Analysis
-
max time kernel
167s -
max time network
205s -
platform
windows10-2004_x64 -
resource
win10v2004-20231023-en -
resource tags
arch:x64arch:x86image:win10v2004-20231023-enlocale:en-usos:windows10-2004-x64system -
submitted
03-11-2023 16:31
Static task
static1
Behavioral task
behavioral1
Sample
NEAS.f59439739f93b095bfeaca4baf9ed1b0.exe
Resource
win7-20231020-en
Behavioral task
behavioral2
Sample
NEAS.f59439739f93b095bfeaca4baf9ed1b0.exe
Resource
win10v2004-20231023-en
General
-
Target
NEAS.f59439739f93b095bfeaca4baf9ed1b0.exe
-
Size
184KB
-
MD5
f59439739f93b095bfeaca4baf9ed1b0
-
SHA1
dd7158be4ad3eb5263c822fc4926e8f1dfebe56a
-
SHA256
1d38875d7bc46b0379a55a96433231dc0886c2bd342e2aa84936f4c42fc6716c
-
SHA512
f10f9159b5da7e86936a6a7e21de58dd9f7fe8a0961a07e5e4d496f90ae44913284efe901f727cbfc3987b8e580d75c50964f5254a53b168f18e352255f6dac3
-
SSDEEP
3072:F2XEoDVrxv5da2ZcPzmvufaaITjU3KlXLCxWlBt5NlP/OFF:F2Uo7RdahPKvuf72zHNlP/OF
Malware Config
Signatures
-
Executes dropped EXE 13 IoCs
pid Process 3032 Unicorn-57351.exe 2128 Unicorn-12566.exe 4852 Unicorn-50070.exe 4352 Unicorn-9546.exe 2876 Unicorn-47050.exe 3796 Unicorn-2530.exe 2736 Unicorn-86.exe 1904 Unicorn-28675.exe 4792 Unicorn-25567.exe 4172 Unicorn-7066.exe 3560 Unicorn-40485.exe 3188 Unicorn-1306.exe 2472 Unicorn-1306.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1524 2736 WerFault.exe 97 -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 1872 NEAS.f59439739f93b095bfeaca4baf9ed1b0.exe 3032 Unicorn-57351.exe 2128 Unicorn-12566.exe 4852 Unicorn-50070.exe 2876 Unicorn-47050.exe 4352 Unicorn-9546.exe 3796 Unicorn-2530.exe 2736 Unicorn-86.exe 1904 Unicorn-28675.exe 4792 Unicorn-25567.exe 4172 Unicorn-7066.exe 3560 Unicorn-40485.exe -
Suspicious use of WriteProcessMemory 39 IoCs
description pid Process procid_target PID 1872 wrote to memory of 3032 1872 NEAS.f59439739f93b095bfeaca4baf9ed1b0.exe 90 PID 1872 wrote to memory of 3032 1872 NEAS.f59439739f93b095bfeaca4baf9ed1b0.exe 90 PID 1872 wrote to memory of 3032 1872 NEAS.f59439739f93b095bfeaca4baf9ed1b0.exe 90 PID 3032 wrote to memory of 2128 3032 Unicorn-57351.exe 92 PID 3032 wrote to memory of 2128 3032 Unicorn-57351.exe 92 PID 3032 wrote to memory of 2128 3032 Unicorn-57351.exe 92 PID 1872 wrote to memory of 4852 1872 NEAS.f59439739f93b095bfeaca4baf9ed1b0.exe 93 PID 1872 wrote to memory of 4852 1872 NEAS.f59439739f93b095bfeaca4baf9ed1b0.exe 93 PID 1872 wrote to memory of 4852 1872 NEAS.f59439739f93b095bfeaca4baf9ed1b0.exe 93 PID 2128 wrote to memory of 4352 2128 Unicorn-12566.exe 94 PID 2128 wrote to memory of 4352 2128 Unicorn-12566.exe 94 PID 2128 wrote to memory of 4352 2128 Unicorn-12566.exe 94 PID 3032 wrote to memory of 2876 3032 Unicorn-57351.exe 95 PID 3032 wrote to memory of 2876 3032 Unicorn-57351.exe 95 PID 3032 wrote to memory of 2876 3032 Unicorn-57351.exe 95 PID 4852 wrote to memory of 3796 4852 Unicorn-50070.exe 96 PID 4852 wrote to memory of 3796 4852 Unicorn-50070.exe 96 PID 4852 wrote to memory of 3796 4852 Unicorn-50070.exe 96 PID 3796 wrote to memory of 2736 3796 Unicorn-2530.exe 97 PID 3796 wrote to memory of 2736 3796 Unicorn-2530.exe 97 PID 3796 wrote to memory of 2736 3796 Unicorn-2530.exe 97 PID 2876 wrote to memory of 1904 2876 Unicorn-47050.exe 99 PID 2876 wrote to memory of 1904 2876 Unicorn-47050.exe 99 PID 2876 wrote to memory of 1904 2876 Unicorn-47050.exe 99 PID 1904 wrote to memory of 4792 1904 Unicorn-28675.exe 101 PID 1904 wrote to memory of 4792 1904 Unicorn-28675.exe 101 PID 1904 wrote to memory of 4792 1904 Unicorn-28675.exe 101 PID 4792 wrote to memory of 4172 4792 Unicorn-25567.exe 106 PID 4792 wrote to memory of 4172 4792 Unicorn-25567.exe 106 PID 4792 wrote to memory of 4172 4792 Unicorn-25567.exe 106 PID 1904 wrote to memory of 3560 1904 Unicorn-28675.exe 105 PID 1904 wrote to memory of 3560 1904 Unicorn-28675.exe 105 PID 1904 wrote to memory of 3560 1904 Unicorn-28675.exe 105 PID 4172 wrote to memory of 3188 4172 Unicorn-7066.exe 108 PID 4172 wrote to memory of 3188 4172 Unicorn-7066.exe 108 PID 4172 wrote to memory of 3188 4172 Unicorn-7066.exe 108 PID 3560 wrote to memory of 2472 3560 Unicorn-40485.exe 107 PID 3560 wrote to memory of 2472 3560 Unicorn-40485.exe 107 PID 3560 wrote to memory of 2472 3560 Unicorn-40485.exe 107
Processes
-
C:\Users\Admin\AppData\Local\Temp\NEAS.f59439739f93b095bfeaca4baf9ed1b0.exe"C:\Users\Admin\AppData\Local\Temp\NEAS.f59439739f93b095bfeaca4baf9ed1b0.exe"1⤵
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-57351.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57351.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12566.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12566.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2128 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9546.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9546.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:4352
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47050.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47050.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-28675.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28675.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1904 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-25567.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25567.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4792 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-7066.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7066.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4172 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-1306.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1306.exe7⤵
- Executes dropped EXE
PID:3188
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40485.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40485.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3560 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-1306.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1306.exe6⤵
- Executes dropped EXE
PID:2472
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50070.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50070.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:4852 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-2530.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2530.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3796 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-86.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-86.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2736 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2736 -s 7205⤵
- Program crash
PID:1524
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -pss -s 408 -p 2736 -ip 27361⤵PID:2772
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD55494689e15fe358532fcb47af0698a61
SHA19b37330bec2040db8927402ddfbbd437635cd4f6
SHA256d49a8ea482a87a984a4304b7bf58384193f014ab9e35ad962136b2fbb725feeb
SHA5122e0b608ee68cf8592ccfa0b77b08ff549165ed689b971d9ab53d747c0d2cc4251b57466bbe7298c467f8d834202fdb451dfca94072d1ae6f26de854f2813b803
-
Filesize
184KB
MD55494689e15fe358532fcb47af0698a61
SHA19b37330bec2040db8927402ddfbbd437635cd4f6
SHA256d49a8ea482a87a984a4304b7bf58384193f014ab9e35ad962136b2fbb725feeb
SHA5122e0b608ee68cf8592ccfa0b77b08ff549165ed689b971d9ab53d747c0d2cc4251b57466bbe7298c467f8d834202fdb451dfca94072d1ae6f26de854f2813b803
-
Filesize
184KB
MD55494689e15fe358532fcb47af0698a61
SHA19b37330bec2040db8927402ddfbbd437635cd4f6
SHA256d49a8ea482a87a984a4304b7bf58384193f014ab9e35ad962136b2fbb725feeb
SHA5122e0b608ee68cf8592ccfa0b77b08ff549165ed689b971d9ab53d747c0d2cc4251b57466bbe7298c467f8d834202fdb451dfca94072d1ae6f26de854f2813b803
-
Filesize
184KB
MD51170b9c13fffdbd1b9705acc9f6772c9
SHA1217a5ee892d8fbff01390a286e873832a061d32c
SHA2564cb9e03f44761bbe96a37687c722129c0d055897347ce31d679ad08f55cc94c8
SHA512c40e5831310d46c5435d1705cf31fb8a42ac8bf2a5706f434f9bb184495ebca22589a32784efe06cff7916027edd20a81ee8a1d43ec77227f29fb01cacc091cf
-
Filesize
184KB
MD51170b9c13fffdbd1b9705acc9f6772c9
SHA1217a5ee892d8fbff01390a286e873832a061d32c
SHA2564cb9e03f44761bbe96a37687c722129c0d055897347ce31d679ad08f55cc94c8
SHA512c40e5831310d46c5435d1705cf31fb8a42ac8bf2a5706f434f9bb184495ebca22589a32784efe06cff7916027edd20a81ee8a1d43ec77227f29fb01cacc091cf
-
Filesize
184KB
MD51170b9c13fffdbd1b9705acc9f6772c9
SHA1217a5ee892d8fbff01390a286e873832a061d32c
SHA2564cb9e03f44761bbe96a37687c722129c0d055897347ce31d679ad08f55cc94c8
SHA512c40e5831310d46c5435d1705cf31fb8a42ac8bf2a5706f434f9bb184495ebca22589a32784efe06cff7916027edd20a81ee8a1d43ec77227f29fb01cacc091cf
-
Filesize
184KB
MD5944a3d0c6e1af37b8a1bd81be325521e
SHA15681be38f084a6b419f92aae7e285e9f5d59f752
SHA2561d11b9b05324ebd7340af7fd0fe5460ab632283d7e807c90ba6313f0f1c29f1b
SHA512d80d71b68d1b86b941cb7dfcf6af9420655687ed3b14c54b0d50962c5c80feeb130d8308b12a258ebcadd7f485237872ffdfb678ba74d1202bf8e87742cd46b9
-
Filesize
184KB
MD5944a3d0c6e1af37b8a1bd81be325521e
SHA15681be38f084a6b419f92aae7e285e9f5d59f752
SHA2561d11b9b05324ebd7340af7fd0fe5460ab632283d7e807c90ba6313f0f1c29f1b
SHA512d80d71b68d1b86b941cb7dfcf6af9420655687ed3b14c54b0d50962c5c80feeb130d8308b12a258ebcadd7f485237872ffdfb678ba74d1202bf8e87742cd46b9
-
Filesize
184KB
MD5c24c95a621451c5273f48266093808ba
SHA16788aa439bd61e0a165144f546d1f19bec242ce6
SHA2560b2004ab6caa838b3e6370cc4beb8490a44696a494abab66a23ebefa390b585d
SHA5128d0b7ebc7f766613fb209c22e645a4adba2534017e430a40d8dda95620215129017b791453aafdfdf249ea03f9b3b8e04f3d19901bc09874e20ae4e6bef45a1c
-
Filesize
184KB
MD5c24c95a621451c5273f48266093808ba
SHA16788aa439bd61e0a165144f546d1f19bec242ce6
SHA2560b2004ab6caa838b3e6370cc4beb8490a44696a494abab66a23ebefa390b585d
SHA5128d0b7ebc7f766613fb209c22e645a4adba2534017e430a40d8dda95620215129017b791453aafdfdf249ea03f9b3b8e04f3d19901bc09874e20ae4e6bef45a1c
-
Filesize
184KB
MD5d12e4f42f83d2b39e7605c081b716869
SHA1498085abe6b8b70bb077de08770ef1530a1db427
SHA25625bc22331a1f6bb14efa831291b0294f5db06ba533dcfcbee4f667281700f459
SHA51211f694971524d3defb8a95be236db4c5e3836400de3449aa57b40209c8186885552b6f5474d6fc63c2a7ae319c425625431ea445365fabd4ade6af02c9aacc6f
-
Filesize
184KB
MD5d12e4f42f83d2b39e7605c081b716869
SHA1498085abe6b8b70bb077de08770ef1530a1db427
SHA25625bc22331a1f6bb14efa831291b0294f5db06ba533dcfcbee4f667281700f459
SHA51211f694971524d3defb8a95be236db4c5e3836400de3449aa57b40209c8186885552b6f5474d6fc63c2a7ae319c425625431ea445365fabd4ade6af02c9aacc6f
-
Filesize
184KB
MD5d12e4f42f83d2b39e7605c081b716869
SHA1498085abe6b8b70bb077de08770ef1530a1db427
SHA25625bc22331a1f6bb14efa831291b0294f5db06ba533dcfcbee4f667281700f459
SHA51211f694971524d3defb8a95be236db4c5e3836400de3449aa57b40209c8186885552b6f5474d6fc63c2a7ae319c425625431ea445365fabd4ade6af02c9aacc6f
-
Filesize
184KB
MD53cabb337ca4376b2c73681d6cdc1a0c5
SHA11d846e145470bc0193c0cd1e67862240f202d918
SHA256a792fe7d48de33d8284a545004b42bd95440abf4cb4887c454541d5745e925d1
SHA512dc6a6e03c8630948075441b9c5e6142b5e819eed74e0df3fe3b40293fdf20788b1c27175cacba91ed02ed7c83d0f6d80246bdf5c0bfc003212e1028e03e5cf5b
-
Filesize
184KB
MD53cabb337ca4376b2c73681d6cdc1a0c5
SHA11d846e145470bc0193c0cd1e67862240f202d918
SHA256a792fe7d48de33d8284a545004b42bd95440abf4cb4887c454541d5745e925d1
SHA512dc6a6e03c8630948075441b9c5e6142b5e819eed74e0df3fe3b40293fdf20788b1c27175cacba91ed02ed7c83d0f6d80246bdf5c0bfc003212e1028e03e5cf5b
-
Filesize
184KB
MD5405b8f2c3b580302c6abfd4947c00d75
SHA1777dcd5877f4392ea2ff0ef11a738b3ce3919498
SHA2566134db1b057dc764b6fda89921afc164114a76354b82f07e0005aee54c56d5a0
SHA512409cd2dfac5ec4636bc8af4998843142c1556d85b04dc4d8112ccb37cc6f68830db17b0cbde3ed22512d491ad87fcc2ee2606e9c232c58eb953c079d3871d3bc
-
Filesize
184KB
MD5405b8f2c3b580302c6abfd4947c00d75
SHA1777dcd5877f4392ea2ff0ef11a738b3ce3919498
SHA2566134db1b057dc764b6fda89921afc164114a76354b82f07e0005aee54c56d5a0
SHA512409cd2dfac5ec4636bc8af4998843142c1556d85b04dc4d8112ccb37cc6f68830db17b0cbde3ed22512d491ad87fcc2ee2606e9c232c58eb953c079d3871d3bc
-
Filesize
184KB
MD53fb0f8cd3c1cd040334c11e55ef37dfe
SHA1a4b89b1e791b701514c3b4e55d7746be908b6fbb
SHA256329aed15b81ee67e763255bdf018347314139b1337df1fefb136fa2c82fcfec3
SHA512ca8624edb592d4011134a220f65b5c4b6b4bbd98d1ec65dd7703039d4256760ae53b5db4db88de626500a2093b998df87760ebb1fa74fea4aba1cf52072484e9
-
Filesize
184KB
MD53fb0f8cd3c1cd040334c11e55ef37dfe
SHA1a4b89b1e791b701514c3b4e55d7746be908b6fbb
SHA256329aed15b81ee67e763255bdf018347314139b1337df1fefb136fa2c82fcfec3
SHA512ca8624edb592d4011134a220f65b5c4b6b4bbd98d1ec65dd7703039d4256760ae53b5db4db88de626500a2093b998df87760ebb1fa74fea4aba1cf52072484e9
-
Filesize
184KB
MD5c2488b172ec4940053154cb6ab80041c
SHA1f3e4087793b25705011b686db58eb0f8004e2b14
SHA256133ae32422a258b58a0ffbab45b468d8afd8b74aa0b80aaa8d085fad9c0fdf75
SHA512752b6ab8aa68d75dead484381f31ea92628a9d462f0956b7c162dc714c78b80acf712345e57e517d9192a7ed9bccb39287194a97a92dff2ff2ea2b54a27b3fe4
-
Filesize
184KB
MD5c2488b172ec4940053154cb6ab80041c
SHA1f3e4087793b25705011b686db58eb0f8004e2b14
SHA256133ae32422a258b58a0ffbab45b468d8afd8b74aa0b80aaa8d085fad9c0fdf75
SHA512752b6ab8aa68d75dead484381f31ea92628a9d462f0956b7c162dc714c78b80acf712345e57e517d9192a7ed9bccb39287194a97a92dff2ff2ea2b54a27b3fe4
-
Filesize
184KB
MD56a3f03443259dd046d8088baf7728e73
SHA185382b1cf68e373bdbca3312be9ae0ec5a4de0a9
SHA256c074032219a8d531d13ac8b5a11795921a4de12850b375e071392c6ebd9f46a5
SHA512e316472f5aca5bd9ded3948522c193ce9d363c2ad7ae6f4067b1ec6b9cde08c2bcf452d434c94984937e1db4fc45d5d568c168d37faa0142c40f7ed6cdce4a0c
-
Filesize
184KB
MD56a3f03443259dd046d8088baf7728e73
SHA185382b1cf68e373bdbca3312be9ae0ec5a4de0a9
SHA256c074032219a8d531d13ac8b5a11795921a4de12850b375e071392c6ebd9f46a5
SHA512e316472f5aca5bd9ded3948522c193ce9d363c2ad7ae6f4067b1ec6b9cde08c2bcf452d434c94984937e1db4fc45d5d568c168d37faa0142c40f7ed6cdce4a0c
-
Filesize
184KB
MD5a2b82f73b5a1437f63d857edc4374484
SHA18bfb4f9c7dde65b456a30aec6cfb04bd7e2a9bd3
SHA256c8eb60cc7fe58fc8e82ff05f21d6b3de60e460a14bfb474a61cae29c9c00fcdf
SHA51295d5e904725ca36f8b302596bc975c817ad163b97e743fbe116b5d0364baeefd155b167a07a2245b6ec0ae47415d8f77c24d23d28be28bb63b5550d219563eca
-
Filesize
184KB
MD5a2b82f73b5a1437f63d857edc4374484
SHA18bfb4f9c7dde65b456a30aec6cfb04bd7e2a9bd3
SHA256c8eb60cc7fe58fc8e82ff05f21d6b3de60e460a14bfb474a61cae29c9c00fcdf
SHA51295d5e904725ca36f8b302596bc975c817ad163b97e743fbe116b5d0364baeefd155b167a07a2245b6ec0ae47415d8f77c24d23d28be28bb63b5550d219563eca
-
Filesize
184KB
MD5db8b6bc6b512e52ee6381d228d4a0683
SHA13d36a83003e45690a5665362cbf8e04aac1d98ee
SHA256a24bcda01ac2ffcb96578a42d92861559699479ff89e8a6a0de70712f9284f09
SHA512c0c26239380b9713d190746a023659310bacfcadb58db39754e795115fd67d0b08d9ecd78c9c1de3b3ee0d0fde18a2a23030907bd5128180020b1c31d8e157d1
-
Filesize
184KB
MD5db8b6bc6b512e52ee6381d228d4a0683
SHA13d36a83003e45690a5665362cbf8e04aac1d98ee
SHA256a24bcda01ac2ffcb96578a42d92861559699479ff89e8a6a0de70712f9284f09
SHA512c0c26239380b9713d190746a023659310bacfcadb58db39754e795115fd67d0b08d9ecd78c9c1de3b3ee0d0fde18a2a23030907bd5128180020b1c31d8e157d1