: , Image: C:\Windows\SysWOW64\svchost.exe, NewProcessName: C:\Windows\SysWOW64\svchost.exe, OriginalFileName: C:\Windows\SysWOW64\svchost.exe, ParentCommandLine: "C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe", ParentImage: C:\Users\user\AppData\Local\penstocks\schoollike.exe, ParentProcessId: 7392, ParentProcessName: schoollike.exe, ProcessCommandLine: "C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe", ProcessId: 7432, ProcessName: svchost.exe

                Data Obfuscation

                barindex
                Source: File createdAuthor: Joe Security: Data: EventID: 11, Image: C:\Users\user\AppData\Local\penstocks\schoollike.exe, ProcessId: 7392, TargetFilename: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\schoollike.vbs

                Stealing of Sensitive Information

                barindex
                Source: Registry Key setAuthor: Joe Security: Data: Details: 2E D7 BD 26 6B 3C 67 2F 75 72 A8 A2 F1 22 FC 33 3F 65 2C 95 39 AA 27 D7 58 21 34 68 73 60 AE 74 DF 03 0A AD 4C 09 51 82 B6 54 31 A5 E8 D5 73 0F 77 60 FA EE 87 F8 8B 24 60 92 16 70 8F 3F C5 E9 , EventID: 13, EventType: SetValue, Image: C:\Windows\SysWOW64\svchost.exe, ProcessId: 7432, TargetObject: HKEY_CURRENT_USER\SOFTWARE\Rmc-CDDRK8\exepath
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-02T14:38:37.818865+010020365941Malware Command and Control Activity Detected192.168.2.94974569.61.84.22734043TCP
                2024-12-02T14:38:40.131348+010020365941Malware Command and Control Activity Detected192.168.2.94975269.61.84.22734043TCP
                TimestampSIDSeverityClasstypeSource IPSource PortDestination IPDestination PortProtocol
                2024-12-02T14:38:42.709194+010028033043Unknown Traffic192.168.2.949758178.237.33.5080TCP

                Click to jump to signature section

                Show All Signature Results

                AV Detection

                barindex
                Source: 00000003.00000002.3825644686.0000000003200000.00000004.00000020.00020000.00000000.sdmpMalware Configuration Extractor: Remcos {"Host:Port:Password": ["netflixyoutubebrowser.duckdns.org:34043:1"], "Assigned name": "WORK", "Connect interval": "1", "Install flag": "Disable", "Setup HKCU\\Run": "Enable", "Setup HKLM\\Run": "Enable", "Install path": "Application path", "Copy file": "remcos.exe", "Startup value": "Disable", "Hide file": "Disable", "Mutex": "Rmc-CDDRK8", "Keylog flag": "0", "Keylog path": "Application path", "Keylog file": "logs.dat", "Keylog crypt": "Disable", "Hide keylog file": "Disable", "Screenshot flag": "Disable", "Screenshot time": "1", "Take Screenshot option": "Disable", "Take screenshot title": "", "Take screenshot time": "5", "Screenshot path": "AppData", "Screenshot file": "Screenshots", "Screenshot crypt": "Disable", "Mouse option": "Disable", "Delete file": "Disable", "Audio record time": "5", "Audio folder": "MicRecords", "Connect delay": "0", "Copy folder": "Remcos", "Keylog folder": "remcos"}
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeReversingLabs: Detection: 47%
                Source: RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeReversingLabs: Detection: 47%
                Source: Yara matchFile source: 7.2.schoollike.exe.35e0000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.schoollike.exe.3d60000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.schoollike.exe.990000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.schoollike.exe.35e0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.schoollike.exe.990000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.schoollike.exe.3d60000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000002.3825727194.0000000003230000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1387521807.0000000000990000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.1491358992.0000000003D60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.3825644686.0000000003200000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.1504738636.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.1506183329.00000000035E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.1505033984.0000000003000000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.3823656144.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.3825672554.0000000003212000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: schoollike.exe PID: 7392, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 7432, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: schoollike.exe PID: 7580, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: schoollike.exe PID: 7604, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 7628, type: MEMORYSTR
                Source: Submited SampleIntegrated Neural Analysis Model: Matched 99.9% probability
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeJoe Sandbox ML: detected
                Source: RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeJoe Sandbox ML: detected
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0043293A CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,3_2_0043293A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0043293A CryptAcquireContextA,CryptGenRandom,CryptReleaseContext,8_2_0043293A
                Source: schoollike.exe, 00000002.00000002.1387521807.0000000000990000.00000004.00001000.00020000.00000000.sdmpBinary or memory string: -----BEGIN PUBLIC KEY-----memstr_1ac87e54-3

                Exploits

                barindex
                Source: Yara matchFile source: 7.2.schoollike.exe.35e0000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.schoollike.exe.3d60000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.schoollike.exe.990000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.schoollike.exe.35e0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.schoollike.exe.990000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.schoollike.exe.3d60000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.1387521807.0000000000990000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.1491358992.0000000003D60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.1504738636.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.1506183329.00000000035E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.3823656144.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: schoollike.exe PID: 7392, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 7432, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: schoollike.exe PID: 7580, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: schoollike.exe PID: 7604, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 7628, type: MEMORYSTR

                Privilege Escalation

                barindex
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00406764 _wcslen,CoGetObject,3_2_00406764
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00406764 _wcslen,CoGetObject,8_2_00406764
                Source: RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: Binary string: wntdll.pdbUGP source: schoollike.exe, 00000002.00000003.1383238319.00000000033B0000.00000004.00001000.00020000.00000000.sdmp, schoollike.exe, 00000002.00000003.1386267418.00000000035D0000.00000004.00001000.00020000.00000000.sdmp, schoollike.exe, 00000005.00000003.1488942455.0000000003DE0000.00000004.00001000.00020000.00000000.sdmp, schoollike.exe, 00000005.00000003.1489177148.0000000003F80000.00000004.00001000.00020000.00000000.sdmp, schoollike.exe, 00000007.00000003.1501252966.0000000003800000.00000004.00001000.00020000.00000000.sdmp, schoollike.exe, 00000007.00000003.1504588535.00000000036E0000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: schoollike.exe, 00000002.00000003.1383238319.00000000033B0000.00000004.00001000.00020000.00000000.sdmp, schoollike.exe, 00000002.00000003.1386267418.00000000035D0000.00000004.00001000.00020000.00000000.sdmp, schoollike.exe, 00000005.00000003.1488942455.0000000003DE0000.00000004.00001000.00020000.00000000.sdmp, schoollike.exe, 00000005.00000003.1489177148.0000000003F80000.00000004.00001000.00020000.00000000.sdmp, schoollike.exe, 00000007.00000003.1501252966.0000000003800000.00000004.00001000.00020000.00000000.sdmp, schoollike.exe, 00000007.00000003.1504588535.00000000036E0000.00000004.00001000.00020000.00000000.sdmp
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B46CA9 GetFileAttributesW,FindFirstFileW,FindClose,0_2_00B46CA9
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B460DD _wcscat,_wcscat,__wsplitpath,FindFirstFileW,DeleteFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindNextFileW,FindClose,FindClose,0_2_00B460DD
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B463F9 _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,0_2_00B463F9
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B4EB60 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00B4EB60
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B4F5FA FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00B4F5FA
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B4F56F FindFirstFileW,FindClose,0_2_00B4F56F
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B51B2F SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00B51B2F
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B51C8A SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00B51C8A
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B51F94 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00B51F94
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00BB6CA9 GetFileAttributesW,FindFirstFileW,FindClose,2_2_00BB6CA9
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00BB60DD _wcscat,_wcscat,__wsplitpath,FindFirstFileW,DeleteFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindNextFileW,FindClose,FindClose,2_2_00BB60DD
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00BB63F9 _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,2_2_00BB63F9
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00BBEB60 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,2_2_00BBEB60
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00BBF5FA FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,2_2_00BBF5FA
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00BBF56F FindFirstFileW,FindClose,2_2_00BBF56F
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00BC1B2F SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,2_2_00BC1B2F
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00BC1C8A SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,2_2_00BC1C8A
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00BC1F94 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,2_2_00BC1F94
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0040B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,3_2_0040B335
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0041B42F FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,3_2_0041B42F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0040B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,3_2_0040B53A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0044D5E9 FindFirstFileExA,3_2_0044D5E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_004089A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8,3_2_004089A9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00406AC2 FindFirstFileW,FindNextFileW,3_2_00406AC2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00407A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,3_2_00407A8C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00418C69 FindFirstFileW,FindNextFileW,FindNextFileW,3_2_00418C69
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00408DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,3_2_00408DA7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_100010F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,3_2_100010F1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_10006580 FindFirstFileExA,3_2_10006580
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0040B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,8_2_0040B335
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0041B42F FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,8_2_0041B42F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0040B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,8_2_0040B53A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0044D5E9 FindFirstFileExA,8_2_0044D5E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_004089A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8,8_2_004089A9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00406AC2 FindFirstFileW,FindNextFileW,8_2_00406AC2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00407A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,8_2_00407A8C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00418C69 FindFirstFileW,FindNextFileW,FindNextFileW,8_2_00418C69
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00408DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,8_2_00408DA7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00406F06 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,3_2_00406F06

                Networking

                barindex
                Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.9:49745 -> 69.61.84.227:34043
                Source: Network trafficSuricata IDS: 2036594 - Severity 1 - ET JA3 Hash - Remcos 3.x/4.x TLS Connection : 192.168.2.9:49752 -> 69.61.84.227:34043
                Source: C:\Windows\SysWOW64\svchost.exeNetwork Connect: 69.61.84.227 34043Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeNetwork Connect: 178.237.33.50 80Jump to behavior
                Source: Malware configuration extractorURLs: netflixyoutubebrowser.duckdns.org
                Source: unknownDNS query: name: netflixyoutubebrowser.duckdns.org
                Source: global trafficTCP traffic: 192.168.2.9:49745 -> 69.61.84.227:34043
                Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                Source: Joe Sandbox ViewIP Address: 178.237.33.50 178.237.33.50
                Source: Joe Sandbox ViewASN Name: GLOBALCOMPASSUS GLOBALCOMPASSUS
                Source: Network trafficSuricata IDS: 2803304 - Severity 3 - ETPRO MALWARE Common Downloader Header Pattern HCa : 192.168.2.9:49758 -> 178.237.33.50:80
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: unknownUDP traffic detected without corresponding DNS query: 1.1.1.1
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B54EB5 InternetReadFile,InternetQueryDataAvailable,InternetReadFile,0_2_00B54EB5
                Source: global trafficHTTP traffic detected: GET /json.gp HTTP/1.1Host: geoplugin.netCache-Control: no-cache
                Source: svchost.exe, 0000000C.00000003.1590545977.0000000002B44000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: {le://192.168.2.1/all/install/setup.au3file:///C:/Windows/system32/oobe/FirstLogonAnim.htmlhttps://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com::MBI_SSL&response_type=token&display=windesktop&theme=win7&lc=2057&redirect_uri=https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srf?lc=1033https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srfhttps://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/loginBV equals www.facebook.com (Facebook)
                Source: svchost.exe, 0000000C.00000003.1590545977.0000000002B44000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: {le://192.168.2.1/all/install/setup.au3file:///C:/Windows/system32/oobe/FirstLogonAnim.htmlhttps://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com::MBI_SSL&response_type=token&display=windesktop&theme=win7&lc=2057&redirect_uri=https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srf?lc=1033https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srfhttps://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/loginBV equals www.yahoo.com (Yahoo)
                Source: svchost.exe, 00000003.00000002.3826301039.00000000055E0000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 0000000E.00000002.1573237444.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: Software\America Online\AOL Instant Messenger (TM)\CurrentVersion\Users%s\Loginprpl-msnprpl-yahooprpl-jabberprpl-novellprpl-oscarprpl-ggprpl-ircaccounts.xmlaimaim_1icqicq_1jabberjabber_1msnmsn_1yahoogggg_1http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com equals www.ebuddy.com (eBuggy)
                Source: bhv6B95.tmp.12.drString found in binary or memory: exp1.www.linkedin.com equals www.linkedin.com (Linkedin)
                Source: bhv6B95.tmp.12.drString found in binary or memory: exp2.www.linkedin.com equals www.linkedin.com (Linkedin)
                Source: bhv6B95.tmp.12.drString found in binary or memory: exp3.www.linkedin.com equals www.linkedin.com (Linkedin)
                Source: bhv6B95.tmp.12.drString found in binary or memory: exp4.www.linkedin.com equals www.linkedin.com (Linkedin)
                Source: bhv6B95.tmp.12.drString found in binary or memory: exp5.www.linkedin.com equals www.linkedin.com (Linkedin)
                Source: svchost.exe, 00000003.00000002.3826301039.00000000055E0000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 0000000E.00000002.1573237444.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com equals www.ebuddy.com (eBuggy)
                Source: bhv6B95.tmp.12.drString found in binary or memory: realtime.www.linkedin.com equals www.linkedin.com (Linkedin)
                Source: bhv6B95.tmp.12.drString found in binary or memory: www.linkedin.com equals www.linkedin.com (Linkedin)
                Source: bhv6B95.tmp.12.drString found in binary or memory: www.linkedin.com0 equals www.linkedin.com (Linkedin)
                Source: svchost.exe, 0000000C.00000003.1581687315.0000000002B3A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000C.00000003.1581174240.0000000002B44000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000C.00000003.1582333402.0000000002B32000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: {file://192.168.2.1/all/install/setup.au3file:///C:/Windows/system32/oobe/FirstLogonAnim.htmlhttps://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com::MBI_SSL&response_type=token&display=windesktop&theme=win7&lc=2057&redirect_uri=https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srf?lc=1033https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srfhttps://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/loginBV equals www.facebook.com (Facebook)
                Source: svchost.exe, 0000000C.00000003.1581687315.0000000002B3A000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000C.00000003.1581174240.0000000002B44000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000C.00000003.1582333402.0000000002B32000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: {file://192.168.2.1/all/install/setup.au3file:///C:/Windows/system32/oobe/FirstLogonAnim.htmlhttps://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com::MBI_SSL&response_type=token&display=windesktop&theme=win7&lc=2057&redirect_uri=https://login.live.com/oauth20_desktop.srf&lw=1&fl=wld2https://login.live.com/oauth20_authorize.srfhttps://login.live.com/oauth20_desktop.srf?lc=1033https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live.com/oauth20_desktop.srfhttps://login.live.com/oauth20_logout.srfhttps://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/loginBV equals www.yahoo.com (Yahoo)
                Source: svchost.exe, 00000003.00000002.3828499169.0000000005F60000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 0000000C.00000002.1590820618.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.facebook.com (Facebook)
                Source: svchost.exe, 00000003.00000002.3828499169.0000000005F60000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 0000000C.00000002.1590820618.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: ~@:9@0123456789ABCDEFURL index.datvisited:https://www.google.com/accounts/serviceloginhttp://www.facebook.com/https://login.yahoo.com/config/login$ equals www.yahoo.com (Yahoo)
                Source: global trafficDNS traffic detected: DNS query: netflixyoutubebrowser.duckdns.org
                Source: global trafficDNS traffic detected: DNS query: geoplugin.net
                Source: bhv6B95.tmp.12.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0
                Source: bhv6B95.tmp.12.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootCA.crt0B
                Source: bhv6B95.tmp.12.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0
                Source: bhv6B95.tmp.12.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG2.crt0B
                Source: bhv6B95.tmp.12.drString found in binary or memory: http://cacerts.digicert.com/DigiCertGlobalRootG3.crt0
                Source: bhv6B95.tmp.12.drString found in binary or memory: http://cacerts.digicert.com/DigiCertSHA2SecureServerCA-2.crt0
                Source: bhv6B95.tmp.12.drString found in binary or memory: http://cacerts.digicert.com/DigiCertTLSRSASHA2562020CA1-1.crt0
                Source: bhv6B95.tmp.12.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl07
                Source: bhv6B95.tmp.12.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootCA.crl0=
                Source: bhv6B95.tmp.12.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl0
                Source: bhv6B95.tmp.12.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG2.crl07
                Source: bhv6B95.tmp.12.drString found in binary or memory: http://crl3.digicert.com/DigiCertGlobalRootG3.crl07
                Source: bhv6B95.tmp.12.drString found in binary or memory: http://crl3.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0
                Source: bhv6B95.tmp.12.drString found in binary or memory: http://crl3.digicert.com/DigicertSHA2SecureServerCA-1.crl0?
                Source: bhv6B95.tmp.12.drString found in binary or memory: http://crl3.digicert.com/Omniroot2025.crl0
                Source: bhv6B95.tmp.12.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootCA.crl00
                Source: bhv6B95.tmp.12.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG2.crl0
                Source: bhv6B95.tmp.12.drString found in binary or memory: http://crl4.digicert.com/DigiCertGlobalRootG3.crl0
                Source: bhv6B95.tmp.12.drString found in binary or memory: http://crl4.digicert.com/DigiCertTLSRSASHA2562020CA1-4.crl0
                Source: bhv6B95.tmp.12.drString found in binary or memory: http://crl4.digicert.com/DigicertSHA2SecureServerCA-1.crl0
                Source: svchost.exe, 00000003.00000002.3825727194.000000000324C000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/
                Source: svchost.exeString found in binary or memory: http://geoplugin.net/json.gp
                Source: schoollike.exe, 00000002.00000002.1387521807.0000000000990000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.3823656144.0000000000400000.00000040.80000000.00040000.00000000.sdmp, schoollike.exe, 00000005.00000002.1491358992.0000000003D60000.00000004.00001000.00020000.00000000.sdmp, schoollike.exe, 00000007.00000002.1506183329.00000000035E0000.00000004.00001000.00020000.00000000.sdmp, svchost.exe, 00000008.00000002.1504738636.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gp/C
                Source: svchost.exe, 00000003.00000002.3825727194.0000000003230000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: http://geoplugin.net/json.gpSystem32
                Source: bhv6B95.tmp.12.drString found in binary or memory: http://ocsp.digicert.com0
                Source: bhv6B95.tmp.12.drString found in binary or memory: http://ocsp.digicert.com0:
                Source: bhv6B95.tmp.12.drString found in binary or memory: http://ocsp.digicert.com0H
                Source: bhv6B95.tmp.12.drString found in binary or memory: http://ocsp.digicert.com0I
                Source: bhv6B95.tmp.12.drString found in binary or memory: http://ocsp.msocsp.com0
                Source: bhv6B95.tmp.12.drString found in binary or memory: http://ocsp.msocsp.com0S
                Source: bhv6B95.tmp.12.drString found in binary or memory: http://www.digicert.com/CPS0
                Source: bhv6B95.tmp.12.drString found in binary or memory: http://www.digicert.com/CPS0~
                Source: svchost.exe, 00000003.00000002.3826301039.00000000055E0000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 0000000E.00000002.1573237444.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.ebuddy.com
                Source: svchost.exe, 00000003.00000002.3826301039.00000000055E0000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 0000000E.00000002.1573237444.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.com
                Source: svchost.exe, 00000003.00000002.3826301039.00000000055E0000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 0000000E.00000002.1573237444.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comhttp://www.ebuddy.comhttps://www.google.com
                Source: svchost.exe, 00000003.00000002.3826301039.00000000055E0000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 0000000E.00000002.1573237444.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.imvu.comr
                Source: svchost.exe, 0000000C.00000002.1590639389.0000000000174000.00000004.00000010.00020000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net
                Source: svchost.exe, 0000000E.00000002.1573237444.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: http://www.nirsoft.net/
                Source: bhv6B95.tmp.12.drString found in binary or memory: https://M365CDN.nel.measure.office.net/api/report?FrontEnd=VerizonCDNWorldWide&DesusertionEndpoint=P
                Source: bhv6B95.tmp.12.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingaot
                Source: bhv6B95.tmp.12.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingaotak
                Source: bhv6B95.tmp.12.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingrms
                Source: bhv6B95.tmp.12.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=bingth
                Source: bhv6B95.tmp.12.drString found in binary or memory: https://aefd.nelreports.net/api/report?cat=wsb
                Source: bhv6B95.tmp.12.drString found in binary or memory: https://api.msn.com/v1/News/Feed/Windows?apikey=qrUeHGGYvVowZJuHA3XaH0uUvg1ZJ0GUZnXk3mxxPF&ocid=wind
                Source: bhv6B95.tmp.12.drString found in binary or memory: https://assets.msn.com/weathermapdata/1/static/weather/Icons/JyNGQgA=/Condition/MostlyClearNight.svg
                Source: bhv6B95.tmp.12.drString found in binary or memory: https://config.edge.skype.com/config/v1/ODSP_Sync_Client/19.043.0304.0013?UpdateRing=Prod&OS=Win&OSV
                Source: bhv6B95.tmp.12.drString found in binary or memory: https://cxcs.microsoft.net/api/settings/en-GB/xml/settings-tipset?release=20h1&sku=Professional&plat
                Source: bhv6B95.tmp.12.drString found in binary or memory: https://deff.nelreports.net/api/report?cat=msn
                Source: bhv6B95.tmp.12.drString found in binary or memory: https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DesusertionEndpoint=Edge-Prod-LAX31r5b&
                Source: bhv6B95.tmp.12.drString found in binary or memory: https://ecs.nel.measure.office.net?TenantId=ODSP_Sync_Client&DesusertionEndpoint=Edge-Prod-LAX31r5c&
                Source: bhv6B95.tmp.12.drString found in binary or memory: https://edd27623571fc427dc1f8d6ba04dd39f.clo.footprintdns.com/apc/trans.gif?b37f6b94dfddf29d58d90046
                Source: bhv6B95.tmp.12.drString found in binary or memory: https://fp.msedge.net/conf/v2/asgw/fpconfig.min.json?monitorId=asgw
                Source: bhv6B95.tmp.12.drString found in binary or memory: https://login.live.com/oauth20_authorize.srf?client_id=00000000480728C5&scope=service::ssl.live.com:
                Source: bhv6B95.tmp.12.drString found in binary or memory: https://login.live.com/oauth20_desktop.srf?lc=1033
                Source: bhv6B95.tmp.12.drString found in binary or memory: https://login.live.com/oauth20_logout.srf?client_id=00000000480728C5&redirect_uri=https://login.live
                Source: svchost.exe, 0000000C.00000002.1591389630.0000000002B00000.00000004.00000020.00020000.00000000.sdmpString found in binary or memory: https://login.live.com/oauth20_logout.srfclient_iu#
                Source: bhv6B95.tmp.12.drString found in binary or memory: https://logincdn.msauth.net/16.000/Converged_v22057_4HqSCTf5FFStBMz0_eIqyA2.css
                Source: bhv6B95.tmp.12.drString found in binary or memory: https://logincdn.msauth.net/16.000/content/js/ConvergedLoginPaginatedStrings.en-gb_RP-iR89BipE4i7ZOq
                Source: bhv6B95.tmp.12.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/ConvergedLogin_PCore_tSc0Su-bb7Jt0QVuF6v9Cg2.js
                Source: bhv6B95.tmp.12.drString found in binary or memory: https://logincdn.msauth.net/shared/1.0/content/js/oneDs_f2e0f4a029670f10d892.js
                Source: bhv6B95.tmp.12.drString found in binary or memory: https://oneclient.sfx.ms/PreSignInSettings/Prod/2022-09-17-00-05-23/PreSignInSettingsConfig.json?One
                Source: bhv6B95.tmp.12.drString found in binary or memory: https://oneclient.sfx.ms/PreSignInSettings/Prod/2023-10-05-09-10-14/PreSignInSettingsConfig.json
                Source: bhv6B95.tmp.12.drString found in binary or memory: https://oneclient.sfx.ms/Win/Prod/21.220.1024.0005/update100.xml?OneDriveUpdate=6c2de995c290b031854b
                Source: bhv6B95.tmp.12.drString found in binary or memory: https://oneclient.sfx.ms/Win/Prod/741e3e8c607c445262f3add0e58b18f19e0502af.xml?OneDriveUpdate=eafda5
                Source: bhv6B95.tmp.12.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/ew-preload-inline-2523c8c1505f1172be19.js
                Source: bhv6B95.tmp.12.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/otel-logger-104bffe9378b8041455c.js
                Source: bhv6B95.tmp.12.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-35de8a913e.css
                Source: bhv6B95.tmp.12.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-async-styles.a903b7d0ab82e5bd2f8a.chunk.v7.css
                Source: bhv6B95.tmp.12.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bootstrap-5e7af218e953d095fabf.js
                Source: bhv6B95.tmp.12.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bundle-3a99f64809c6780df035.js
                Source: bhv6B95.tmp.12.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-bundle-994d8943fc9264e2f8d3.css
                Source: bhv6B95.tmp.12.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-fluent~left-nav-rc.ac5cfbeadfd63fc27ffd.chunk.v7.js
                Source: bhv6B95.tmp.12.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-forms-group~mru~officeforms-group-forms~officeforms
                Source: bhv6B95.tmp.12.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-left-nav-rc.68ab311bcca4f86f9ef5.chunk.v7.js
                Source: bhv6B95.tmp.12.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-mru.2ce72562ad7c0ae7059c.chunk.v7.js
                Source: bhv6B95.tmp.12.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendor-bundle-ba2888a24179bf152f3d.js
                Source: bhv6B95.tmp.12.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendors~left-nav-rc.169ce481376dceef3ef6.chunk.v7.c
                Source: bhv6B95.tmp.12.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwa-vendors~left-nav-rc.b24d6b48aeb44c7b5bf6.chunk.v7.j
                Source: bhv6B95.tmp.12.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/pwaunauth-9d8bc214ac.css
                Source: bhv6B95.tmp.12.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/sharedfontstyles-27fa2598d8.css
                Source: bhv6B95.tmp.12.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/sharedscripts-939520eada.js
                Source: bhv6B95.tmp.12.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/staticpwascripts-30998bff8f.js
                Source: bhv6B95.tmp.12.drString found in binary or memory: https://res.cdn.office.net/officehub/bundles/staticstylesfabric-35c34b95e3.css
                Source: bhv6B95.tmp.12.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/lockup-mslogo-color-78c06e8898.png
                Source: bhv6B95.tmp.12.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/microsoft-365-logo-01d5ecd01a.png
                Source: bhv6B95.tmp.12.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/unauth-apps-image-46596a6856.png
                Source: bhv6B95.tmp.12.drString found in binary or memory: https://res.cdn.office.net/officehub/images/content/images/unauth-checkmark-image-1999f0bf81.png
                Source: bhv6B95.tmp.12.drString found in binary or memory: https://res.cdn.office.net/officehub/versionless/webfonts/segoeui_regular.woff2
                Source: bhv6B95.tmp.12.drString found in binary or memory: https://res.cdn.office.net/officehub/versionless/webfonts/segoeui_semibold.woff2
                Source: bhv6B95.tmp.12.drString found in binary or memory: https://rum18.perf.linkedin.com/apc/trans.gif?481b7caa9fdb7105b2103a8300811877
                Source: bhv6B95.tmp.12.drString found in binary or memory: https://rum18.perf.linkedin.com/apc/trans.gif?d99a5c14daed171e4daf3a2c1226bd16
                Source: svchost.exe, 00000003.00000002.3826301039.00000000055E0000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 0000000E.00000002.1573237444.0000000000400000.00000040.80000000.00040000.00000000.sdmpString found in binary or memory: https://www.google.com
                Source: bhv6B95.tmp.12.drString found in binary or memory: https://www.office.com/

                Key, Mouse, Clipboard, Microphone and Screen Capturing

                barindex
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_004099E4 SetWindowsHookExA 0000000D,004099D0,000000003_2_004099E4
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B56B0C OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00B56B0C
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B56D07 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,0_2_00B56D07
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00BC6D07 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,_wcscpy,GlobalUnlock,OpenClipboard,EmptyClipboard,SetClipboardData,CloseClipboard,2_2_00BC6D07
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_004159C6 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,3_2_004159C6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_004159C6 OpenClipboard,EmptyClipboard,GlobalAlloc,GlobalLock,GlobalUnlock,SetClipboardData,CloseClipboard,OpenClipboard,GetClipboardData,GlobalLock,GlobalUnlock,CloseClipboard,8_2_004159C6
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B56B0C OpenClipboard,IsClipboardFormatAvailable,IsClipboardFormatAvailable,GetClipboardData,CloseClipboard,GlobalLock,CloseClipboard,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,GlobalUnlock,IsClipboardFormatAvailable,GetClipboardData,GlobalLock,DragQueryFileW,DragQueryFileW,DragQueryFileW,GlobalUnlock,CountClipboardFormats,CloseClipboard,0_2_00B56B0C
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B42B37 GetKeyboardState,GetAsyncKeyState,GetKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,GetAsyncKeyState,GetKeyState,0_2_00B42B37
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B6F7FF DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,0_2_00B6F7FF
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00BDF7FF DefDlgProcW,SendMessageW,GetWindowLongW,SendMessageW,SendMessageW,_wcsncpy,GetKeyState,GetKeyState,GetKeyState,SendMessageW,GetKeyState,SendMessageW,SendMessageW,SendMessageW,SendMessageW,ImageList_SetDragCursorImage,ImageList_BeginDrag,SetCapture,ClientToScreen,ImageList_DragEnter,InvalidateRect,ReleaseCapture,GetCursorPos,ScreenToClient,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,SendMessageW,GetCursorPos,ScreenToClient,GetParent,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,SendMessageW,SendMessageW,ClientToScreen,TrackPopupMenuEx,GetWindowLongW,2_2_00BDF7FF
                Source: Yara matchFile source: 7.2.schoollike.exe.35e0000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.schoollike.exe.3d60000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.schoollike.exe.990000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.schoollike.exe.35e0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.schoollike.exe.990000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.schoollike.exe.3d60000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000002.00000002.1387521807.0000000000990000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.1491358992.0000000003D60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.1504738636.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.1506183329.00000000035E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.3823656144.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: schoollike.exe PID: 7392, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 7432, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: schoollike.exe PID: 7580, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: schoollike.exe PID: 7604, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 7628, type: MEMORYSTR

                E-Banking Fraud

                barindex
                Source: Yara matchFile source: 7.2.schoollike.exe.35e0000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.schoollike.exe.3d60000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.schoollike.exe.990000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.schoollike.exe.35e0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.schoollike.exe.990000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.schoollike.exe.3d60000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000002.3825727194.0000000003230000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1387521807.0000000000990000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.1491358992.0000000003D60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.3825644686.0000000003200000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.1504738636.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.1506183329.00000000035E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.1505033984.0000000003000000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.3823656144.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.3825672554.0000000003212000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: schoollike.exe PID: 7392, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 7432, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: schoollike.exe PID: 7580, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: schoollike.exe PID: 7604, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 7628, type: MEMORYSTR

                Spam, unwanted Advertisements and Ransom Demands

                barindex
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0041BB77 SystemParametersInfoW,3_2_0041BB77
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0041BB77 SystemParametersInfoW,8_2_0041BB77

                System Summary

                barindex
                Source: 7.2.schoollike.exe.35e0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 7.2.schoollike.exe.35e0000.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 7.2.schoollike.exe.35e0000.1.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 8.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 8.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 8.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 3.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 3.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 3.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 8.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 8.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 8.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 5.2.schoollike.exe.3d60000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 5.2.schoollike.exe.3d60000.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 5.2.schoollike.exe.3d60000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 2.2.schoollike.exe.990000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 2.2.schoollike.exe.990000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 2.2.schoollike.exe.990000.0.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 7.2.schoollike.exe.35e0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 7.2.schoollike.exe.35e0000.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 7.2.schoollike.exe.35e0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 2.2.schoollike.exe.990000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 2.2.schoollike.exe.990000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 2.2.schoollike.exe.990000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 5.2.schoollike.exe.3d60000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 5.2.schoollike.exe.3d60000.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 5.2.schoollike.exe.3d60000.1.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 3.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 3.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 3.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 00000002.00000002.1387521807.0000000000990000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 00000002.00000002.1387521807.0000000000990000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 00000002.00000002.1387521807.0000000000990000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 00000005.00000002.1491358992.0000000003D60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 00000005.00000002.1491358992.0000000003D60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 00000005.00000002.1491358992.0000000003D60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 00000008.00000002.1504738636.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 00000008.00000002.1504738636.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 00000008.00000002.1504738636.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 00000007.00000002.1506183329.00000000035E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 00000007.00000002.1506183329.00000000035E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 00000007.00000002.1506183329.00000000035E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: 00000003.00000002.3823656144.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: 00000003.00000002.3823656144.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Author: unknown
                Source: 00000003.00000002.3823656144.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003) Author: ditekSHen
                Source: Process Memory Space: schoollike.exe PID: 7392, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: Process Memory Space: svchost.exe PID: 7432, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: Process Memory Space: schoollike.exe PID: 7580, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: Process Memory Space: schoollike.exe PID: 7604, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: Process Memory Space: svchost.exe PID: 7628, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 Author: unknown
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: This is a third-party compiled AutoIt script.0_2_00B03D19
                Source: RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                Source: RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe, 00000000.00000002.1374242912.0000000000BAE000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_e2950e05-1
                Source: RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe, 00000000.00000002.1374242912.0000000000BAE000.00000002.00000001.01000000.00000003.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_df38d542-8
                Source: RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe, 00000000.00000003.1371420320.00000000039AD000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_0223b75d-c
                Source: RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe, 00000000.00000003.1371420320.00000000039AD000.00000004.00001000.00020000.00000000.sdmpString found in binary or memory: CSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_fb7a09f1-4
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: This is a third-party compiled AutoIt script.2_2_00B73D19
                Source: schoollike.exeString found in binary or memory: This is a third-party compiled AutoIt script.
                Source: schoollike.exe, 00000002.00000000.1371725260.0000000000C1E000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_30cb1e68-2
                Source: schoollike.exe, 00000002.00000000.1371725260.0000000000C1E000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_3b7980e3-3
                Source: schoollike.exe, 00000005.00000002.1490413720.0000000000C1E000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_8839cc64-b
                Source: schoollike.exe, 00000005.00000002.1490413720.0000000000C1E000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_ef8987e7-c
                Source: schoollike.exe, 00000007.00000002.1505619498.0000000000C1E000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: This is a third-party compiled AutoIt script.memstr_439b5e7d-d
                Source: schoollike.exe, 00000007.00000002.1505619498.0000000000C1E000.00000002.00000001.01000000.00000004.sdmpString found in binary or memory: SDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_f05db03c-d
                Source: RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeString found in binary or memory: This is a third-party compiled AutoIt script.memstr_468d4966-b
                Source: RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeString found in binary or memory: CSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_56713dca-b
                Source: schoollike.exe.0.drString found in binary or memory: This is a third-party compiled AutoIt script.memstr_a84553d7-f
                Source: schoollike.exe.0.drString found in binary or memory: CSDSOFTWARE\Classes\\CLSID\\\IPC$This is a third-party compiled AutoIt script."runasError allocating memory.SeAssignPrimaryTokenPrivilegeSeIncreaseQuotaPrivilegeSeBackupPrivilegeSeRestorePrivilegewinsta0defaultwinsta0\defaultComboBoxListBox|SHELLDLL_DefViewlargeiconsdetailssmalliconslistCLASSCLASSNNREGEXPCLASSIDNAMEXYWHINSTANCETEXT%s%u%s%dLAST[LASTACTIVE[ACTIVEHANDLE=[HANDLE:REGEXP=[REGEXPTITLE:CLASSNAME=[CLASS:ALL[ALL]HANDLEREGEXPTITLETITLEThumbnailClassAutoIt3GUIContainermemstr_288ce56b-3
                Source: initial sampleStatic PE information: Filename: RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe
                Source: initial sampleStatic PE information: Filename: RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe
                Source: C:\Windows\System32\wscript.exeCOM Object queried: Windows Script Host Shell Object HKEY_LOCAL_MACHINE\SOFTWARE\Classes\CLSID\{72C24DD5-D70A-438B-8A42-98424B88AFB8}Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00417245 GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,CreateProcessW,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,NtCreateSection,NtUnmapViewOfSection,NtMapViewOfSection,VirtualFree,NtClose,TerminateProcess,GetCurrentProcess,NtMapViewOfSection,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,VirtualFree,GetCurrentProcess,NtUnmapViewOfSection,NtClose,TerminateProcess,GetLastError,3_2_00417245
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0041ACC1 OpenProcess,NtSuspendProcess,CloseHandle,3_2_0041ACC1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0041ACED OpenProcess,NtResumeProcess,CloseHandle,3_2_0041ACED
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B46685: CreateFileW,DeviceIoControl,CloseHandle,0_2_00B46685
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B3ACC5 _memset,DuplicateTokenEx,CloseHandle,OpenWindowStationW,GetProcessWindowStation,SetProcessWindowStation,OpenDesktopW,_wcscpy,LoadUserProfileW,CreateEnvironmentBlock,CreateProcessAsUserW,UnloadUserProfile,CloseWindowStation,CloseDesktop,SetProcessWindowStation,CloseHandle,DestroyEnvironmentBlock,0_2_00B3ACC5
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B479D3 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,0_2_00B479D3
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00BB79D3 ExitWindowsEx,InitiateSystemShutdownExW,SetSystemPowerState,2_2_00BB79D3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_004158B9 ExitWindowsEx,LoadLibraryA,GetProcAddress,3_2_004158B9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_004158B9 ExitWindowsEx,LoadLibraryA,GetProcAddress,8_2_004158B9
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B2B0430_2_00B2B043
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B132000_2_00B13200
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B3410F0_2_00B3410F
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B202A40_2_00B202A4
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B0E3B00_2_00B0E3B0
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B3038E0_2_00B3038E
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B206D90_2_00B206D9
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B3467F0_2_00B3467F
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B6AACE0_2_00B6AACE
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B34BEF0_2_00B34BEF
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B2CCC10_2_00B2CCC1
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B06F070_2_00B06F07
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B0AF500_2_00B0AF50
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B631BC0_2_00B631BC
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B2D1B90_2_00B2D1B9
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B1B11F0_2_00B1B11F
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B2123A0_2_00B2123A
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B3724D0_2_00B3724D
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B093F00_2_00B093F0
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B413CA0_2_00B413CA
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B1F5630_2_00B1F563
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B096C00_2_00B096C0
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B4B6CC0_2_00B4B6CC
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B077B00_2_00B077B0
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B6F7FF0_2_00B6F7FF
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B379C90_2_00B379C9
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B1FA570_2_00B1FA57
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B13B700_2_00B13B70
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B09B600_2_00B09B60
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B07D190_2_00B07D19
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B29ED00_2_00B29ED0
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B1FE6F0_2_00B1FE6F
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B07FA30_2_00B07FA3
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_012493A00_2_012493A0
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00B9B0432_2_00B9B043
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00B832002_2_00B83200
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00BA410F2_2_00BA410F
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00B902A42_2_00B902A4
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00B7E3B02_2_00B7E3B0
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00BA038E2_2_00BA038E
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00B906D92_2_00B906D9
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00BA467F2_2_00BA467F
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00BDAACE2_2_00BDAACE
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00BA4BEF2_2_00BA4BEF
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00B9CCC12_2_00B9CCC1
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00B76F072_2_00B76F07
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00B7AF502_2_00B7AF50
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00B9D1B92_2_00B9D1B9
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00BD31BC2_2_00BD31BC
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00B8B11F2_2_00B8B11F
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00B9123A2_2_00B9123A
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00BA724D2_2_00BA724D
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00B793F02_2_00B793F0
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00BB13CA2_2_00BB13CA
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00B8F5632_2_00B8F563
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00B796C02_2_00B796C0
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00BBB6CC2_2_00BBB6CC
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00B777B02_2_00B777B0
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00BDF7FF2_2_00BDF7FF
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00BA79C92_2_00BA79C9
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00B8FA572_2_00B8FA57
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00B83B702_2_00B83B70
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00B79B602_2_00B79B60
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00B77D192_2_00B77D19
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00B99ED02_2_00B99ED0
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00B8FE6F2_2_00B8FE6F
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00B77FA32_2_00B77FA3
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00D1A5E82_2_00D1A5E8
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0041D0713_2_0041D071
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_004520D23_2_004520D2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0043D0983_2_0043D098
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_004371503_2_00437150
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_004361AA3_2_004361AA
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_004262543_2_00426254
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_004313773_2_00431377
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0043651C3_2_0043651C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0041E5DF3_2_0041E5DF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0044C7393_2_0044C739
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_004367C63_2_004367C6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_004267CB3_2_004267CB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0043C9DD3_2_0043C9DD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00432A493_2_00432A49
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00436A8D3_2_00436A8D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0043CC0C3_2_0043CC0C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00436D483_2_00436D48
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00434D223_2_00434D22
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00426E733_2_00426E73
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00440E203_2_00440E20
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0043CE3B3_2_0043CE3B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00412F453_2_00412F45
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00452F003_2_00452F00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00426FAD3_2_00426FAD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_100171943_2_10017194
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_1000B5C13_2_1000B5C1
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 5_2_015D35F85_2_015D35F8
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 7_2_00D53C307_2_00D53C30
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0041D0718_2_0041D071
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_004520D28_2_004520D2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0043D0988_2_0043D098
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_004371508_2_00437150
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_004361AA8_2_004361AA
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_004262548_2_00426254
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_004313778_2_00431377
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0043651C8_2_0043651C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0041E5DF8_2_0041E5DF
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0044C7398_2_0044C739
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_004367C68_2_004367C6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_004267CB8_2_004267CB
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0043C9DD8_2_0043C9DD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00432A498_2_00432A49
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00436A8D8_2_00436A8D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0043CC0C8_2_0043CC0C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00436D488_2_00436D48
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00434D228_2_00434D22
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00426E738_2_00426E73
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00440E208_2_00440E20
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0043CE3B8_2_0043CE3B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00412F458_2_00412F45
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00452F008_2_00452F00
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00426FAD8_2_00426FAD
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: String function: 00B96AC0 appears 42 times
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: String function: 00B8EC2F appears 68 times
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: String function: 00B9F8A0 appears 35 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 00444B14 appears 56 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 00404C9E appears 32 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 004020E7 appears 79 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 00401E8F appears 37 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 00401D64 appears 43 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 00447174 appears 36 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 004040BB appears 36 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 00401F66 appears 100 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 00410D8D appears 36 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 004338A5 appears 82 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 00401FAA appears 42 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 00403B40 appears 44 times
                Source: C:\Windows\SysWOW64\svchost.exeCode function: String function: 00433FB0 appears 110 times
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: String function: 00B26AC0 appears 42 times
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: String function: 00B2F8A0 appears 35 times
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: String function: 00B1EC2F appears 68 times
                Source: RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeStatic PE information: EXECUTABLE_IMAGE, LARGE_ADDRESS_AWARE, 32BIT_MACHINE
                Source: 7.2.schoollike.exe.35e0000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 7.2.schoollike.exe.35e0000.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 7.2.schoollike.exe.35e0000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 8.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 8.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 8.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 3.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 3.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 3.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 8.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 8.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 8.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 5.2.schoollike.exe.3d60000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 5.2.schoollike.exe.3d60000.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 5.2.schoollike.exe.3d60000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 2.2.schoollike.exe.990000.0.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 2.2.schoollike.exe.990000.0.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 2.2.schoollike.exe.990000.0.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 7.2.schoollike.exe.35e0000.1.raw.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 7.2.schoollike.exe.35e0000.1.raw.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 7.2.schoollike.exe.35e0000.1.raw.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 2.2.schoollike.exe.990000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 2.2.schoollike.exe.990000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 2.2.schoollike.exe.990000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 5.2.schoollike.exe.3d60000.1.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 5.2.schoollike.exe.3d60000.1.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 5.2.schoollike.exe.3d60000.1.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 3.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 3.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 3.2.svchost.exe.400000.0.unpack, type: UNPACKEDPEMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 00000002.00000002.1387521807.0000000000990000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 00000002.00000002.1387521807.0000000000990000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 00000002.00000002.1387521807.0000000000990000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 00000005.00000002.1491358992.0000000003D60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 00000005.00000002.1491358992.0000000003D60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 00000005.00000002.1491358992.0000000003D60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 00000008.00000002.1504738636.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 00000008.00000002.1504738636.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 00000008.00000002.1504738636.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 00000007.00000002.1506183329.00000000035E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 00000007.00000002.1506183329.00000000035E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 00000007.00000002.1506183329.00000000035E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: 00000003.00000002.3823656144.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: 00000003.00000002.3823656144.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: REMCOS_RAT_variants Description = Detects multiple variants of REMCOS seen in the wild. Created by modifying and combining several of Florian\'s recent REMCOS ruleset. This rule aims for broader detection than the original ruleset, which used separate rules for each variant. If you do decide to break it into individual rules, the YARA strings variable names are grouped by the REMCOS variant type., Website = https://www.deadbits.org, Date = 2019-07-18, Repo = https://github.com/deadbits/yara-rules, Author = Adam M. Swanda
                Source: 00000003.00000002.3823656144.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORYMatched rule: INDICATOR_SUSPICIOUS_EXE_UACBypass_CMSTPCOM author = ditekSHen, description = Detects Windows exceutables bypassing UAC using CMSTP COM interfaces. MITRE (T1218.003)
                Source: Process Memory Space: schoollike.exe PID: 7392, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: Process Memory Space: svchost.exe PID: 7432, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: Process Memory Space: schoollike.exe PID: 7580, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: Process Memory Space: schoollike.exe PID: 7604, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: Process Memory Space: svchost.exe PID: 7628, type: MEMORYSTRMatched rule: Windows_Trojan_Remcos_b296e965 reference_sample = 0ebeffa44bd1c3603e30688ace84ea638fbcf485ca55ddcfd6fbe90609d4f3ed, os = windows, severity = x86, creation_date = 2021-06-10, scan_context = file, memory, license = Elastic License v2, threat_name = Windows.Trojan.Remcos, fingerprint = a5267bc2dee28a3ef58beeb7e4a151699e3e561c16ce0ab9eb27de33c122664d, id = b296e965-a99e-4446-b969-ba233a2a8af4, last_modified = 2021-08-23
                Source: schoollike.exe, 00000002.00000002.1387760894.0000000000CDE000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: ;.VBp
                Source: classification engineClassification label: mal100.rans.phis.troj.spyw.expl.evad.winEXE@22/10@9/2
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B4CE7A GetLastError,FormatMessageW,0_2_00B4CE7A
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B3AB84 AdjustTokenPrivileges,CloseHandle,0_2_00B3AB84
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B3B134 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,0_2_00B3B134
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00BAAB84 AdjustTokenPrivileges,CloseHandle,2_2_00BAAB84
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00BAB134 LookupPrivilegeValueW,AdjustTokenPrivileges,GetLastError,2_2_00BAB134
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00416AB7 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,3_2_00416AB7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00416AB7 GetCurrentProcess,OpenProcessToken,LookupPrivilegeValueA,AdjustTokenPrivileges,GetLastError,8_2_00416AB7
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B4E1FD SetErrorMode,GetDiskFreeSpaceExW,SetErrorMode,0_2_00B4E1FD
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B46532 CreateToolhelp32Snapshot,Process32FirstW,Process32NextW,__wsplitpath,_wcscat,CloseHandle,0_2_00B46532
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B5C18C CoInitializeSecurity,_memset,_memset,CoCreateInstanceEx,CoTaskMemFree,CoSetProxyBlanket,0_2_00B5C18C
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B0406B CreateStreamOnHGlobal,FindResourceExW,LoadResource,SizeofResource,LockResource,0_2_00B0406B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00419BC4 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,3_2_00419BC4
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeFile created: C:\Users\user\AppData\Local\penstocksJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeMutant created: \Sessions\1\BaseNamedObjects\Rmc-CDDRK8
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeFile created: C:\Users\user\AppData\Local\Temp\aut1AC6.tmpJump to behavior
                Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\schoollike.vbs"
                Source: RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeStatic PE information: Section: .text IMAGE_SCN_CNT_CODE, IMAGE_SCN_MEM_EXECUTE, IMAGE_SCN_MEM_READ
                Source: C:\Windows\SysWOW64\svchost.exeSystem information queried: HandleInformationJump to behavior
                Source: C:\Windows\System32\wscript.exeFile read: C:\Users\user\Desktop\desktop.iniJump to behavior
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeKey opened: HKEY_CURRENT_USER\Software\Policies\Microsoft\Windows\Safer\CodeIdentifiersJump to behavior
                Source: svchost.exe, 00000003.00000002.3828499169.0000000005F60000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 0000000C.00000002.1590820618.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name=='sqlite_sequence';
                Source: svchost.exe, 00000003.00000002.3828499169.0000000005F60000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 00000003.00000002.3830651470.0000000006600000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 0000000C.00000002.1590820618.0000000000400000.00000040.80000000.00040000.00000000.sdmp, svchost.exe, 0000000D.00000002.1570199633.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: INSERT INTO %Q.%s VALUES('index',%Q,%Q,#%d,%Q);
                Source: svchost.exe, 00000003.00000002.3828499169.0000000005F60000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 0000000C.00000002.1590820618.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE %Q.%s SET sql = CASE WHEN type = 'trigger' THEN sqlite_rename_trigger(sql, %Q)ELSE sqlite_rename_table(sql, %Q) END, tbl_name = %Q, name = CASE WHEN type='table' THEN %Q WHEN name LIKE 'sqlite_autoindex%%' AND type='index' THEN 'sqlite_autoindex_' || %Q || substr(name,%d+18) ELSE name END WHERE tbl_name=%Q AND (type='table' OR type='index' OR type='trigger');
                Source: svchost.exe, 00000003.00000002.3828499169.0000000005F60000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 0000000C.00000002.1590820618.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'INSERT INTO vacuum_db.' || quote(name) || ' SELECT * FROM main.' || quote(name) || ';'FROM main.sqlite_master WHERE type = 'table' AND name!='sqlite_sequence' AND rootpage>0
                Source: svchost.exe, 00000003.00000002.3828499169.0000000005F60000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 0000000C.00000002.1590820618.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE "%w".%s SET sql = sqlite_rename_parent(sql, %Q, %Q) WHERE %s;
                Source: svchost.exe, 00000003.00000002.3828499169.0000000005F60000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 0000000C.00000002.1590820618.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: UPDATE sqlite_temp_master SET sql = sqlite_rename_trigger(sql, %Q), tbl_name = %Q WHERE %s;
                Source: svchost.exe, 0000000C.00000003.1590523594.0000000002B2E000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 0000000C.00000003.1590454839.0000000002B2E000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: CREATE TABLE password_notes (id INTEGER PRIMARY KEY AUTOINCREMENT, parent_id INTEGER NOT NULL REFERENCES logins ON UPDATE CASCADE ON DELETE CASCADE DEFERRABLE INITIALLY DEFERRED, key VARCHAR NOT NULL, value BLOB, date_created INTEGER NOT NULL, confidential INTEGER, UNIQUE (parent_id, key));
                Source: svchost.exe, 00000003.00000002.3828499169.0000000005F60000.00000040.10000000.00040000.00000000.sdmp, svchost.exe, 0000000C.00000002.1590820618.0000000000400000.00000040.80000000.00040000.00000000.sdmpBinary or memory string: SELECT 'DELETE FROM vacuum_db.' || quote(name) || ';' FROM vacuum_db.sqlite_master WHERE name='sqlite_sequence'
                Source: RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeReversingLabs: Detection: 47%
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeFile read: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeJump to behavior
                Source: unknownProcess created: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe "C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe"
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeProcess created: C:\Users\user\AppData\Local\penstocks\schoollike.exe "C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe"
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe"
                Source: unknownProcess created: C:\Windows\System32\wscript.exe "C:\Windows\System32\WScript.exe" "C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\schoollike.vbs"
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\penstocks\schoollike.exe "C:\Users\user\AppData\Local\penstocks\schoollike.exe"
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\AppData\Local\penstocks\schoollike.exe"
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeProcess created: C:\Users\user\AppData\Local\penstocks\schoollike.exe "C:\Users\user\AppData\Local\penstocks\schoollike.exe"
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\AppData\Local\penstocks\schoollike.exe"
                Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\user\AppData\Local\Temp\mtmppeccgqygscehvklzfdreddodq"
                Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\user\AppData\Local\Temp\mtmppeccgqygscehvklzfdreddodq"
                Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\user\AppData\Local\Temp\wnsiqxnvuzqluislmugbiidvdjfejiom"
                Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\user\AppData\Local\Temp\ypxsq"
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeProcess created: C:\Users\user\AppData\Local\penstocks\schoollike.exe "C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe"Jump to behavior
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\user\AppData\Local\Temp\mtmppeccgqygscehvklzfdreddodq"Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\user\AppData\Local\Temp\mtmppeccgqygscehvklzfdreddodq"Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\user\AppData\Local\Temp\wnsiqxnvuzqluislmugbiidvdjfejiom"Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\user\AppData\Local\Temp\ypxsq"Jump to behavior
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\penstocks\schoollike.exe "C:\Users\user\AppData\Local\penstocks\schoollike.exe" Jump to behavior
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\AppData\Local\penstocks\schoollike.exe" Jump to behavior
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeProcess created: C:\Users\user\AppData\Local\penstocks\schoollike.exe "C:\Users\user\AppData\Local\penstocks\schoollike.exe"Jump to behavior
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\AppData\Local\penstocks\schoollike.exe"Jump to behavior
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeSection loaded: apphelp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: mswsock.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: dnsapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: rasadhlp.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: fwpuclnt.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: ondemandconnroutehelper.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: winhttp.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: winnsi.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: sxs.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: vbscript.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: amsi.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: profapi.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: msisip.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: wshext.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: scrobj.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: mlang.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: scrrun.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: propsys.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: edputil.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: windows.staterepositoryps.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: appresolver.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: bcp47langs.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: slc.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: sppc.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: onecorecommonproxystub.dllJump to behavior
                Source: C:\Windows\System32\wscript.exeSection loaded: onecoreuapcommonproxystub.dllJump to behavior
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeSection loaded: wsock32.dllJump to behavior
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeSection loaded: version.dllJump to behavior
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeSection loaded: mpr.dllJump to behavior
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeSection loaded: userenv.dllJump to behavior
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeSection loaded: uxtheme.dllJump to behavior
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: winmm.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: urlmon.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: iertutil.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: srvcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: netutils.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: iphlpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: kernel.appcore.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: version.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wininet.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: pstorec.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: vaultcli.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wintypes.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: dpapi.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: pstorec.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: windows.storage.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: wldp.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: msasn1.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: sspicli.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: cryptsp.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: rsaenh.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: cryptbase.dllJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Classes\WOW6432Node\CLSID\{0358b920-0ac7-461f-98f4-58e32cd89148}\InProcServer32Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
                Source: RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeStatic file information: File size 1332736 > 1048576
                Source: RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IMPORT
                Source: RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_RESOURCE
                Source: RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_BASERELOC
                Source: RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG
                Source: RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_IAT
                Source: RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeStatic PE information: data directory type: IMAGE_DIRECTORY_ENTRY_DEBUG
                Source: Binary string: wntdll.pdbUGP source: schoollike.exe, 00000002.00000003.1383238319.00000000033B0000.00000004.00001000.00020000.00000000.sdmp, schoollike.exe, 00000002.00000003.1386267418.00000000035D0000.00000004.00001000.00020000.00000000.sdmp, schoollike.exe, 00000005.00000003.1488942455.0000000003DE0000.00000004.00001000.00020000.00000000.sdmp, schoollike.exe, 00000005.00000003.1489177148.0000000003F80000.00000004.00001000.00020000.00000000.sdmp, schoollike.exe, 00000007.00000003.1501252966.0000000003800000.00000004.00001000.00020000.00000000.sdmp, schoollike.exe, 00000007.00000003.1504588535.00000000036E0000.00000004.00001000.00020000.00000000.sdmp
                Source: Binary string: wntdll.pdb source: schoollike.exe, 00000002.00000003.1383238319.00000000033B0000.00000004.00001000.00020000.00000000.sdmp, schoollike.exe, 00000002.00000003.1386267418.00000000035D0000.00000004.00001000.00020000.00000000.sdmp, schoollike.exe, 00000005.00000003.1488942455.0000000003DE0000.00000004.00001000.00020000.00000000.sdmp, schoollike.exe, 00000005.00000003.1489177148.0000000003F80000.00000004.00001000.00020000.00000000.sdmp, schoollike.exe, 00000007.00000003.1501252966.0000000003800000.00000004.00001000.00020000.00000000.sdmp, schoollike.exe, 00000007.00000003.1504588535.00000000036E0000.00000004.00001000.00020000.00000000.sdmp
                Source: RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IMPORT is in: .rdata
                Source: RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_RESOURCE is in: .rsrc
                Source: RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_BASERELOC is in: .reloc
                Source: RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_LOAD_CONFIG is in: .rdata
                Source: RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeStatic PE information: Data directory: IMAGE_DIRECTORY_ENTRY_IAT is in: .rdata
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B1E01E LoadLibraryA,GetProcAddress,0_2_00B1E01E
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B26B05 push ecx; ret 0_2_00B26B18
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00BDC295 push ss; ret 2_2_00BDC29D
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00BDC2CE push ss; ret 2_2_00BDC2D6
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00BDC230 push ss; ret 2_2_00BDC231
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00BDC26B push ss; ret 2_2_00BDC26D
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00B96B05 push ecx; ret 2_2_00B96B18
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00BDBDFE push ss; ret 2_2_00BDBE00
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00BDBDEA push ss; ret 2_2_00BDBDEB
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00BDBD75 push ss; ret 2_2_00BDBD7A
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00BDBD69 push ss; ret 2_2_00BDBD6A
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00BDBD52 push ss; ret 2_2_00BDBD53
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00BDBE1E push ss; ret 2_2_00BDBE26
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00BDBFDD push ss; ret 2_2_00BDBFDF
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00BDBF30 push ss; ret 2_2_00BDBF32
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00BDBF73 push ss; ret 2_2_00BDBF7B
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00BDBF55 push ss; ret 2_2_00BDBF57
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00BDBF45 push ss; ret 2_2_00BDBF46
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_004567E0 push eax; ret 3_2_004567FE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0045B9DD push esi; ret 3_2_0045B9E6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00463EF3 push ds; retf 3_2_00463EEC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00455EAF push ecx; ret 3_2_00455EC2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00433FF6 push ecx; ret 3_2_00434009
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_10002806 push ecx; ret 3_2_10002819
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 5_2_015D3815 push edi; retf 5_2_015D3820
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 7_2_00D53E4D push edi; retf 7_2_00D53E58
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_004567E0 push eax; ret 8_2_004567FE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0045B9DD push esi; ret 8_2_0045B9E6
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00463EF3 push ds; retf 8_2_00463EEC
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00455EAF push ecx; ret 8_2_00455EC2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00433FF6 push ecx; ret 8_2_00434009
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00406128 ShellExecuteW,URLDownloadToFileW,3_2_00406128
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeFile created: C:\Users\user\AppData\Local\penstocks\schoollike.exeJump to dropped file

                Boot Survival

                barindex
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\schoollike.vbsJump to dropped file
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\schoollike.vbsJump to behavior
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeFile created: C:\Users\user\AppData\Roaming\Microsoft\Windows\Start Menu\Programs\Startup\schoollike.vbsJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00419BC4 OpenSCManagerW,OpenServiceW,CloseServiceHandle,StartServiceW,CloseServiceHandle,CloseServiceHandle,CloseServiceHandle,3_2_00419BC4
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B68111 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,0_2_00B68111
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B1EB42 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,0_2_00B1EB42
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00BD8111 IsWindowVisible,IsWindowEnabled,GetForegroundWindow,IsIconic,IsZoomed,2_2_00BD8111
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00B8EB42 GetForegroundWindow,FindWindowW,IsIconic,ShowWindow,SetForegroundWindow,GetWindowThreadProcessId,GetWindowThreadProcessId,GetCurrentThreadId,GetWindowThreadProcessId,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,SetForegroundWindow,MapVirtualKeyW,MapVirtualKeyW,keybd_event,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,MapVirtualKeyW,keybd_event,SetForegroundWindow,AttachThreadInput,AttachThreadInput,AttachThreadInput,AttachThreadInput,2_2_00B8EB42
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B2123A __initp_misc_winsig,GetModuleHandleW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,0_2_00B2123A
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\System32\wscript.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeProcess information set: NOOPENFILEERRORBOXJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess information set: NOOPENFILEERRORBOXJump to behavior

                Malware Analysis System Evasion

                barindex
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0040E54F Sleep,ExitProcess,3_2_0040E54F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0040E54F Sleep,ExitProcess,8_2_0040E54F
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeAPI/Special instruction interceptor: Address: D1A20C
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeAPI/Special instruction interceptor: Address: 15D321C
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeAPI/Special instruction interceptor: Address: D53854
                Source: C:\Windows\SysWOW64\svchost.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,3_2_004198C2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: OpenSCManagerA,EnumServicesStatusW,GetLastError,EnumServicesStatusW,OpenServiceW,QueryServiceConfigW,GetLastError,QueryServiceConfigW,CloseServiceHandle,CloseServiceHandle,8_2_004198C2
                Source: C:\Windows\System32\wscript.exeWindow found: window name: WSH-TimerJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeWindow / User API: threadDelayed 1616Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeWindow / User API: threadDelayed 8360Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeDecision node followed by non-executed suspicious API: DecisionNode, Non Executed (send or recv or WinExec)
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeEvaded block: after key decisiongraph_0-95663
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeEvaded block: after key decision
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeAPI coverage: 4.6 %
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeAPI coverage: 4.9 %
                Source: C:\Windows\SysWOW64\svchost.exeAPI coverage: 5.0 %
                Source: C:\Windows\SysWOW64\svchost.exe TID: 7452Thread sleep count: 1616 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exe TID: 7452Thread sleep time: -4848000s >= -30000sJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exe TID: 7452Thread sleep count: 8360 > 30Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exe TID: 7452Thread sleep time: -25080000s >= -30000sJump to behavior
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B46CA9 GetFileAttributesW,FindFirstFileW,FindClose,0_2_00B46CA9
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B460DD _wcscat,_wcscat,__wsplitpath,FindFirstFileW,DeleteFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindNextFileW,FindClose,FindClose,0_2_00B460DD
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B463F9 _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,0_2_00B463F9
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B4EB60 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00B4EB60
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B4F5FA FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,0_2_00B4F5FA
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B4F56F FindFirstFileW,FindClose,0_2_00B4F56F
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B51B2F SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00B51B2F
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B51C8A SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,0_2_00B51C8A
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B51F94 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,0_2_00B51F94
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00BB6CA9 GetFileAttributesW,FindFirstFileW,FindClose,2_2_00BB6CA9
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00BB60DD _wcscat,_wcscat,__wsplitpath,FindFirstFileW,DeleteFileW,_wcscpy,_wcscat,_wcscat,lstrcmpiW,DeleteFileW,MoveFileW,MoveFileW,CopyFileW,DeleteFileW,CopyFileW,FindNextFileW,FindClose,FindClose,2_2_00BB60DD
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00BB63F9 _wcscat,__wsplitpath,FindFirstFileW,_wcscpy,_wcscat,_wcscat,DeleteFileW,FindNextFileW,FindClose,2_2_00BB63F9
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00BBEB60 FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,2_2_00BBEB60
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00BBF5FA FindFirstFileW,FindClose,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToLocalFileTime,FileTimeToSystemTime,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,__swprintf,2_2_00BBF5FA
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00BBF56F FindFirstFileW,FindClose,2_2_00BBF56F
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00BC1B2F SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,GetFileAttributesW,SetFileAttributesW,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,2_2_00BC1B2F
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00BC1C8A SetCurrentDirectoryW,FindFirstFileW,FindFirstFileW,_wcscmp,_wcscmp,FindNextFileW,FindClose,FindFirstFileW,SetCurrentDirectoryW,_wcscmp,_wcscmp,SetCurrentDirectoryW,SetCurrentDirectoryW,FindNextFileW,FindClose,FindClose,2_2_00BC1C8A
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00BC1F94 FindFirstFileW,Sleep,_wcscmp,_wcscmp,FindNextFileW,FindClose,2_2_00BC1F94
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0040B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,3_2_0040B335
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0041B42F FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,3_2_0041B42F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0040B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,3_2_0040B53A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0044D5E9 FindFirstFileExA,3_2_0044D5E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_004089A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8,3_2_004089A9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00406AC2 FindFirstFileW,FindNextFileW,3_2_00406AC2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00407A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,3_2_00407A8C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00418C69 FindFirstFileW,FindNextFileW,FindNextFileW,3_2_00418C69
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00408DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,3_2_00408DA7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_100010F1 lstrlenW,lstrlenW,lstrcatW,lstrlenW,lstrlenW,lstrlenW,FindFirstFileW,FindNextFileW,FindClose,3_2_100010F1
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_10006580 FindFirstFileExA,3_2_10006580
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0040B335 FindFirstFileA,FindClose,DeleteFileA,GetLastError,DeleteFileA,GetLastError,FindNextFileA,FindClose,8_2_0040B335
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0041B42F FindFirstFileW,FindNextFileW,RemoveDirectoryW,SetFileAttributesW,DeleteFileW,FindClose,RemoveDirectoryW,GetLastError,FindClose,8_2_0041B42F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0040B53A FindFirstFileA,FindClose,DeleteFileA,GetLastError,FindNextFileA,FindClose,FindClose,8_2_0040B53A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0044D5E9 FindFirstFileExA,8_2_0044D5E9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_004089A9 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,FindClose,__CxxThrowException@8,8_2_004089A9
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00406AC2 FindFirstFileW,FindNextFileW,8_2_00406AC2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00407A8C __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,__CxxThrowException@8,8_2_00407A8C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00418C69 FindFirstFileW,FindNextFileW,FindNextFileW,8_2_00418C69
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00408DA7 __EH_prolog,FindFirstFileW,FindNextFileW,FindClose,8_2_00408DA7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00406F06 SetEvent,GetFileAttributesW,DeleteFileW,ShellExecuteW,GetLogicalDriveStringsA,SetFileAttributesW,DeleteFileA,Sleep,StrToIntA,CreateDirectoryW,3_2_00406F06
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B1DDC0 GetVersionExW,GetCurrentProcess,FreeLibrary,GetNativeSystemInfo,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00B1DDC0
                Source: svchost.exe, 00000003.00000002.3825727194.000000000324C000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW
                Source: bhv6B95.tmp.12.drBinary or memory string: https://r.bing.com/rb/18/jnc,nj/6hU_LneafI_NFLeDvM367ebFaKQ.js?bu=Dx0ma3d6fXRucbIBtQEmpQEmuAE&or=w
                Source: svchost.exe, 00000003.00000002.3825672554.0000000003212000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Hyper-V RAW(
                Source: wscript.exe, 00000004.00000002.1480229045.000001A6F5D25000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: \??\SCSI#CdRom&Ven_NECVMWar&Prod_VMware_SATA_CD00#4&224f42ef&0&000000#{53f5630d-b6bf-11d0-94f2-00a0c91efb8b}\?
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeAPI call chain: ExitProcess graph end nodegraph_0-95443
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeAPI call chain: ExitProcess graph end node
                Source: C:\Windows\SysWOW64\svchost.exeAPI call chain: ExitProcess graph end node
                Source: C:\Windows\SysWOW64\svchost.exeProcess information queried: ProcessInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B56AAF BlockInput,0_2_00B56AAF
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B03D19 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00B03D19
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B33920 LoadLibraryExW,GetLastError,LoadLibraryW,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,GetProcAddress,IsDebuggerPresent,OutputDebugStringW,0_2_00B33920
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B1E01E LoadLibraryA,GetProcAddress,0_2_00B1E01E
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_01249230 mov eax, dword ptr fs:[00000030h]0_2_01249230
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_01249290 mov eax, dword ptr fs:[00000030h]0_2_01249290
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_01247C10 mov eax, dword ptr fs:[00000030h]0_2_01247C10
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00D1A4D8 mov eax, dword ptr fs:[00000030h]2_2_00D1A4D8
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00D1A478 mov eax, dword ptr fs:[00000030h]2_2_00D1A478
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00D18E58 mov eax, dword ptr fs:[00000030h]2_2_00D18E58
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00442554 mov eax, dword ptr fs:[00000030h]3_2_00442554
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_10004AB4 mov eax, dword ptr fs:[00000030h]3_2_10004AB4
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 5_2_015D34E8 mov eax, dword ptr fs:[00000030h]5_2_015D34E8
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 5_2_015D1E68 mov eax, dword ptr fs:[00000030h]5_2_015D1E68
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 5_2_015D3488 mov eax, dword ptr fs:[00000030h]5_2_015D3488
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 7_2_00D53AC0 mov eax, dword ptr fs:[00000030h]7_2_00D53AC0
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 7_2_00D53B20 mov eax, dword ptr fs:[00000030h]7_2_00D53B20
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 7_2_00D524A0 mov eax, dword ptr fs:[00000030h]7_2_00D524A0
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00442554 mov eax, dword ptr fs:[00000030h]8_2_00442554
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B3A66C GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00B3A66C
                Source: C:\Windows\SysWOW64\svchost.exeProcess token adjusted: DebugJump to behavior
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B281AC SetUnhandledExceptionFilter,UnhandledExceptionFilter,0_2_00B281AC
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B28189 SetUnhandledExceptionFilter,0_2_00B28189
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00B981AC SetUnhandledExceptionFilter,UnhandledExceptionFilter,2_2_00B981AC
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00B98189 SetUnhandledExceptionFilter,2_2_00B98189
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00434168 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_00434168
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_0043A65D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_0043A65D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00433B44 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_00433B44
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00433CD7 SetUnhandledExceptionFilter,3_2_00433CD7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_100060E2 IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_100060E2
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_10002639 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,3_2_10002639
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_10002B1C SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,3_2_10002B1C
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00434168 SetUnhandledExceptionFilter,UnhandledExceptionFilter,GetCurrentProcess,TerminateProcess,8_2_00434168
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_0043A65D IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_0043A65D
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00433B44 IsProcessorFeaturePresent,IsDebuggerPresent,SetUnhandledExceptionFilter,UnhandledExceptionFilter,8_2_00433B44
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 8_2_00433CD7 SetUnhandledExceptionFilter,8_2_00433CD7

                HIPS / PFW / Operating System Protection Evasion

                barindex
                Source: C:\Windows\SysWOW64\svchost.exeNetwork Connect: 69.61.84.227 34043Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeNetwork Connect: 178.237.33.50 80Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeCode function: 3_2_00417245 GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,GetModuleHandleA,GetProcAddress,CreateProcessW,VirtualAlloc,Wow64GetThreadContext,ReadProcessMemory,NtCreateSection,NtUnmapViewOfSection,NtMapViewOfSection,VirtualFree,NtClose,TerminateProcess,GetCurrentProcess,NtMapViewOfSection,WriteProcessMemory,Wow64SetThreadContext,ResumeThread,VirtualFree,GetCurrentProcess,NtUnmapViewOfSection,NtClose,TerminateProcess,GetLastError,3_2_00417245
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeSection loaded: NULL target: C:\Windows\SysWOW64\svchost.exe protection: execute and read and writeJump to behavior
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 2E7C008Jump to behavior
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeMemory written: C:\Windows\SysWOW64\svchost.exe base: 2C38008Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe3_2_00410F36
                Source: C:\Windows\SysWOW64\svchost.exeCode function: GetCurrentProcessId,OpenMutexA,CloseHandle,CreateThread,CloseHandle,Sleep,OpenProcess, svchost.exe8_2_00410F36
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B3B106 LogonUserW,0_2_00B3B106
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B03D19 GetCurrentDirectoryW,IsDebuggerPresent,GetFullPathNameW,SetCurrentDirectoryW,MessageBoxA,SetCurrentDirectoryW,GetForegroundWindow,ShellExecuteW,0_2_00B03D19
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B4411C SendInput,keybd_event,0_2_00B4411C
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B474BB mouse_event,0_2_00B474BB
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe"Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\user\AppData\Local\Temp\mtmppeccgqygscehvklzfdreddodq"Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\user\AppData\Local\Temp\mtmppeccgqygscehvklzfdreddodq"Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\user\AppData\Local\Temp\wnsiqxnvuzqluislmugbiidvdjfejiom"Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeProcess created: C:\Windows\SysWOW64\svchost.exe C:\Windows\SysWOW64\svchost.exe /stext "C:\Users\user\AppData\Local\Temp\ypxsq"Jump to behavior
                Source: C:\Windows\System32\wscript.exeProcess created: C:\Users\user\AppData\Local\penstocks\schoollike.exe "C:\Users\user\AppData\Local\penstocks\schoollike.exe" Jump to behavior
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\AppData\Local\penstocks\schoollike.exe" Jump to behavior
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeProcess created: C:\Windows\SysWOW64\svchost.exe "C:\Users\user\AppData\Local\penstocks\schoollike.exe"Jump to behavior
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B3A66C GetSecurityDescriptorDacl,_memset,GetAclInformation,GetLengthSid,GetAce,AddAce,GetLengthSid,GetProcessHeap,HeapAlloc,GetLengthSid,CopySid,AddAce,SetSecurityDescriptorDacl,SetUserObjectSecurity,0_2_00B3A66C
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B471FA AllocateAndInitializeSid,CheckTokenMembership,FreeSid,0_2_00B471FA
                Source: svchost.exe, 00000003.00000002.3825672554.0000000003212000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program ManagerProgram Manager
                Source: svchost.exe, 00000003.00000002.3825672554.0000000003212000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: Program Manager
                Source: RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe, schoollike.exeBinary or memory string: Shell_TrayWnd
                Source: RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe, schoollike.exe.0.drBinary or memory string: Run Script:AutoIt script files (*.au3, *.a3x)*.au3;*.a3xAll files (*.*)*.*au3#include depth exceeded. Make sure there are no recursive includesError opening the file>>>AUTOIT SCRIPT<<<Bad directive syntax errorUnterminated stringCannot parse #includeUnterminated group of commentsONOFF0%d%dShell_TrayWndTHISREMOVEblankinfoquestionstopwarning
                Source: svchost.exe, 00000003.00000002.3825727194.0000000003230000.00000004.00000020.00020000.00000000.sdmp, svchost.exe, 00000003.00000002.3825672554.0000000003212000.00000004.00000020.00020000.00000000.sdmpBinary or memory string: |Program Manager|
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B265C4 cpuid 0_2_00B265C4
                Source: C:\Windows\SysWOW64\svchost.exeCode function: GetLocaleInfoA,3_2_0040E679
                Source: C:\Windows\SysWOW64\svchost.exeCode function: EnumSystemLocalesW,3_2_004470AE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: GetLocaleInfoW,3_2_004510BA
                Source: C:\Windows\SysWOW64\svchost.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,3_2_004511E3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: GetLocaleInfoW,3_2_004512EA
                Source: C:\Windows\SysWOW64\svchost.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,3_2_004513B7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: GetLocaleInfoW,3_2_00447597
                Source: C:\Windows\SysWOW64\svchost.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,3_2_00450A7F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: EnumSystemLocalesW,3_2_00450CF7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: EnumSystemLocalesW,3_2_00450D42
                Source: C:\Windows\SysWOW64\svchost.exeCode function: EnumSystemLocalesW,3_2_00450DDD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,3_2_00450E6A
                Source: C:\Windows\SysWOW64\svchost.exeCode function: EnumSystemLocalesW,8_2_004470AE
                Source: C:\Windows\SysWOW64\svchost.exeCode function: GetLocaleInfoW,8_2_004510BA
                Source: C:\Windows\SysWOW64\svchost.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetACP,8_2_004511E3
                Source: C:\Windows\SysWOW64\svchost.exeCode function: GetLocaleInfoW,8_2_004512EA
                Source: C:\Windows\SysWOW64\svchost.exeCode function: GetUserDefaultLCID,IsValidCodePage,IsValidLocale,GetLocaleInfoW,GetLocaleInfoW,8_2_004513B7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: GetLocaleInfoW,8_2_00447597
                Source: C:\Windows\SysWOW64\svchost.exeCode function: GetLocaleInfoA,8_2_0040E679
                Source: C:\Windows\SysWOW64\svchost.exeCode function: IsValidCodePage,_wcschr,_wcschr,GetLocaleInfoW,8_2_00450A7F
                Source: C:\Windows\SysWOW64\svchost.exeCode function: EnumSystemLocalesW,8_2_00450CF7
                Source: C:\Windows\SysWOW64\svchost.exeCode function: EnumSystemLocalesW,8_2_00450D42
                Source: C:\Windows\SysWOW64\svchost.exeCode function: EnumSystemLocalesW,8_2_00450DDD
                Source: C:\Windows\SysWOW64\svchost.exeCode function: GetLocaleInfoW,GetLocaleInfoW,GetLocaleInfoW,8_2_00450E6A
                Source: C:\Windows\SysWOW64\svchost.exeQueries volume information: C:\ VolumeInformationJump to behavior
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B5091D GetLocalTime,SystemTimeToFileTime,LocalFileTimeToFileTime,__wsplitpath,_wcscat,_wcscat,GetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,SetCurrentDirectoryW,_wcscpy,SetCurrentDirectoryW,0_2_00B5091D
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B7B340 GetUserNameW,0_2_00B7B340
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B31E8E __lock,____lc_codepage_func,__getenv_helper_nolock,_free,_strlen,__malloc_crt,_strlen,__invoke_watson,_free,GetTimeZoneInformation,WideCharToMultiByte,WideCharToMultiByte,0_2_00B31E8E
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B1DDC0 GetVersionExW,GetCurrentProcess,FreeLibrary,GetNativeSystemInfo,FreeLibrary,FreeLibrary,GetSystemInfo,GetSystemInfo,0_2_00B1DDC0
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeKey value queried: HKEY_LOCAL_MACHINE\SOFTWARE\Microsoft\Cryptography MachineGuidJump to behavior

                Stealing of Sensitive Information

                barindex
                Source: Yara matchFile source: 7.2.schoollike.exe.35e0000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.schoollike.exe.3d60000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.schoollike.exe.990000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.schoollike.exe.35e0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.schoollike.exe.990000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.schoollike.exe.3d60000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000002.3825727194.0000000003230000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1387521807.0000000000990000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.1491358992.0000000003D60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.3825644686.0000000003200000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.1504738636.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.1506183329.00000000035E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.1505033984.0000000003000000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.3823656144.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.3825672554.0000000003212000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: schoollike.exe PID: 7392, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 7432, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: schoollike.exe PID: 7580, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: schoollike.exe PID: 7604, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 7628, type: MEMORYSTR
                Source: C:\Windows\SysWOW64\svchost.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data3_2_0040B21B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: \AppData\Local\Google\Chrome\User Data\Default\Login Data8_2_0040B21B
                Source: C:\Windows\SysWOW64\svchost.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\3_2_0040B335
                Source: C:\Windows\SysWOW64\svchost.exeCode function: \key3.db3_2_0040B335
                Source: C:\Windows\SysWOW64\svchost.exeCode function: \AppData\Roaming\Mozilla\Firefox\Profiles\8_2_0040B335
                Source: C:\Windows\SysWOW64\svchost.exeCode function: \key3.db8_2_0040B335
                Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\3nxxd8pi.default-release\places.sqliteJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\profiles.iniJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Users\user\AppData\Roaming\Mozilla\Firefox\Profiles\3nxxd8pi.default-release\key4.dbJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Users\user\AppData\Local\Google\Chrome\User Data\Default\Web DataJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeFile opened: C:\Users\user\AppData\Local\Microsoft\Edge\User Data\Default\Login DataJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\AccountsJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic SaltJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\SOFTWARE\Microsoft\IdentityCRL\Dynamic SaltJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Google\Google Talk\AccountsJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\PaltalkJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Office\Outlook\OMI Account Manager\AccountsJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows NT\CurrentVersion\Windows Messaging Subsystem\ProfilesJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\IncrediMail\IdentitiesJump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeKey opened: HKEY_CURRENT_USER\Software\Microsoft\Windows Live MailJump to behavior
                Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 7432, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 7824, type: MEMORYSTR
                Source: schoollike.exeBinary or memory string: WIN_81
                Source: schoollike.exeBinary or memory string: WIN_XP
                Source: schoollike.exe.0.drBinary or memory string: %.3d%S%M%H%m%Y%jX86IA64X64WIN32_NTWIN_81WIN_2012R2WIN_2012WIN_8WIN_2008R2WIN_7WIN_2008WIN_VISTAWIN_2003WIN_XPeWIN_XPInstallLanguageSYSTEM\CurrentControlSet\Control\Nls\LanguageSchemeLangIDControl Panel\Appearance3, 3, 12, 0USERPROFILEUSERDOMAINUSERDNSDOMAINGetSystemWow64DirectoryWSeDebugPrivilege:winapistdcallubytep
                Source: schoollike.exeBinary or memory string: WIN_XPe
                Source: schoollike.exeBinary or memory string: WIN_VISTA
                Source: schoollike.exeBinary or memory string: WIN_7
                Source: schoollike.exeBinary or memory string: WIN_8

                Remote Access Functionality

                barindex
                Source: C:\Windows\SysWOW64\svchost.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-CDDRK8Jump to behavior
                Source: C:\Windows\SysWOW64\svchost.exeMutex created: \Sessions\1\BaseNamedObjects\Rmc-CDDRK8Jump to behavior
                Source: Yara matchFile source: 7.2.schoollike.exe.35e0000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.svchost.exe.400000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 8.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.schoollike.exe.3d60000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.schoollike.exe.990000.0.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 7.2.schoollike.exe.35e0000.1.raw.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 2.2.schoollike.exe.990000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 5.2.schoollike.exe.3d60000.1.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 3.2.svchost.exe.400000.0.unpack, type: UNPACKEDPE
                Source: Yara matchFile source: 00000003.00000002.3825727194.0000000003230000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000002.00000002.1387521807.0000000000990000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000005.00000002.1491358992.0000000003D60000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.3825644686.0000000003200000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.1504738636.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000007.00000002.1506183329.00000000035E0000.00000004.00001000.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000008.00000002.1505033984.0000000003000000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.3823656144.0000000000400000.00000040.80000000.00040000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: 00000003.00000002.3825672554.0000000003212000.00000004.00000020.00020000.00000000.sdmp, type: MEMORY
                Source: Yara matchFile source: Process Memory Space: schoollike.exe PID: 7392, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 7432, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: schoollike.exe PID: 7580, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: schoollike.exe PID: 7604, type: MEMORYSTR
                Source: Yara matchFile source: Process Memory Space: svchost.exe PID: 7628, type: MEMORYSTR
                Source: C:\Windows\SysWOW64\svchost.exeCode function: cmd.exe3_2_00405042
                Source: C:\Windows\SysWOW64\svchost.exeCode function: cmd.exe8_2_00405042
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B58C4F socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,0_2_00B58C4F
                Source: C:\Users\user\Desktop\RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exeCode function: 0_2_00B5923B socket,WSAGetLastError,bind,WSAGetLastError,closesocket,0_2_00B5923B
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00BC8C4F socket,WSAGetLastError,bind,listen,WSAGetLastError,closesocket,2_2_00BC8C4F
                Source: C:\Users\user\AppData\Local\penstocks\schoollike.exeCode function: 2_2_00BC923B socket,WSAGetLastError,bind,WSAGetLastError,closesocket,2_2_00BC923B
                ReconnaissanceResource DevelopmentInitial AccessExecutionPersistencePrivilege EscalationDefense EvasionCredential AccessDiscoveryLateral MovementCollectionCommand and ControlExfiltrationImpact
                Gather Victim Identity Information111
                Scripting
                2
                Valid Accounts
                2
                Native API
                111
                Scripting
                1
                Exploitation for Privilege Escalation
                1
                Disable or Modify Tools
                2
                OS Credential Dumping
                2
                System Time Discovery
                Remote Services11
                Archive Collected Data
                12
                Ingress Tool Transfer
                Exfiltration Over Other Network Medium1
                System Shutdown/Reboot
                CredentialsDomainsDefault Accounts1
                Command and Scripting Interpreter
                1
                DLL Side-Loading
                1
                DLL Side-Loading
                1
                Deobfuscate/Decode Files or Information
                121
                Input Capture
                1
                Account Discovery
                Remote Desktop Protocol1
                Data from Local System
                2
                Encrypted Channel
                Exfiltration Over Bluetooth1
                Defacement
                Email AddressesDNS ServerDomain Accounts2
                Service Execution
                2
                Valid Accounts
                1
                Bypass User Account Control
                2
                Obfuscated Files or Information
                1
                Credentials in Registry
                1
                System Service Discovery
                SMB/Windows Admin Shares1
                Email Collection
                1
                Non-Standard Port
                Automated ExfiltrationData Encrypted for Impact
                Employee NamesVirtual Private ServerLocal AccountsCron1
                Windows Service
                2
                Valid Accounts
                1
                DLL Side-Loading
                3
                Credentials In Files
                3
                File and Directory Discovery
                Distributed Component Object Model121
                Input Capture
                1
                Remote Access Software
                Traffic DuplicationData Destruction
                Gather Victim Network InformationServerCloud AccountsLaunchd2
                Registry Run Keys / Startup Folder
                21
                Access Token Manipulation
                1
                Bypass User Account Control
                LSA Secrets138
                System Information Discovery
                SSH3
                Clipboard Data
                2
                Non-Application Layer Protocol
                Scheduled TransferData Encrypted for Impact
                Domain PropertiesBotnetReplication Through Removable MediaScheduled TaskRC Scripts1
                Windows Service
                1
                Masquerading
                Cached Domain Credentials231
                Security Software Discovery
                VNCGUI Input Capture22
                Application Layer Protocol
                Data Transfer Size LimitsService Stop
                DNSWeb ServicesExternal Remote ServicesSystemd TimersStartup Items422
                Process Injection
                2
                Valid Accounts
                DCSync1
                Virtualization/Sandbox Evasion
                Windows Remote ManagementWeb Portal CaptureCommonly Used PortExfiltration Over C2 ChannelInhibit System Recovery
                Network Trust DependenciesServerlessDrive-by CompromiseContainer Orchestration JobScheduled Task/Job2
                Registry Run Keys / Startup Folder
                1
                Virtualization/Sandbox Evasion
                Proc Filesystem4
                Process Discovery
                Cloud ServicesCredential API HookingApplication Layer ProtocolExfiltration Over Alternative ProtocolDefacement
                Network TopologyMalvertisingExploit Public-Facing ApplicationCommand and Scripting InterpreterAtAt21
                Access Token Manipulation
                /etc/passwd and /etc/shadow11
                Application Window Discovery
                Direct Cloud VM ConnectionsData StagedWeb ProtocolsExfiltration Over Symmetric Encrypted Non-C2 ProtocolInternal Defacement
                IP AddressesCompromise InfrastructureSupply Chain CompromisePowerShellCronCron422
                Process Injection
                Network Sniffing1
                System Owner/User Discovery
                Shared WebrootLocal Data StagingFile Transfer ProtocolsExfiltration Over Asymmetric Encrypted Non-C2 ProtocolExternal Defacement
                Hide Legend

                Legend:

                • Process
                • Signature
                • Created File
                • DNS/IP Info
                • Is Dropped
                • Is Windows Process
                • Number of created Registry Values
                • Number of created Files
                • Visual Basic
                • Delphi
                • Java
                • .Net C# or VB.NET
                • C, C++ or other language
                • Is malicious
                • Internet
                behaviorgraph top1 dnsIp2 2 Behavior Graph ID: 1566628 Sample: RFQ_PX2_MULE2024_Travco_Eng... Startdate: 02/12/2024 Architecture: WINDOWS Score: 100 44 netflixyoutubebrowser.duckdns.org 2->44 46 geoplugin.net 2->46 60 Suricata IDS alerts for network traffic 2->60 62 Found malware configuration 2->62 64 Malicious sample detected (through community Yara rule) 2->64 68 12 other signatures 2->68 9 RFQ_PX2_MULE2024_Travco_Engineering_Construction_PDF.exe 4 2->9         started        13 wscript.exe 1 2->13         started        signatures3 66 Uses dynamic DNS services 44->66 process4 file5 40 C:\Users\user\AppData\...\schoollike.exe, PE32 9->40 dropped 84 Binary is likely a compiled AutoIt script file 9->84 15 schoollike.exe 2 9->15         started        86 Windows Scripting host queries suspicious COM object (likely to drop second stage) 13->86 19 schoollike.exe 1 13->19         started        signatures6 process7 file8 42 C:\Users\user\AppData\...\schoollike.vbs, data 15->42 dropped 52 Multi AV Scanner detection for dropped file 15->52 54 Binary is likely a compiled AutoIt script file 15->54 56 Machine Learning detection for dropped file 15->56 58 4 other signatures 15->58 21 svchost.exe 3 13 15->21         started        25 schoollike.exe 1 19->25         started        27 svchost.exe 19->27         started        signatures9 process10 dnsIp11 48 netflixyoutubebrowser.duckdns.org 69.61.84.227, 34043, 49745, 49752 GLOBALCOMPASSUS United States 21->48 50 geoplugin.net 178.237.33.50, 49758, 80 ATOM86-ASATOM86NL Netherlands 21->50 70 System process connects to network (likely due to code injection or exploit) 21->70 72 Contains functionality to bypass UAC (CMSTPLUA) 21->72 74 Detected Remcos RAT 21->74 82 6 other signatures 21->82 29 svchost.exe 1 21->29         started        32 svchost.exe 1 21->32         started        34 svchost.exe 2 21->34         started        36 svchost.exe 21->36         started        76 Binary is likely a compiled AutoIt script file 25->76 78 Writes to foreign memory regions 25->78 80 Maps a DLL or memory area into another process 25->80 38 svchost.exe 25->38         started        signatures12 process13 signatures14 88 Tries to steal Instant Messenger accounts or passwords 29->88 90 Tries to steal Mail credentials (via file / registry access) 29->90 92 Tries to harvest and steal browser information (history, passwords, etc) 32->92 94 Detected Remcos RAT 38->94

                This section contains all screenshots as thumbnails, including those not shown in the slideshow.