Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    128s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    22/12/2023, 13:56

General

  • Target

    b24ae256e79c5cd20f96a6fd60c5981e.exe

  • Size

    184KB

  • MD5

    b24ae256e79c5cd20f96a6fd60c5981e

  • SHA1

    bc2a999956d202c538713ca905634b529db27026

  • SHA256

    0ff01631b61aa2256508e8bda07c510eb4942c8b0de6ff6adc0986d8e7a266e9

  • SHA512

    84ee7a639de22e048ccbcec9557abea0582c412232b019b02605af27f96adf44a8830400f65a20c3b9fae9f0579ac650e0376c74fcdd4750b2e8015379c3cc7b

  • SSDEEP

    3072:6vHaom2tvz2w/OjQ8UdjcJcLCzTMCofoB7x2TEQ+NlHtpFF:6v6or6w/z8cjcJ/G9UNlHtpF

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 64 IoCs
  • Loads dropped DLL 64 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b24ae256e79c5cd20f96a6fd60c5981e.exe
    "C:\Users\Admin\AppData\Local\Temp\b24ae256e79c5cd20f96a6fd60c5981e.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:3048
    • C:\Users\Admin\AppData\Local\Temp\Unicorn-15496.exe
      C:\Users\Admin\AppData\Local\Temp\Unicorn-15496.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3056
      • C:\Users\Admin\AppData\Local\Temp\Unicorn-17718.exe
        C:\Users\Admin\AppData\Local\Temp\Unicorn-17718.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1768
        • C:\Users\Admin\AppData\Local\Temp\Unicorn-37152.exe
          C:\Users\Admin\AppData\Local\Temp\Unicorn-37152.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2632
          • C:\Users\Admin\AppData\Local\Temp\Unicorn-53571.exe
            C:\Users\Admin\AppData\Local\Temp\Unicorn-53571.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:3020
            • C:\Users\Admin\AppData\Local\Temp\Unicorn-54422.exe
              C:\Users\Admin\AppData\Local\Temp\Unicorn-54422.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              PID:2604
              • C:\Users\Admin\AppData\Local\Temp\Unicorn-26758.exe
                C:\Users\Admin\AppData\Local\Temp\Unicorn-26758.exe
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetWindowsHookEx
                PID:1152
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-24895.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-24895.exe
                  8⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:3044
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-53519.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-53519.exe
                    9⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:2008
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-17052.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-17052.exe
                      10⤵
                        PID:2816
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-28173.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-28173.exe
                          11⤵
                            PID:2620
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-56835.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-56835.exe
                      8⤵
                      • Executes dropped EXE
                      • Suspicious use of SetWindowsHookEx
                      PID:1616
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-20046.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-20046.exe
                        9⤵
                        • Executes dropped EXE
                        PID:2768
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-56185.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-56185.exe
                          10⤵
                            PID:1776
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-23311.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-23311.exe
                      7⤵
                      • Executes dropped EXE
                      • Suspicious use of SetWindowsHookEx
                      PID:1948
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-15439.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-15439.exe
                        8⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:628
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-32702.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-32702.exe
                          9⤵
                            PID:2388
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-19144.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-19144.exe
                      6⤵
                      • Executes dropped EXE
                      • Suspicious use of SetWindowsHookEx
                      PID:432
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-43177.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-43177.exe
                        7⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:2736
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-11163.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-11163.exe
                          8⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:2624
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-42604.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-42604.exe
                            9⤵
                            • Executes dropped EXE
                            PID:2544
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-50155.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-50155.exe
                              10⤵
                                PID:1756
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-56835.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-56835.exe
                          7⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:2420
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-41987.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-41987.exe
                            8⤵
                              PID:2872
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-11998.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-11998.exe
                        5⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Suspicious use of SetWindowsHookEx
                        PID:580
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-60006.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-60006.exe
                          6⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:1140
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-27417.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-27417.exe
                            7⤵
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            PID:2764
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-25554.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-25554.exe
                              8⤵
                              • Executes dropped EXE
                              • Suspicious use of SetWindowsHookEx
                              PID:1848
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-6600.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-6600.exe
                                9⤵
                                  PID:2496
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-52651.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-52651.exe
                                    10⤵
                                      PID:2164
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-52760.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-52760.exe
                                    9⤵
                                      PID:896
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-52751.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-52751.exe
                                  7⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetWindowsHookEx
                                  PID:2948
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-57098.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-57098.exe
                                    8⤵
                                    • Suspicious use of SetWindowsHookEx
                                    PID:2804
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-38183.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-38183.exe
                                      9⤵
                                        PID:2080
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-6600.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-6600.exe
                                          10⤵
                                            PID:2336
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-60644.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-60644.exe
                                    6⤵
                                    • Executes dropped EXE
                                    • Suspicious use of SetWindowsHookEx
                                    PID:2520
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-37806.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-37806.exe
                                      7⤵
                                      • Executes dropped EXE
                                      • Suspicious use of SetWindowsHookEx
                                      PID:1100
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-50772.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-50772.exe
                                        8⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetWindowsHookEx
                                        PID:2748
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-46792.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-46792.exe
                                          9⤵
                                          • Suspicious use of SetWindowsHookEx
                                          PID:1808
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-44405.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-44405.exe
                                            10⤵
                                              PID:2684
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-62983.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-62983.exe
                                                11⤵
                                                  PID:464
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-37789.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-37789.exe
                                    4⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • Suspicious use of SetWindowsHookEx
                                    PID:1908
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-11251.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-11251.exe
                                      5⤵
                                      • Executes dropped EXE
                                      • Suspicious use of SetWindowsHookEx
                                      PID:528
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-23695.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-23695.exe
                                        6⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetWindowsHookEx
                                        PID:1524
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-25554.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-25554.exe
                                          7⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetWindowsHookEx
                                          PID:2036
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-37711.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-37711.exe
                                            8⤵
                                              PID:1312
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-36933.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-36933.exe
                                        5⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetWindowsHookEx
                                        PID:2600
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-60473.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-60473.exe
                                          6⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetWindowsHookEx
                                          PID:2032
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-42604.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-42604.exe
                                            7⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetWindowsHookEx
                                            PID:2568
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-3512.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-3512.exe
                                              8⤵
                                                PID:2296
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-64545.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-64545.exe
                                                  9⤵
                                                    PID:2376
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-62403.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-62403.exe
                                        3⤵
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        • Suspicious use of SetWindowsHookEx
                                        • Suspicious use of WriteProcessMemory
                                        PID:2856
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-31013.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-31013.exe
                                          4⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          • Suspicious use of SetWindowsHookEx
                                          • Suspicious use of WriteProcessMemory
                                          PID:2900
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-3083.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-3083.exe
                                            5⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            • Suspicious use of SetWindowsHookEx
                                            PID:1676
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-37448.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-37448.exe
                                              6⤵
                                              • Executes dropped EXE
                                              • Suspicious use of SetWindowsHookEx
                                              PID:1544
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-23141.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-23141.exe
                                                7⤵
                                                • Executes dropped EXE
                                                • Suspicious use of SetWindowsHookEx
                                                PID:2548
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-43933.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-43933.exe
                                                  8⤵
                                                    PID:1392
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-1137.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-1137.exe
                                                6⤵
                                                • Executes dropped EXE
                                                • Suspicious use of SetWindowsHookEx
                                                PID:2652
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-41987.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-41987.exe
                                                  7⤵
                                                    PID:2060
                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-10549.exe
                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-10549.exe
                                                      8⤵
                                                        PID:1152
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-62699.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-62699.exe
                                                  5⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:1604
                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-56389.exe
                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-56389.exe
                                                    6⤵
                                                    • Executes dropped EXE
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:2996
                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-30264.exe
                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-30264.exe
                                                      7⤵
                                                        PID:2112
                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-6600.exe
                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-6600.exe
                                                          8⤵
                                                            PID:1984
                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-52839.exe
                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-52839.exe
                                                    4⤵
                                                    • Executes dropped EXE
                                                    • Loads dropped DLL
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:2284
                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-1568.exe
                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-1568.exe
                                                      5⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:2236
                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-14780.exe
                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-14780.exe
                                                        6⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:2528
                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-20041.exe
                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-20041.exe
                                                          7⤵
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:1292
                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-8930.exe
                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-8930.exe
                                                            8⤵
                                                              PID:2356
                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-22309.exe
                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-22309.exe
                                                                9⤵
                                                                  PID:1616
                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-59082.exe
                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-59082.exe
                                                          5⤵
                                                          • Executes dropped EXE
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:2368
                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-56377.exe
                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-56377.exe
                                                            6⤵
                                                              PID:868
                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-1936.exe
                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-1936.exe
                                                      2⤵
                                                      • Executes dropped EXE
                                                      • Loads dropped DLL
                                                      • Suspicious use of SetWindowsHookEx
                                                      • Suspicious use of WriteProcessMemory
                                                      PID:1764
                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-55626.exe
                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-55626.exe
                                                        3⤵
                                                        • Executes dropped EXE
                                                        • Loads dropped DLL
                                                        • Suspicious use of SetWindowsHookEx
                                                        • Suspicious use of WriteProcessMemory
                                                        PID:2512
                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-33151.exe
                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-33151.exe
                                                          4⤵
                                                          • Executes dropped EXE
                                                          • Loads dropped DLL
                                                          • Suspicious use of SetWindowsHookEx
                                                          • Suspicious use of WriteProcessMemory
                                                          PID:2612
                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-21558.exe
                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-21558.exe
                                                            5⤵
                                                            • Executes dropped EXE
                                                            • Loads dropped DLL
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:1268
                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-56799.exe
                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-56799.exe
                                                              6⤵
                                                              • Executes dropped EXE
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:1920
                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-17303.exe
                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-17303.exe
                                                                7⤵
                                                                • Executes dropped EXE
                                                                • Suspicious use of SetWindowsHookEx
                                                                PID:1224
                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-6600.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-6600.exe
                                                                  8⤵
                                                                    PID:2564
                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-3166.exe
                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-3166.exe
                                                                6⤵
                                                                • Executes dropped EXE
                                                                • Suspicious use of SetWindowsHookEx
                                                                PID:2500
                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-19429.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-19429.exe
                                                                  7⤵
                                                                    PID:1624
                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-49186.exe
                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-49186.exe
                                                                5⤵
                                                                • Executes dropped EXE
                                                                • Suspicious use of SetWindowsHookEx
                                                                PID:2012
                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-17303.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-17303.exe
                                                                  6⤵
                                                                  • Executes dropped EXE
                                                                  • Suspicious use of SetWindowsHookEx
                                                                  PID:616
                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-30243.exe
                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-30243.exe
                                                                    7⤵
                                                                    • Executes dropped EXE
                                                                    • Suspicious use of SetWindowsHookEx
                                                                    PID:3036
                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-31691.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-31691.exe
                                                                      8⤵
                                                                        PID:2952
                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-62983.exe
                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-62983.exe
                                                                          9⤵
                                                                            PID:544
                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-13944.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-13944.exe
                                                                  4⤵
                                                                  • Executes dropped EXE
                                                                  • Loads dropped DLL
                                                                  • Suspicious use of SetWindowsHookEx
                                                                  PID:564
                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-31226.exe
                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-31226.exe
                                                                    5⤵
                                                                    • Executes dropped EXE
                                                                    • Suspicious use of SetWindowsHookEx
                                                                    PID:796
                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-27801.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-27801.exe
                                                                      6⤵
                                                                      • Executes dropped EXE
                                                                      PID:3008
                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-48676.exe
                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-48676.exe
                                                                        7⤵
                                                                          PID:2512
                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-3659.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-3659.exe
                                                                      5⤵
                                                                      • Executes dropped EXE
                                                                      • Suspicious use of SetWindowsHookEx
                                                                      PID:2884
                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-63216.exe
                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-63216.exe
                                                                        6⤵
                                                                        • Executes dropped EXE
                                                                        PID:2636
                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-63237.exe
                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-63237.exe
                                                                          7⤵
                                                                            PID:1476
                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-32335.exe
                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-32335.exe
                                                                    3⤵
                                                                    • Executes dropped EXE
                                                                    • Loads dropped DLL
                                                                    • Suspicious use of SetWindowsHookEx
                                                                    • Suspicious use of WriteProcessMemory
                                                                    PID:2336
                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-21558.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-21558.exe
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      • Loads dropped DLL
                                                                      • Suspicious use of SetWindowsHookEx
                                                                      PID:1572
                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-55922.exe
                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-55922.exe
                                                                        5⤵
                                                                        • Executes dropped EXE
                                                                        • Suspicious use of SetWindowsHookEx
                                                                        PID:944
                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-41987.exe
                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-41987.exe
                                                                          6⤵
                                                                            PID:2904
                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-42086.exe
                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-42086.exe
                                                                        4⤵
                                                                        • Executes dropped EXE
                                                                        • Suspicious use of SetWindowsHookEx
                                                                        PID:368
                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-23525.exe
                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-23525.exe
                                                                          5⤵
                                                                          • Executes dropped EXE
                                                                          • Suspicious use of SetWindowsHookEx
                                                                          PID:2696
                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-41987.exe
                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-41987.exe
                                                                            6⤵
                                                                              PID:1568

                                                                  Network

                                                                  MITRE ATT&CK Matrix

                                                                  Replay Monitor

                                                                  Loading Replay Monitor...

                                                                  Downloads

                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-3083.exe

                                                                    Filesize

                                                                    184KB

                                                                    MD5

                                                                    51508e4c690e983f1e349d5c0de95ed2

                                                                    SHA1

                                                                    e7535eddc4c23322450cbaabf17cb58d33faf890

                                                                    SHA256

                                                                    0e188cd40a25403a92421d6dd1ef92ad2915b33b250efa7352eab7e77491f828

                                                                    SHA512

                                                                    c2f5b02c75eebd4784c51d77dff729e3f58c0e97e1b0d84b02f87d635004205f1081e23bf185256e3a9498bbb68f39fe42d9c114c90fe6e988bf6b2a193b4e33

                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-32335.exe

                                                                    Filesize

                                                                    184KB

                                                                    MD5

                                                                    a0aa36a70c0bad53fbe99e0bdc538ed8

                                                                    SHA1

                                                                    a3e7c9063d0e46096f22ec9b744d6391057905c2

                                                                    SHA256

                                                                    8c5c3e4f74fb18de9cc3c89b7a486f521bf8751c69255ae0ac0a4627e1473d58

                                                                    SHA512

                                                                    c2014094061ed8db816d251487c56fd5f467d329fb7fb49e6d4f77bb9522b150b7d6b5689e6c788f9cf9510f3e4f182ff4b4e2ed945cd9ac96f45248bd5a0100

                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-33151.exe

                                                                    Filesize

                                                                    184KB

                                                                    MD5

                                                                    a7b67ba79cfeb330db6526619bd103f0

                                                                    SHA1

                                                                    9d81c70a6d12eb73a3bb331f379b1ce7704ca4c6

                                                                    SHA256

                                                                    93a1752ee7bc2488b8796e461aed07825c3435070b719ddbc990d9d64c0f1962

                                                                    SHA512

                                                                    e2e4a2324fe73ee9871e5b5c2ee6843aa812349565039976222bd99e803b48811a24518d05bccd812b3a6b6c03913db59ee8c460a8337e5baa6f24522759dfae

                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-37789.exe

                                                                    Filesize

                                                                    184KB

                                                                    MD5

                                                                    30ed2b329bee22a4240cd41c7f992ee3

                                                                    SHA1

                                                                    f8274b3a4bbfe5e68e66a9f995d764fa4a8d47ec

                                                                    SHA256

                                                                    efdd6e49e0787f8a87b1058ec0a59c554c3740353d5d9ada2c0dff2f6dc3aa18

                                                                    SHA512

                                                                    9950419990cf8b580f3831c9cff2c1c83763026d2ecb8228639a3bdc95652e68fa0eb4468e2f119017e22ba844a8476bb568febc91187dafe04ce9822abe6601

                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-62403.exe

                                                                    Filesize

                                                                    184KB

                                                                    MD5

                                                                    8f30cc47159007df8bd3f7a6f4ea5639

                                                                    SHA1

                                                                    e29c00989a88da186b9bdf4f5ec277c1435f9a29

                                                                    SHA256

                                                                    56fc39643bc7f5a67deae48afe4ea6e5571d6a70063091372ced3502b0f5824f

                                                                    SHA512

                                                                    86707e41df209a07b8bf993e6a0d38ccb2df7496b998ad3b2ddf4eab5f730b3ac8791b09945f1df733960543b15d5755bc6401b0660aa053e9ba76a46b6f6167

                                                                  • \Users\Admin\AppData\Local\Temp\Unicorn-11251.exe

                                                                    Filesize

                                                                    184KB

                                                                    MD5

                                                                    2e28adc08b2df37bab1d34fd9dd35dbe

                                                                    SHA1

                                                                    1f91927705e13dc514bd40af29a798101aedcd29

                                                                    SHA256

                                                                    1d5e54938bc4766d8442a2e3cefc415242db592c2bc0093a9c14e3849cc38c78

                                                                    SHA512

                                                                    a7880dc2964c9559d92411c28f9f7272b16e14cab99cd191166c388c670f8e8fca61b706675897fd38116d5a6fc295296ff96c29133e7a5e5c1199237d526b9b

                                                                  • \Users\Admin\AppData\Local\Temp\Unicorn-11998.exe

                                                                    Filesize

                                                                    184KB

                                                                    MD5

                                                                    b30ff5af4ee31e5122a83dedff7b9f09

                                                                    SHA1

                                                                    bb519d3df29e5db21b4dc193a3656db3db2c6337

                                                                    SHA256

                                                                    80b6634edc8308f783b5f3060322560a6fdb3b7ce23a7d3d32a115b4c2957f02

                                                                    SHA512

                                                                    39f8617f1ce3f7612c878cb704996598470f1276526a59ef6b2c937d2d4937430ff377985fb6f0a9c5b7125ef0a72584b7b0cb83a65e06d58fa3b0720bb1ca86

                                                                  • \Users\Admin\AppData\Local\Temp\Unicorn-15496.exe

                                                                    Filesize

                                                                    184KB

                                                                    MD5

                                                                    98b68a594a89a7b97ad4688a2c1f7a0c

                                                                    SHA1

                                                                    ea2e7d16bf32418f1602e514c3f361a90d4f960e

                                                                    SHA256

                                                                    22b2da70e82a2c7dfc94e8d4728218bb25ee4ac7fccf50fdec3bf1078555808d

                                                                    SHA512

                                                                    bb01d6427d8855d1261ab6d0e2f4c36a914efe50b29cd8c4a6e7bace18d3049e6f1a51c0394896508e534275d562c5965120977fed5c6c90b2a86a3ca0420608

                                                                  • \Users\Admin\AppData\Local\Temp\Unicorn-17718.exe

                                                                    Filesize

                                                                    184KB

                                                                    MD5

                                                                    a892fa716c29925b277d564b642c2ca1

                                                                    SHA1

                                                                    007a30f8f50adc87530e5cb260a4ee7823d96a31

                                                                    SHA256

                                                                    e094906271a966cb937e68df3399f148c9290382a408858ef52c0f02a79c1344

                                                                    SHA512

                                                                    2dbe70f66da21c4543da484104a1313e22fddf634ef9192ffda73a2713b6de45cfad4f9dbf2ee48dd6baf3fe4fc9bb84f10d07e38458df58836d6aca29ef7c84

                                                                  • \Users\Admin\AppData\Local\Temp\Unicorn-1936.exe

                                                                    Filesize

                                                                    184KB

                                                                    MD5

                                                                    0e260c1083a7bf946e525f866af59e5d

                                                                    SHA1

                                                                    a07d259f38b63597c5e6199043dc01f655615e28

                                                                    SHA256

                                                                    96fec99fe77e9d101fa5bcd78fc40fc6573554fc003055813e5d00293bd3aecf

                                                                    SHA512

                                                                    1456654b78f2773c722ae1ef85ffd032efeae373428af9e02a79abcac8c55a28cbf4642b2ff363418d0d6ffac62fd9988e89d258ba65150d47e65747ea29a3fd

                                                                  • \Users\Admin\AppData\Local\Temp\Unicorn-21558.exe

                                                                    Filesize

                                                                    184KB

                                                                    MD5

                                                                    f4daac7ccff7afe565f97aa3da9d2f28

                                                                    SHA1

                                                                    7b4ab0795ccef8fe82e68ba972d5c201c158a6c4

                                                                    SHA256

                                                                    723c3f9b35d7d3b586f943a34a58be742c8a863cba54e969692ee300cd7d00d9

                                                                    SHA512

                                                                    34d7f9342ff3abc3871fdad45f85d6d06eebd8c4667b7f90f1b0fad2bf3db4ca81c40d26c77cc82f7468b6a7d7359c6d0041bcf5cb8589c8d0ee916ec29c4003

                                                                  • \Users\Admin\AppData\Local\Temp\Unicorn-31013.exe

                                                                    Filesize

                                                                    64KB

                                                                    MD5

                                                                    76b7688af101d2c32f02f9a4e8f8807c

                                                                    SHA1

                                                                    9a1f56b7e1681bbdfb8554758964613cf6710f13

                                                                    SHA256

                                                                    a244f991f9eb5f861335d5eabbff86f36157f12c43ff107244c7eafb22ab0db5

                                                                    SHA512

                                                                    46d27bd0376c573c26464bb98f4dc21187f798d6ffdd42f862db6c7d74c13235f1476447af1514b68fd9bb53622133a703690d8617a7b7fc3f9d019cfd2385e9

                                                                  • \Users\Admin\AppData\Local\Temp\Unicorn-31013.exe

                                                                    Filesize

                                                                    184KB

                                                                    MD5

                                                                    d84301b35019abdc09e806251d5c1863

                                                                    SHA1

                                                                    86c19713c09c308b35a0665c700302c3c04bb07d

                                                                    SHA256

                                                                    65def7467606ea530e6979f4a828a28123e30a7551ea6f1a333fd9cff966084b

                                                                    SHA512

                                                                    842f3af795535552d218ecfb1af370251ca96c568cc0192f9b2ff381f87b73ad0e61b38e463352506304f053080df738ff7473479906c0f41600a39dfd6abab3

                                                                  • \Users\Admin\AppData\Local\Temp\Unicorn-37152.exe

                                                                    Filesize

                                                                    184KB

                                                                    MD5

                                                                    d46ab6b5cf7bfd39b1721ca0de6a457e

                                                                    SHA1

                                                                    fed98cb5a1e8523417072e0d451690d1ff826bd6

                                                                    SHA256

                                                                    e1e40ada13378397c5b9d2eb51d250343dcf888da6c58db334f02d88a23e2c8a

                                                                    SHA512

                                                                    8769a469209a5802e3837711046ddecf753218daa8e3007e542aef8025de90bd27594d92196a7da8b89212584f5484084940fff91b4786d59ee900ccae085fc8

                                                                  • \Users\Admin\AppData\Local\Temp\Unicorn-52839.exe

                                                                    Filesize

                                                                    184KB

                                                                    MD5

                                                                    1893e9f86a32263ab27d32df767ecfd1

                                                                    SHA1

                                                                    790b53a51b05f2e093659f922ec37cb5662080c2

                                                                    SHA256

                                                                    82e6002cc6cad5167a3857b79fb64b874a03060101b2e49d13ee534c3bf40192

                                                                    SHA512

                                                                    4596def4d36861e68287ab67c25d502a1efe492211a6ce5876631f65b3c79c9448c10dff0790a36c7dfa1fb115f5951c2d74fb600d3bdbee3f9cf73afdefd20b

                                                                  • \Users\Admin\AppData\Local\Temp\Unicorn-53571.exe

                                                                    Filesize

                                                                    184KB

                                                                    MD5

                                                                    879269332f371f73b58673c9729525b5

                                                                    SHA1

                                                                    4d4c69526ad2d0f8b60539f5432a86830595117a

                                                                    SHA256

                                                                    e20ca31f589d8c0c7e2243f2d8ee2fafaa88a3c430694ebe035404049944ce3a

                                                                    SHA512

                                                                    f16c6bcc18e576a8c2566ff51758fc8b92a9b0a39e530c2d414002eb66f76a8a1eec43798bf66c74d9f00cabb5e0a7faf2eaf04117c5ef1e25d1c543da89a820

                                                                  • \Users\Admin\AppData\Local\Temp\Unicorn-54422.exe

                                                                    Filesize

                                                                    184KB

                                                                    MD5

                                                                    a34a43415a7d48791c5644c7374c24db

                                                                    SHA1

                                                                    5f8a7903c9eaef0e68fd663fe0a1c67c0745d1af

                                                                    SHA256

                                                                    c4894554d718e28872b67133456469c89b5a795648c53904bbe989d93fca951e

                                                                    SHA512

                                                                    ed0f7f4a836588655c060fce098dcf0a77343afbe775a6a956228aba7256740c03b33470f73e6987a6ec6438ffb0b19fb36ede7694f40eb02c8cb238912659f2

                                                                  • \Users\Admin\AppData\Local\Temp\Unicorn-55626.exe

                                                                    Filesize

                                                                    184KB

                                                                    MD5

                                                                    760ace4405a8d931b2a0f269e8e1ada5

                                                                    SHA1

                                                                    5f58d4872910cf722798b128014edd2e29b5602a

                                                                    SHA256

                                                                    3d2bfb2c24773373446ab9b99edb20d1908d25a8bad5204443247a93abce0c77

                                                                    SHA512

                                                                    16a481f324d1bc2371cd8fa408a4332b28af6cd0e439d56849bc93d899c5b606eb706b39355867075acf32e53fddf8ae7ee76f05367a30c1745ffde03b134d3d