Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
128s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
22/12/2023, 13:56
Static task
static1
Behavioral task
behavioral1
Sample
b24ae256e79c5cd20f96a6fd60c5981e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
b24ae256e79c5cd20f96a6fd60c5981e.exe
Resource
win10v2004-20231215-en
General
-
Target
b24ae256e79c5cd20f96a6fd60c5981e.exe
-
Size
184KB
-
MD5
b24ae256e79c5cd20f96a6fd60c5981e
-
SHA1
bc2a999956d202c538713ca905634b529db27026
-
SHA256
0ff01631b61aa2256508e8bda07c510eb4942c8b0de6ff6adc0986d8e7a266e9
-
SHA512
84ee7a639de22e048ccbcec9557abea0582c412232b019b02605af27f96adf44a8830400f65a20c3b9fae9f0579ac650e0376c74fcdd4750b2e8015379c3cc7b
-
SSDEEP
3072:6vHaom2tvz2w/OjQ8UdjcJcLCzTMCofoB7x2TEQ+NlHtpFF:6v6or6w/z8cjcJ/G9UNlHtpF
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 3056 Unicorn-15496.exe 1768 Unicorn-17718.exe 1764 Unicorn-1936.exe 2632 Unicorn-37152.exe 2856 Unicorn-62403.exe 2512 Unicorn-55626.exe 3020 Unicorn-53571.exe 1908 Unicorn-37789.exe 2900 Unicorn-31013.exe 2612 Unicorn-33151.exe 2336 Unicorn-32335.exe 2604 Unicorn-54422.exe 580 Unicorn-11998.exe 1676 Unicorn-3083.exe 1268 Unicorn-21558.exe 1572 Unicorn-21558.exe 528 Unicorn-11251.exe 564 Unicorn-13944.exe 2284 Unicorn-52839.exe 1152 Unicorn-26758.exe 432 Unicorn-19144.exe 1140 Unicorn-60006.exe 1544 Unicorn-37448.exe 1604 Unicorn-62699.exe 944 Unicorn-55922.exe 796 Unicorn-31226.exe 368 Unicorn-42086.exe 2236 Unicorn-1568.exe 2600 Unicorn-36933.exe 1920 Unicorn-56799.exe 2012 Unicorn-49186.exe 3044 Unicorn-24895.exe 1948 Unicorn-23311.exe 2736 Unicorn-43177.exe 2764 Unicorn-27417.exe 2520 Unicorn-60644.exe 2548 Unicorn-23141.exe 1524 Unicorn-23695.exe 2652 Unicorn-1137.exe 2528 Unicorn-14780.exe 2368 Unicorn-59082.exe 2996 Unicorn-56389.exe 3008 Unicorn-27801.exe 2696 Unicorn-23525.exe 2884 Unicorn-3659.exe 2032 Unicorn-60473.exe 1224 Unicorn-17303.exe 616 Unicorn-17303.exe 2500 Unicorn-3166.exe 1616 Unicorn-56835.exe 2420 Unicorn-56835.exe 2624 Unicorn-11163.exe 1100 Unicorn-37806.exe 628 Unicorn-15439.exe 1848 Unicorn-25554.exe 2036 Unicorn-25554.exe 2948 Unicorn-52751.exe 2008 Unicorn-53519.exe 2768 Unicorn-20046.exe 2748 Unicorn-50772.exe 2568 Unicorn-42604.exe 2544 Unicorn-42604.exe 2636 Unicorn-63216.exe 3036 Unicorn-30243.exe -
Loads dropped DLL 64 IoCs
pid Process 3048 b24ae256e79c5cd20f96a6fd60c5981e.exe 3048 b24ae256e79c5cd20f96a6fd60c5981e.exe 3056 Unicorn-15496.exe 3048 b24ae256e79c5cd20f96a6fd60c5981e.exe 3056 Unicorn-15496.exe 3048 b24ae256e79c5cd20f96a6fd60c5981e.exe 1768 Unicorn-17718.exe 1768 Unicorn-17718.exe 3056 Unicorn-15496.exe 3056 Unicorn-15496.exe 1764 Unicorn-1936.exe 1764 Unicorn-1936.exe 2632 Unicorn-37152.exe 1768 Unicorn-17718.exe 2632 Unicorn-37152.exe 1768 Unicorn-17718.exe 2856 Unicorn-62403.exe 2856 Unicorn-62403.exe 2512 Unicorn-55626.exe 2512 Unicorn-55626.exe 1764 Unicorn-1936.exe 1764 Unicorn-1936.exe 3020 Unicorn-53571.exe 3020 Unicorn-53571.exe 2632 Unicorn-37152.exe 2632 Unicorn-37152.exe 2900 Unicorn-31013.exe 2900 Unicorn-31013.exe 2612 Unicorn-33151.exe 2336 Unicorn-32335.exe 2336 Unicorn-32335.exe 2612 Unicorn-33151.exe 2856 Unicorn-62403.exe 1908 Unicorn-37789.exe 2856 Unicorn-62403.exe 1908 Unicorn-37789.exe 2512 Unicorn-55626.exe 2512 Unicorn-55626.exe 2604 Unicorn-54422.exe 2604 Unicorn-54422.exe 3020 Unicorn-53571.exe 3020 Unicorn-53571.exe 580 Unicorn-11998.exe 580 Unicorn-11998.exe 1676 Unicorn-3083.exe 1676 Unicorn-3083.exe 2900 Unicorn-31013.exe 1572 Unicorn-21558.exe 2900 Unicorn-31013.exe 1572 Unicorn-21558.exe 564 Unicorn-13944.exe 564 Unicorn-13944.exe 2336 Unicorn-32335.exe 2336 Unicorn-32335.exe 2284 Unicorn-52839.exe 2284 Unicorn-52839.exe 1908 Unicorn-37789.exe 1268 Unicorn-21558.exe 1908 Unicorn-37789.exe 1268 Unicorn-21558.exe 2612 Unicorn-33151.exe 2612 Unicorn-33151.exe 1152 Unicorn-26758.exe 1152 Unicorn-26758.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 3048 b24ae256e79c5cd20f96a6fd60c5981e.exe 3056 Unicorn-15496.exe 1768 Unicorn-17718.exe 1764 Unicorn-1936.exe 2632 Unicorn-37152.exe 2856 Unicorn-62403.exe 2512 Unicorn-55626.exe 3020 Unicorn-53571.exe 2900 Unicorn-31013.exe 1908 Unicorn-37789.exe 2612 Unicorn-33151.exe 2336 Unicorn-32335.exe 2604 Unicorn-54422.exe 580 Unicorn-11998.exe 1676 Unicorn-3083.exe 1572 Unicorn-21558.exe 564 Unicorn-13944.exe 528 Unicorn-11251.exe 1268 Unicorn-21558.exe 2284 Unicorn-52839.exe 1152 Unicorn-26758.exe 432 Unicorn-19144.exe 1140 Unicorn-60006.exe 1544 Unicorn-37448.exe 1604 Unicorn-62699.exe 796 Unicorn-31226.exe 944 Unicorn-55922.exe 368 Unicorn-42086.exe 2236 Unicorn-1568.exe 1920 Unicorn-56799.exe 2600 Unicorn-36933.exe 2012 Unicorn-49186.exe 3044 Unicorn-24895.exe 2736 Unicorn-43177.exe 1948 Unicorn-23311.exe 2764 Unicorn-27417.exe 2520 Unicorn-60644.exe 1524 Unicorn-23695.exe 2548 Unicorn-23141.exe 2652 Unicorn-1137.exe 2528 Unicorn-14780.exe 2996 Unicorn-56389.exe 2368 Unicorn-59082.exe 2696 Unicorn-23525.exe 2884 Unicorn-3659.exe 616 Unicorn-17303.exe 2500 Unicorn-3166.exe 2032 Unicorn-60473.exe 2624 Unicorn-11163.exe 2948 Unicorn-52751.exe 1616 Unicorn-56835.exe 1100 Unicorn-37806.exe 2008 Unicorn-53519.exe 1224 Unicorn-17303.exe 628 Unicorn-15439.exe 2036 Unicorn-25554.exe 1848 Unicorn-25554.exe 2420 Unicorn-56835.exe 2748 Unicorn-50772.exe 2568 Unicorn-42604.exe 3036 Unicorn-30243.exe 1808 Unicorn-46792.exe 2804 Unicorn-57098.exe 1292 Unicorn-20041.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 3048 wrote to memory of 3056 3048 b24ae256e79c5cd20f96a6fd60c5981e.exe 28 PID 3048 wrote to memory of 3056 3048 b24ae256e79c5cd20f96a6fd60c5981e.exe 28 PID 3048 wrote to memory of 3056 3048 b24ae256e79c5cd20f96a6fd60c5981e.exe 28 PID 3048 wrote to memory of 3056 3048 b24ae256e79c5cd20f96a6fd60c5981e.exe 28 PID 3056 wrote to memory of 1768 3056 Unicorn-15496.exe 29 PID 3056 wrote to memory of 1768 3056 Unicorn-15496.exe 29 PID 3056 wrote to memory of 1768 3056 Unicorn-15496.exe 29 PID 3056 wrote to memory of 1768 3056 Unicorn-15496.exe 29 PID 3048 wrote to memory of 1764 3048 b24ae256e79c5cd20f96a6fd60c5981e.exe 30 PID 3048 wrote to memory of 1764 3048 b24ae256e79c5cd20f96a6fd60c5981e.exe 30 PID 3048 wrote to memory of 1764 3048 b24ae256e79c5cd20f96a6fd60c5981e.exe 30 PID 3048 wrote to memory of 1764 3048 b24ae256e79c5cd20f96a6fd60c5981e.exe 30 PID 1768 wrote to memory of 2632 1768 Unicorn-17718.exe 31 PID 1768 wrote to memory of 2632 1768 Unicorn-17718.exe 31 PID 1768 wrote to memory of 2632 1768 Unicorn-17718.exe 31 PID 1768 wrote to memory of 2632 1768 Unicorn-17718.exe 31 PID 3056 wrote to memory of 2856 3056 Unicorn-15496.exe 32 PID 3056 wrote to memory of 2856 3056 Unicorn-15496.exe 32 PID 3056 wrote to memory of 2856 3056 Unicorn-15496.exe 32 PID 3056 wrote to memory of 2856 3056 Unicorn-15496.exe 32 PID 1764 wrote to memory of 2512 1764 Unicorn-1936.exe 33 PID 1764 wrote to memory of 2512 1764 Unicorn-1936.exe 33 PID 1764 wrote to memory of 2512 1764 Unicorn-1936.exe 33 PID 1764 wrote to memory of 2512 1764 Unicorn-1936.exe 33 PID 2632 wrote to memory of 3020 2632 Unicorn-37152.exe 34 PID 2632 wrote to memory of 3020 2632 Unicorn-37152.exe 34 PID 2632 wrote to memory of 3020 2632 Unicorn-37152.exe 34 PID 2632 wrote to memory of 3020 2632 Unicorn-37152.exe 34 PID 1768 wrote to memory of 1908 1768 Unicorn-17718.exe 35 PID 1768 wrote to memory of 1908 1768 Unicorn-17718.exe 35 PID 1768 wrote to memory of 1908 1768 Unicorn-17718.exe 35 PID 1768 wrote to memory of 1908 1768 Unicorn-17718.exe 35 PID 2856 wrote to memory of 2900 2856 Unicorn-62403.exe 36 PID 2856 wrote to memory of 2900 2856 Unicorn-62403.exe 36 PID 2856 wrote to memory of 2900 2856 Unicorn-62403.exe 36 PID 2856 wrote to memory of 2900 2856 Unicorn-62403.exe 36 PID 2512 wrote to memory of 2612 2512 Unicorn-55626.exe 38 PID 2512 wrote to memory of 2612 2512 Unicorn-55626.exe 38 PID 2512 wrote to memory of 2612 2512 Unicorn-55626.exe 38 PID 2512 wrote to memory of 2612 2512 Unicorn-55626.exe 38 PID 1764 wrote to memory of 2336 1764 Unicorn-1936.exe 37 PID 1764 wrote to memory of 2336 1764 Unicorn-1936.exe 37 PID 1764 wrote to memory of 2336 1764 Unicorn-1936.exe 37 PID 1764 wrote to memory of 2336 1764 Unicorn-1936.exe 37 PID 3020 wrote to memory of 2604 3020 Unicorn-53571.exe 39 PID 3020 wrote to memory of 2604 3020 Unicorn-53571.exe 39 PID 3020 wrote to memory of 2604 3020 Unicorn-53571.exe 39 PID 3020 wrote to memory of 2604 3020 Unicorn-53571.exe 39 PID 2632 wrote to memory of 580 2632 Unicorn-37152.exe 40 PID 2632 wrote to memory of 580 2632 Unicorn-37152.exe 40 PID 2632 wrote to memory of 580 2632 Unicorn-37152.exe 40 PID 2632 wrote to memory of 580 2632 Unicorn-37152.exe 40 PID 2900 wrote to memory of 1676 2900 Unicorn-31013.exe 41 PID 2900 wrote to memory of 1676 2900 Unicorn-31013.exe 41 PID 2900 wrote to memory of 1676 2900 Unicorn-31013.exe 41 PID 2900 wrote to memory of 1676 2900 Unicorn-31013.exe 41 PID 2336 wrote to memory of 1572 2336 Unicorn-32335.exe 46 PID 2336 wrote to memory of 1572 2336 Unicorn-32335.exe 46 PID 2336 wrote to memory of 1572 2336 Unicorn-32335.exe 46 PID 2336 wrote to memory of 1572 2336 Unicorn-32335.exe 46 PID 2612 wrote to memory of 1268 2612 Unicorn-33151.exe 45 PID 2612 wrote to memory of 1268 2612 Unicorn-33151.exe 45 PID 2612 wrote to memory of 1268 2612 Unicorn-33151.exe 45 PID 2612 wrote to memory of 1268 2612 Unicorn-33151.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\b24ae256e79c5cd20f96a6fd60c5981e.exe"C:\Users\Admin\AppData\Local\Temp\b24ae256e79c5cd20f96a6fd60c5981e.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15496.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15496.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17718.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17718.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37152.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37152.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-53571.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53571.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54422.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54422.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26758.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26758.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-24895.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24895.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-53519.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53519.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17052.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17052.exe10⤵PID:2816
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28173.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28173.exe11⤵PID:2620
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56835.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56835.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-20046.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20046.exe9⤵
- Executes dropped EXE
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-56185.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56185.exe10⤵PID:1776
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23311.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23311.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15439.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15439.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:628 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-32702.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32702.exe9⤵PID:2388
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19144.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19144.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:432 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-43177.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43177.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11163.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11163.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2624 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-42604.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42604.exe9⤵
- Executes dropped EXE
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50155.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50155.exe10⤵PID:1756
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56835.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56835.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-41987.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41987.exe8⤵PID:2872
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11998.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11998.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:580 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60006.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60006.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1140 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27417.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27417.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-25554.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25554.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1848 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6600.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6600.exe9⤵PID:2496
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52651.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52651.exe10⤵PID:2164
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52760.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52760.exe9⤵PID:896
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52751.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52751.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2948 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-57098.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57098.exe8⤵
- Suspicious use of SetWindowsHookEx
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38183.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38183.exe9⤵PID:2080
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6600.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6600.exe10⤵PID:2336
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60644.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60644.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37806.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37806.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1100 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50772.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50772.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46792.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46792.exe9⤵
- Suspicious use of SetWindowsHookEx
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44405.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44405.exe10⤵PID:2684
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62983.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62983.exe11⤵PID:464
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37789.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37789.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11251.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11251.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:528 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23695.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23695.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-25554.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25554.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37711.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37711.exe8⤵PID:1312
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36933.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36933.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2600 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60473.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60473.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-42604.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42604.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3512.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3512.exe8⤵PID:2296
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64545.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64545.exe9⤵PID:2376
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62403.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62403.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-31013.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31013.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3083.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3083.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37448.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37448.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23141.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23141.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-43933.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43933.exe8⤵PID:1392
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1137.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1137.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-41987.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41987.exe7⤵PID:2060
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10549.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10549.exe8⤵PID:1152
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62699.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62699.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-56389.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56389.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30264.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30264.exe7⤵PID:2112
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6600.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6600.exe8⤵PID:1984
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52839.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52839.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-1568.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1568.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14780.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14780.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-20041.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20041.exe7⤵
- Suspicious use of SetWindowsHookEx
PID:1292 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-8930.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8930.exe8⤵PID:2356
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22309.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22309.exe9⤵PID:1616
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59082.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59082.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-56377.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56377.exe6⤵PID:868
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1936.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1936.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1764 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-55626.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55626.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-33151.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33151.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21558.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21558.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-56799.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56799.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17303.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17303.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1224 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6600.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6600.exe8⤵PID:2564
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3166.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3166.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2500 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-19429.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19429.exe7⤵PID:1624
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49186.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49186.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17303.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17303.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:616 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30243.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30243.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-31691.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31691.exe8⤵PID:2952
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62983.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62983.exe9⤵PID:544
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13944.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13944.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:564 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-31226.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31226.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:796 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27801.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27801.exe6⤵
- Executes dropped EXE
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48676.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48676.exe7⤵PID:2512
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3659.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3659.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-63216.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63216.exe6⤵
- Executes dropped EXE
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-63237.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63237.exe7⤵PID:1476
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32335.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32335.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21558.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21558.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-55922.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55922.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:944 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-41987.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41987.exe6⤵PID:2904
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42086.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42086.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:368 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23525.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23525.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-41987.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41987.exe6⤵PID:1568
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD551508e4c690e983f1e349d5c0de95ed2
SHA1e7535eddc4c23322450cbaabf17cb58d33faf890
SHA2560e188cd40a25403a92421d6dd1ef92ad2915b33b250efa7352eab7e77491f828
SHA512c2f5b02c75eebd4784c51d77dff729e3f58c0e97e1b0d84b02f87d635004205f1081e23bf185256e3a9498bbb68f39fe42d9c114c90fe6e988bf6b2a193b4e33
-
Filesize
184KB
MD5a0aa36a70c0bad53fbe99e0bdc538ed8
SHA1a3e7c9063d0e46096f22ec9b744d6391057905c2
SHA2568c5c3e4f74fb18de9cc3c89b7a486f521bf8751c69255ae0ac0a4627e1473d58
SHA512c2014094061ed8db816d251487c56fd5f467d329fb7fb49e6d4f77bb9522b150b7d6b5689e6c788f9cf9510f3e4f182ff4b4e2ed945cd9ac96f45248bd5a0100
-
Filesize
184KB
MD5a7b67ba79cfeb330db6526619bd103f0
SHA19d81c70a6d12eb73a3bb331f379b1ce7704ca4c6
SHA25693a1752ee7bc2488b8796e461aed07825c3435070b719ddbc990d9d64c0f1962
SHA512e2e4a2324fe73ee9871e5b5c2ee6843aa812349565039976222bd99e803b48811a24518d05bccd812b3a6b6c03913db59ee8c460a8337e5baa6f24522759dfae
-
Filesize
184KB
MD530ed2b329bee22a4240cd41c7f992ee3
SHA1f8274b3a4bbfe5e68e66a9f995d764fa4a8d47ec
SHA256efdd6e49e0787f8a87b1058ec0a59c554c3740353d5d9ada2c0dff2f6dc3aa18
SHA5129950419990cf8b580f3831c9cff2c1c83763026d2ecb8228639a3bdc95652e68fa0eb4468e2f119017e22ba844a8476bb568febc91187dafe04ce9822abe6601
-
Filesize
184KB
MD58f30cc47159007df8bd3f7a6f4ea5639
SHA1e29c00989a88da186b9bdf4f5ec277c1435f9a29
SHA25656fc39643bc7f5a67deae48afe4ea6e5571d6a70063091372ced3502b0f5824f
SHA51286707e41df209a07b8bf993e6a0d38ccb2df7496b998ad3b2ddf4eab5f730b3ac8791b09945f1df733960543b15d5755bc6401b0660aa053e9ba76a46b6f6167
-
Filesize
184KB
MD52e28adc08b2df37bab1d34fd9dd35dbe
SHA11f91927705e13dc514bd40af29a798101aedcd29
SHA2561d5e54938bc4766d8442a2e3cefc415242db592c2bc0093a9c14e3849cc38c78
SHA512a7880dc2964c9559d92411c28f9f7272b16e14cab99cd191166c388c670f8e8fca61b706675897fd38116d5a6fc295296ff96c29133e7a5e5c1199237d526b9b
-
Filesize
184KB
MD5b30ff5af4ee31e5122a83dedff7b9f09
SHA1bb519d3df29e5db21b4dc193a3656db3db2c6337
SHA25680b6634edc8308f783b5f3060322560a6fdb3b7ce23a7d3d32a115b4c2957f02
SHA51239f8617f1ce3f7612c878cb704996598470f1276526a59ef6b2c937d2d4937430ff377985fb6f0a9c5b7125ef0a72584b7b0cb83a65e06d58fa3b0720bb1ca86
-
Filesize
184KB
MD598b68a594a89a7b97ad4688a2c1f7a0c
SHA1ea2e7d16bf32418f1602e514c3f361a90d4f960e
SHA25622b2da70e82a2c7dfc94e8d4728218bb25ee4ac7fccf50fdec3bf1078555808d
SHA512bb01d6427d8855d1261ab6d0e2f4c36a914efe50b29cd8c4a6e7bace18d3049e6f1a51c0394896508e534275d562c5965120977fed5c6c90b2a86a3ca0420608
-
Filesize
184KB
MD5a892fa716c29925b277d564b642c2ca1
SHA1007a30f8f50adc87530e5cb260a4ee7823d96a31
SHA256e094906271a966cb937e68df3399f148c9290382a408858ef52c0f02a79c1344
SHA5122dbe70f66da21c4543da484104a1313e22fddf634ef9192ffda73a2713b6de45cfad4f9dbf2ee48dd6baf3fe4fc9bb84f10d07e38458df58836d6aca29ef7c84
-
Filesize
184KB
MD50e260c1083a7bf946e525f866af59e5d
SHA1a07d259f38b63597c5e6199043dc01f655615e28
SHA25696fec99fe77e9d101fa5bcd78fc40fc6573554fc003055813e5d00293bd3aecf
SHA5121456654b78f2773c722ae1ef85ffd032efeae373428af9e02a79abcac8c55a28cbf4642b2ff363418d0d6ffac62fd9988e89d258ba65150d47e65747ea29a3fd
-
Filesize
184KB
MD5f4daac7ccff7afe565f97aa3da9d2f28
SHA17b4ab0795ccef8fe82e68ba972d5c201c158a6c4
SHA256723c3f9b35d7d3b586f943a34a58be742c8a863cba54e969692ee300cd7d00d9
SHA51234d7f9342ff3abc3871fdad45f85d6d06eebd8c4667b7f90f1b0fad2bf3db4ca81c40d26c77cc82f7468b6a7d7359c6d0041bcf5cb8589c8d0ee916ec29c4003
-
Filesize
64KB
MD576b7688af101d2c32f02f9a4e8f8807c
SHA19a1f56b7e1681bbdfb8554758964613cf6710f13
SHA256a244f991f9eb5f861335d5eabbff86f36157f12c43ff107244c7eafb22ab0db5
SHA51246d27bd0376c573c26464bb98f4dc21187f798d6ffdd42f862db6c7d74c13235f1476447af1514b68fd9bb53622133a703690d8617a7b7fc3f9d019cfd2385e9
-
Filesize
184KB
MD5d84301b35019abdc09e806251d5c1863
SHA186c19713c09c308b35a0665c700302c3c04bb07d
SHA25665def7467606ea530e6979f4a828a28123e30a7551ea6f1a333fd9cff966084b
SHA512842f3af795535552d218ecfb1af370251ca96c568cc0192f9b2ff381f87b73ad0e61b38e463352506304f053080df738ff7473479906c0f41600a39dfd6abab3
-
Filesize
184KB
MD5d46ab6b5cf7bfd39b1721ca0de6a457e
SHA1fed98cb5a1e8523417072e0d451690d1ff826bd6
SHA256e1e40ada13378397c5b9d2eb51d250343dcf888da6c58db334f02d88a23e2c8a
SHA5128769a469209a5802e3837711046ddecf753218daa8e3007e542aef8025de90bd27594d92196a7da8b89212584f5484084940fff91b4786d59ee900ccae085fc8
-
Filesize
184KB
MD51893e9f86a32263ab27d32df767ecfd1
SHA1790b53a51b05f2e093659f922ec37cb5662080c2
SHA25682e6002cc6cad5167a3857b79fb64b874a03060101b2e49d13ee534c3bf40192
SHA5124596def4d36861e68287ab67c25d502a1efe492211a6ce5876631f65b3c79c9448c10dff0790a36c7dfa1fb115f5951c2d74fb600d3bdbee3f9cf73afdefd20b
-
Filesize
184KB
MD5879269332f371f73b58673c9729525b5
SHA14d4c69526ad2d0f8b60539f5432a86830595117a
SHA256e20ca31f589d8c0c7e2243f2d8ee2fafaa88a3c430694ebe035404049944ce3a
SHA512f16c6bcc18e576a8c2566ff51758fc8b92a9b0a39e530c2d414002eb66f76a8a1eec43798bf66c74d9f00cabb5e0a7faf2eaf04117c5ef1e25d1c543da89a820
-
Filesize
184KB
MD5a34a43415a7d48791c5644c7374c24db
SHA15f8a7903c9eaef0e68fd663fe0a1c67c0745d1af
SHA256c4894554d718e28872b67133456469c89b5a795648c53904bbe989d93fca951e
SHA512ed0f7f4a836588655c060fce098dcf0a77343afbe775a6a956228aba7256740c03b33470f73e6987a6ec6438ffb0b19fb36ede7694f40eb02c8cb238912659f2
-
Filesize
184KB
MD5760ace4405a8d931b2a0f269e8e1ada5
SHA15f58d4872910cf722798b128014edd2e29b5602a
SHA2563d2bfb2c24773373446ab9b99edb20d1908d25a8bad5204443247a93abce0c77
SHA51216a481f324d1bc2371cd8fa408a4332b28af6cd0e439d56849bc93d899c5b606eb706b39355867075acf32e53fddf8ae7ee76f05367a30c1745ffde03b134d3d