Analysis
-
max time kernel
84s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
22-12-2023 16:38
Static task
static1
Behavioral task
behavioral1
Sample
f560959436967b8ac28e7e05196cc3fe.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
f560959436967b8ac28e7e05196cc3fe.exe
Resource
win10v2004-20231215-en
General
-
Target
f560959436967b8ac28e7e05196cc3fe.exe
-
Size
184KB
-
MD5
f560959436967b8ac28e7e05196cc3fe
-
SHA1
2a8a29591eab4ff501a0efe5a299e8bc214c1807
-
SHA256
03262a294cd84785b7d334334ac9306ec064f34627238c299a418b7579b7aa9e
-
SHA512
28b012242c65c29858d0594532107c89c4b9e5abb0943ce9035a59165de4e07ba8311901a75463e4907e956a1276f4aba97bba330bfcffa8770f68ae7442c0e0
-
SSDEEP
3072:XTzzomEqnbwMX8j1qmtYpJS89rDJdLIl4jxVgoYsxlv1pFQ:XTvoG8MXEqqYpJJcKnxlv1pF
Malware Config
Signatures
-
Executes dropped EXE 46 IoCs
pid Process 2968 Unicorn-32390.exe 1208 Unicorn-25374.exe 2072 Unicorn-1424.exe 2716 Unicorn-38263.exe 2608 Unicorn-27403.exe 2496 Unicorn-54045.exe 2532 Unicorn-52182.exe 2156 Unicorn-50599.exe 2336 Unicorn-39738.exe 2444 Unicorn-55244.exe 1640 Unicorn-27210.exe 2184 Unicorn-31316.exe 1812 Unicorn-45706.exe 1520 Unicorn-21756.exe 2844 Unicorn-22655.exe 1768 Unicorn-64818.exe 324 Unicorn-60179.exe 2888 Unicorn-34859.exe 1508 Unicorn-54725.exe 1800 Unicorn-15831.exe 2016 Unicorn-10350.exe 1548 Unicorn-40055.exe 808 Unicorn-45255.exe 1608 Unicorn-21794.exe 3016 Unicorn-56085.exe 2648 Unicorn-43833.exe 2660 Unicorn-31389.exe 2728 Unicorn-49863.exe 2572 Unicorn-45779.exe 2616 Unicorn-19137.exe 2592 Unicorn-58031.exe 2452 Unicorn-45826.exe 2508 Unicorn-17792.exe 2368 Unicorn-60216.exe 1916 Unicorn-36266.exe 2520 Unicorn-31436.exe 1100 Unicorn-27352.exe 2340 Unicorn-64876.exe 1448 Unicorn-45011.exe 2792 Unicorn-36842.exe 644 Unicorn-17814.exe 1216 Unicorn-40180.exe 1232 Unicorn-20314.exe 2304 Unicorn-12146.exe 1880 Unicorn-61368.exe 708 Unicorn-6692.exe -
Loads dropped DLL 64 IoCs
pid Process 2904 f560959436967b8ac28e7e05196cc3fe.exe 2904 f560959436967b8ac28e7e05196cc3fe.exe 2968 Unicorn-32390.exe 2968 Unicorn-32390.exe 2904 f560959436967b8ac28e7e05196cc3fe.exe 2904 f560959436967b8ac28e7e05196cc3fe.exe 1208 Unicorn-25374.exe 1208 Unicorn-25374.exe 2968 Unicorn-32390.exe 2968 Unicorn-32390.exe 2072 Unicorn-1424.exe 2072 Unicorn-1424.exe 2716 Unicorn-38263.exe 2716 Unicorn-38263.exe 2072 Unicorn-1424.exe 2072 Unicorn-1424.exe 2496 Unicorn-54045.exe 2496 Unicorn-54045.exe 2532 Unicorn-52182.exe 2532 Unicorn-52182.exe 2716 Unicorn-38263.exe 2716 Unicorn-38263.exe 2156 Unicorn-50599.exe 2156 Unicorn-50599.exe 2336 Unicorn-39738.exe 2336 Unicorn-39738.exe 2496 Unicorn-54045.exe 2496 Unicorn-54045.exe 2444 Unicorn-55244.exe 2444 Unicorn-55244.exe 2532 Unicorn-52182.exe 2532 Unicorn-52182.exe 1640 Unicorn-27210.exe 1640 Unicorn-27210.exe 1812 Unicorn-45706.exe 2336 Unicorn-39738.exe 1812 Unicorn-45706.exe 2336 Unicorn-39738.exe 1520 Unicorn-21756.exe 1520 Unicorn-21756.exe 2844 Unicorn-22655.exe 2844 Unicorn-22655.exe 1768 Unicorn-64818.exe 1768 Unicorn-64818.exe 324 Unicorn-60179.exe 324 Unicorn-60179.exe 2016 Unicorn-10350.exe 2016 Unicorn-10350.exe 1548 Unicorn-40055.exe 1548 Unicorn-40055.exe 2888 Unicorn-34859.exe 2888 Unicorn-34859.exe 1800 Unicorn-15831.exe 1800 Unicorn-15831.exe 2184 Unicorn-31316.exe 2184 Unicorn-31316.exe 1508 Unicorn-54725.exe 1508 Unicorn-54725.exe 808 Unicorn-45255.exe 808 Unicorn-45255.exe 1608 Unicorn-21794.exe 1608 Unicorn-21794.exe 3016 Unicorn-56085.exe 3016 Unicorn-56085.exe -
Suspicious use of SetWindowsHookEx 45 IoCs
pid Process 2904 f560959436967b8ac28e7e05196cc3fe.exe 2968 Unicorn-32390.exe 1208 Unicorn-25374.exe 2072 Unicorn-1424.exe 2608 Unicorn-27403.exe 2716 Unicorn-38263.exe 2496 Unicorn-54045.exe 2532 Unicorn-52182.exe 2156 Unicorn-50599.exe 2336 Unicorn-39738.exe 2444 Unicorn-55244.exe 1640 Unicorn-27210.exe 1812 Unicorn-45706.exe 1520 Unicorn-21756.exe 1768 Unicorn-64818.exe 2844 Unicorn-22655.exe 324 Unicorn-60179.exe 2888 Unicorn-34859.exe 2016 Unicorn-10350.exe 1800 Unicorn-15831.exe 1548 Unicorn-40055.exe 1508 Unicorn-54725.exe 808 Unicorn-45255.exe 2184 Unicorn-31316.exe 1608 Unicorn-21794.exe 3016 Unicorn-56085.exe 2648 Unicorn-43833.exe 2660 Unicorn-31389.exe 2728 Unicorn-49863.exe 2572 Unicorn-45779.exe 2616 Unicorn-19137.exe 2592 Unicorn-58031.exe 2452 Unicorn-45826.exe 2508 Unicorn-17792.exe 2368 Unicorn-60216.exe 2520 Unicorn-31436.exe 1100 Unicorn-27352.exe 2340 Unicorn-64876.exe 1916 Unicorn-36266.exe 1216 Unicorn-40180.exe 1448 Unicorn-45011.exe 644 Unicorn-17814.exe 2792 Unicorn-36842.exe 1232 Unicorn-20314.exe 2304 Unicorn-12146.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2904 wrote to memory of 2968 2904 f560959436967b8ac28e7e05196cc3fe.exe 28 PID 2904 wrote to memory of 2968 2904 f560959436967b8ac28e7e05196cc3fe.exe 28 PID 2904 wrote to memory of 2968 2904 f560959436967b8ac28e7e05196cc3fe.exe 28 PID 2904 wrote to memory of 2968 2904 f560959436967b8ac28e7e05196cc3fe.exe 28 PID 2968 wrote to memory of 1208 2968 Unicorn-32390.exe 29 PID 2968 wrote to memory of 1208 2968 Unicorn-32390.exe 29 PID 2968 wrote to memory of 1208 2968 Unicorn-32390.exe 29 PID 2968 wrote to memory of 1208 2968 Unicorn-32390.exe 29 PID 2904 wrote to memory of 2072 2904 f560959436967b8ac28e7e05196cc3fe.exe 30 PID 2904 wrote to memory of 2072 2904 f560959436967b8ac28e7e05196cc3fe.exe 30 PID 2904 wrote to memory of 2072 2904 f560959436967b8ac28e7e05196cc3fe.exe 30 PID 2904 wrote to memory of 2072 2904 f560959436967b8ac28e7e05196cc3fe.exe 30 PID 1208 wrote to memory of 2608 1208 Unicorn-25374.exe 31 PID 1208 wrote to memory of 2608 1208 Unicorn-25374.exe 31 PID 1208 wrote to memory of 2608 1208 Unicorn-25374.exe 31 PID 1208 wrote to memory of 2608 1208 Unicorn-25374.exe 31 PID 2968 wrote to memory of 2716 2968 Unicorn-32390.exe 32 PID 2968 wrote to memory of 2716 2968 Unicorn-32390.exe 32 PID 2968 wrote to memory of 2716 2968 Unicorn-32390.exe 32 PID 2968 wrote to memory of 2716 2968 Unicorn-32390.exe 32 PID 2072 wrote to memory of 2496 2072 Unicorn-1424.exe 33 PID 2072 wrote to memory of 2496 2072 Unicorn-1424.exe 33 PID 2072 wrote to memory of 2496 2072 Unicorn-1424.exe 33 PID 2072 wrote to memory of 2496 2072 Unicorn-1424.exe 33 PID 2716 wrote to memory of 2532 2716 Unicorn-38263.exe 34 PID 2716 wrote to memory of 2532 2716 Unicorn-38263.exe 34 PID 2716 wrote to memory of 2532 2716 Unicorn-38263.exe 34 PID 2716 wrote to memory of 2532 2716 Unicorn-38263.exe 34 PID 2072 wrote to memory of 2156 2072 Unicorn-1424.exe 35 PID 2072 wrote to memory of 2156 2072 Unicorn-1424.exe 35 PID 2072 wrote to memory of 2156 2072 Unicorn-1424.exe 35 PID 2072 wrote to memory of 2156 2072 Unicorn-1424.exe 35 PID 2496 wrote to memory of 2336 2496 Unicorn-54045.exe 36 PID 2496 wrote to memory of 2336 2496 Unicorn-54045.exe 36 PID 2496 wrote to memory of 2336 2496 Unicorn-54045.exe 36 PID 2496 wrote to memory of 2336 2496 Unicorn-54045.exe 36 PID 2532 wrote to memory of 2444 2532 Unicorn-52182.exe 37 PID 2532 wrote to memory of 2444 2532 Unicorn-52182.exe 37 PID 2532 wrote to memory of 2444 2532 Unicorn-52182.exe 37 PID 2532 wrote to memory of 2444 2532 Unicorn-52182.exe 37 PID 2716 wrote to memory of 1640 2716 Unicorn-38263.exe 38 PID 2716 wrote to memory of 1640 2716 Unicorn-38263.exe 38 PID 2716 wrote to memory of 1640 2716 Unicorn-38263.exe 38 PID 2716 wrote to memory of 1640 2716 Unicorn-38263.exe 38 PID 2156 wrote to memory of 2184 2156 Unicorn-50599.exe 39 PID 2156 wrote to memory of 2184 2156 Unicorn-50599.exe 39 PID 2156 wrote to memory of 2184 2156 Unicorn-50599.exe 39 PID 2156 wrote to memory of 2184 2156 Unicorn-50599.exe 39 PID 2336 wrote to memory of 1812 2336 Unicorn-39738.exe 40 PID 2336 wrote to memory of 1812 2336 Unicorn-39738.exe 40 PID 2336 wrote to memory of 1812 2336 Unicorn-39738.exe 40 PID 2336 wrote to memory of 1812 2336 Unicorn-39738.exe 40 PID 2496 wrote to memory of 1520 2496 Unicorn-54045.exe 41 PID 2496 wrote to memory of 1520 2496 Unicorn-54045.exe 41 PID 2496 wrote to memory of 1520 2496 Unicorn-54045.exe 41 PID 2496 wrote to memory of 1520 2496 Unicorn-54045.exe 41 PID 2444 wrote to memory of 2844 2444 Unicorn-55244.exe 42 PID 2444 wrote to memory of 2844 2444 Unicorn-55244.exe 42 PID 2444 wrote to memory of 2844 2444 Unicorn-55244.exe 42 PID 2444 wrote to memory of 2844 2444 Unicorn-55244.exe 42 PID 2532 wrote to memory of 1768 2532 Unicorn-52182.exe 44 PID 2532 wrote to memory of 1768 2532 Unicorn-52182.exe 44 PID 2532 wrote to memory of 1768 2532 Unicorn-52182.exe 44 PID 2532 wrote to memory of 1768 2532 Unicorn-52182.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\f560959436967b8ac28e7e05196cc3fe.exe"C:\Users\Admin\AppData\Local\Temp\f560959436967b8ac28e7e05196cc3fe.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-32390.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32390.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-25374.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25374.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27403.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27403.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2608
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38263.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38263.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-52182.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52182.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-55244.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55244.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22655.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22655.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10350.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10350.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21794.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21794.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1608 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58031.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58031.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17814.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17814.exe10⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:644 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15566.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15566.exe11⤵PID:2844
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51612.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51612.exe12⤵PID:2544
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32015.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32015.exe13⤵PID:856
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31746.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31746.exe11⤵PID:1788
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6583.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6583.exe10⤵PID:1960
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51612.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51612.exe11⤵PID:2764
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9586.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9586.exe12⤵PID:2096
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20314.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20314.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1232 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15566.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15566.exe10⤵PID:2384
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4165.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4165.exe11⤵PID:1988
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9586.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9586.exe12⤵PID:1392
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33500.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33500.exe10⤵PID:1264
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64818.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64818.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40055.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40055.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-56085.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56085.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45826.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45826.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2452 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61368.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61368.exe9⤵
- Executes dropped EXE
PID:1880 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-63973.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63973.exe10⤵PID:2492
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23687.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23687.exe9⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64440.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64440.exe10⤵PID:884
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6692.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6692.exe8⤵
- Executes dropped EXE
PID:708 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-42820.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42820.exe9⤵PID:1336
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17792.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17792.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5945.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5945.exe8⤵PID:996
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27025.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27025.exe9⤵PID:2804
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60444.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60444.exe8⤵PID:1552
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27210.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27210.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60179.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60179.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:324 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45255.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45255.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:808 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45779.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45779.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2572 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-64876.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64876.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-53091.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53091.exe9⤵PID:1480
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61918.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61918.exe10⤵PID:2888
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42052.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42052.exe9⤵PID:1136
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25057.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25057.exe8⤵PID:2124
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26724.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26724.exe9⤵PID:3044
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36842.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36842.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10112.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10112.exe8⤵PID:272
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42052.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42052.exe8⤵PID:284
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1424.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1424.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54045.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54045.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-39738.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39738.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45706.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45706.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54725.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54725.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-19137.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19137.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40180.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40180.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-25873.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25873.exe9⤵PID:2000
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43636.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43636.exe10⤵PID:2940
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23770.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23770.exe9⤵PID:2408
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55208.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55208.exe8⤵PID:1816
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4165.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4165.exe9⤵PID:2204
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25020.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25020.exe10⤵PID:1348
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12146.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12146.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2304 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-28395.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28395.exe8⤵PID:324
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4165.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4165.exe9⤵PID:240
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60719.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60719.exe8⤵PID:624
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34859.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34859.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-43833.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43833.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60216.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60216.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-59230.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59230.exe8⤵PID:800
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31196.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31196.exe7⤵PID:2840
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14772.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14772.exe8⤵PID:1772
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36266.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36266.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-31746.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31746.exe7⤵PID:2776
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21756.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21756.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15831.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15831.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-31389.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31389.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27352.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27352.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1100 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18966.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18966.exe8⤵PID:1504
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61430.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61430.exe7⤵PID:2236
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51612.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51612.exe8⤵PID:1372
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45011.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45011.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9536.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9536.exe7⤵PID:2912
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34507.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34507.exe8⤵PID:1748
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50599.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50599.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-31316.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31316.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49863.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49863.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-31436.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31436.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35302.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35302.exe7⤵PID:2576
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12634.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12634.exe8⤵PID:2072
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31746.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31746.exe7⤵PID:1632
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37994.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37994.exe6⤵PID:1896
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63781.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63781.exe7⤵PID:2044
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
118KB
MD501a686423b0f6d47cd97806d4b9d06a6
SHA1dad06ee0ed28f3dcaf8fb7d49357606b9a1c53e2
SHA256c19c38e596d9f9eb1c6f79ba6f95f03e95abfa6f62ec654d986c02d10621e828
SHA51272b0eda6596c8c4dc68310f68c0f3b004b4ae044720706bec25f663e12705fac11f28e598479198310bb063db69c05dc56c8baca66256517146c9aa0a3788618
-
Filesize
184KB
MD5f786e4ea34df327ade65dcf182c9927c
SHA16834e36c9584a7b31a46736c7b2c4c1b791be969
SHA256480e9e45c024ca3e93a9074beae8958136293262d7fa87a9ac2f4b8c4760978f
SHA5126053343b371fe318d6426bc5be4b9c1f9ea791f869d7295c0dcda86ffe1a3c1dcb1de537c9982f57c54b081bf7ce79703c259d6ad80a7b182c51a03e01d585f3
-
Filesize
175KB
MD582a74ee936aeceac535fc62a6352525f
SHA1fdd7d2074742a0bba68c97a81907c430403f54f5
SHA25613aaa8f379667bad6a8b2250cbb0125baf470005088cbdd8b3d45a9f3f801fe3
SHA51287fc9b3eeca47c3a4a06bfd0caac7f48e2a210a82e04698bd84e6a2f6c8e61841a7424b1b61913759bf106ff58714de49d4264fb2fcd7350d772f525519c5f08
-
Filesize
65KB
MD5ee5126c9a83de1b60ed7047f88efbcf0
SHA16dd68ccd0c66dcf9bfa3d120bd6b632a886654b8
SHA25653a7179c10c1f34274a908c6d7edcfe765fafe126269a76193bb7cd57d0b0c30
SHA51221c8617739fdbfc5e583020b57fe13b38c5109b34616c1ac994e7d2a8c89d8c13975c1b4f70526633d68cccff095d4ec8e49bc7aeacfbcb6a91b719dbc4ab767
-
Filesize
184KB
MD58497767fb8c6b2874331254f3be27d04
SHA1ece1c109e8fcabf106663cc8be23c73948a7a941
SHA25614b29034eb70d548d498b2d77f6186cea29f7acd3816feca213ed6ec38d93b0a
SHA512045ddbb12b602d0e2b47b32fdd75151fed55ce60a6e103a74cca0b9cf067c0790be16d604c3c6b1e07076fdbeaca2ea3661267708abfc8de7bc7d1a1efc1ced1
-
Filesize
184KB
MD5e59f95c0257cb4459f4f6bb1789b0310
SHA1ac699c41bbfd1ce2d4eda3e9d1f5a44ff9a5b3c5
SHA256ef06c8cff71ecd37dcc1d2b0cfebda40556be37398bc73aea185b9489cb9f68a
SHA512c06b56faaa5a69cf64319d06b7507bfca585058c12f278c43fc15b84f7984e9761bd79fcbcfa0be641873863ccf9082026731b78ce2022b7f95939c700f71b10
-
Filesize
64KB
MD5bf99f387e3d63a484828f2da1c882966
SHA1d6d16d2a50e643464143e06dc8f3e5862f844a2f
SHA25668b2e27a5732cb529584e8f12002232ce2e3a6b8e7343ffd0dddbb090f89ab46
SHA512a47060048ffa6361b604abcd818f3bbc2e8db986fea67a3c976139a8817717cf6c1dc4d2a85262edcc06c69e483a996ae04379506d9724a640327a4fb0c24f49
-
Filesize
184KB
MD515c96103d1f84d241ed2b30bf9790719
SHA180eb8cc23ba96512f0b2d13485cb7e4ca2ea2fab
SHA2564fa2e10ae4da67191f4bb750a400c65809dfc9f4d4f04f2ee1b350eabc552499
SHA512a7804d8eb68ec45a5bd4c7c4941879840b2fe8965cd3688cc002988098b7ae784b9bd0c80b8bd6293a0799c5114243a21198ee4499f4d090be27064bfc09a0ce
-
Filesize
184KB
MD509bf0599df0157081a716fe5e5ffaee6
SHA12fe7d6187ad66be63ba045e54ba4312180cccbf6
SHA256a9874ea559241c2d0fd4d80acbcdd0c26056406c7be28ddcbe933956781f575a
SHA5122d54cd94c14573859ab820679cbf5286d1c1eeb452ba42291dbdd9e21fee8dd5b9a327b1efc3dd16edd2a85db3b2389bfb8dd473f0fc3b57e0b6d63da3e6ed8b
-
Filesize
184KB
MD5bdd148e918db589c6b8779342bde47fa
SHA1e316a46bf138cd069573f92314a529cf2d7aae8e
SHA2566c37715c7bf67d23c482760ab4c5d5ec407c71dc4cdad1007fd6f5c61dac5dd9
SHA512597d2dc5df958db6efe34d2adffbd120c422e09b8bf8e71bf3f875129a8495420468f064f8369bfb49513de1df35fbc539e8ef63ebffacd8d087d1da152cdde4
-
Filesize
184KB
MD5205b28a9e663ff0faf6a25f3fdae1f43
SHA1767772edcf91c5943a43744dc09dc81e0e7b0a91
SHA2561f3d910364198d73c990d349d62fdebadf2c51aa9949341455dd3a87955598d5
SHA51240fc9cd616793757e3d1592cead9f7af08b4e70c201f21587e1451c85af1f8c07cba08aae41da2ef1c18f3016ed85f30f14fadb780cbc193b42cf6f1118f9d52
-
Filesize
45KB
MD5e8dab38125047c9ffacb8977e706c45c
SHA17d5f40441d5183829540c92bcedf2c7b96776423
SHA256231270c7f2bb6d21962884ebaf06f5db2bbe9ff8eac8c2395659dcfeccf2f506
SHA512820767955c592a40be04b91bc9ebb4dfb98e51c9656c1d3f5db9884a3d9edc349031fdaa3a9b15bc3512136c0c6c24a2b14c881efebdd8158806448678ec5402
-
Filesize
160KB
MD5f088cedc96a6059fac5d0e8476fb2b1d
SHA106e1cc0f35ee23aba1c5b96a5b2260b536d7dd34
SHA2562d251aa3ba6c60fee3d8e64942a01152b6f92371ea85bded777c903ece02d3d5
SHA512402d6ce13a9a33646374298bd08ad215792614773a189f69741ed42179e208fadc7aa53a1aba7fa5948d2e8019febb45fa3634236ddbf528af0b85ac8a332a21
-
Filesize
184KB
MD5247265247b7c28e998474ac9ef080880
SHA12c8bc6da6c557e4bab4ee0b5b8046ebd00b59655
SHA2563bf4ee077cf9c6c29bfb10aab4e8bf37380dfb2f4a6db158d748c742d05434a6
SHA512a97ba18db1e8b53734dcd5f82473500ef6928c377a214550c7ebd69e6353283813096fef98a7ecbb61c37f0e52e8de8c6d63a188a00ec7adc6503fda5643ed96
-
Filesize
184KB
MD592292e83a8e95e32dde33eb7cbc78f41
SHA164a76d516bc9e26f0effb4f70a4d743572c42f14
SHA256f57841e1c2b951e273418d27008d851a602945b4d4d8c19016a67b1cbeb52f97
SHA512b560618361e3c1e80021c56ec3937b4ab9a2715f89dd6a75442f57181cb0d8dd1db9d908402271401247de327ab920f0403ffd6cca602ce6792e1ea8c09695c8
-
Filesize
184KB
MD5bdaa4c5759f1517e6aff61db44b9cf49
SHA1e1a45e5179f92d44312e6d1ce7f61a7f3782c850
SHA256f57636564117944f48b1b2af23e6f8cf7b534dec62354826d394e5982aa13478
SHA512f526ac694a00b0399946e427ef6d9a4589ed82ec1849f854dcfdab177371a59fdc585046e18deff7e5370f5a0cc090cacebb0dcae7aab383990b3c06588c4c83
-
Filesize
184KB
MD53ab213d6105e796e2ff3bdac00d15947
SHA1d1266d6a61e7aa45df6dad397d7a9c3aa1266743
SHA256a646c3cf8a6224cb2e3bc3614be57160eb869762e3d06f73250f42cb74b054fe
SHA51299644b40eb40cdba3aa8e373450e4c647ad279bbfd9c1498104bbc9669cc353b759949ea60423d04a63f1b0b8c3af4ab25e4a8ac2f33643f91cbfb9a802ce2b0
-
Filesize
184KB
MD546aff4ea65d27b77ef0c6f396de43c0a
SHA17b0f1d3bf6bce15c5ce815563cd2afea16636dc7
SHA25626e40de16fa094bb91ff9042d6e5dc809749dceef14e62c1076ec4f52bb99309
SHA51283ce1bfb9d3b3fb704fa107d4ff89796fa6ca14cd828b8cb9ff5424373d9823c29eadec5e4a178b912a43f288a285342a65257aefd71272491eac3be15c7a672
-
Filesize
184KB
MD5a3cf8e2ceb8cad9c25d234fbd35cd817
SHA164c2f99cdf5be12fbd90b7225b7a6a4b0bc79d43
SHA25614ab4a5415494614e7bb07feafb5ceedae7c334dcd1ad17d44addbaee0b0b410
SHA5127e19fbad615486887c87bfcd5c74bdd26fe0bbef64591027eb5245023cd30fb62b202e1a24487a9fe3ce1a5a1ee81a4ddcdb7d983fa1fe285a726857a30a97cc
-
Filesize
184KB
MD5da42e0971976367fd4d5d87393d08a6f
SHA15e0568d3250b9cd5771e613da94590cbedda70c4
SHA256e3c1e642f7f4123e6da70d0c15ab9068e3de5b0f38891a767334fa2c8211c8e6
SHA512413e3c437f364b0c546aa1e6d7059f32e29fd8acc820e9157e171d2a4d3ebf8215be25f29ea244f25e26f38d4702140e0c2b5caf8d719ba1e88170cdb3869c7e
-
Filesize
184KB
MD55aac482463052ac6880a1062c96c0742
SHA1e3212ab4961289ac292da9d74954579ff6e1223b
SHA256d88cb4e91d4fb6d07844f7d3190f182cebda757c5c02a0234798b4092b4dcbd7
SHA512d14e3cfeed47ac28556148c0324bbf0cdfbdabf90175f4130b76e4500e15fd7b3cab113db4f9ad73361b484fcb4aed94a814facfcf88f5ab08a8cdf890e78357
-
Filesize
184KB
MD5c85d240147ac35245f36c555e56ca4d1
SHA12e9a0b184228e80794312766dd78537d25976fb0
SHA256820f968a3a9bc490c146f597af8acd33fc868272055db7b9245f7a83d0e7b3d5
SHA5128bf3b6951cc4619ecb63821248dffb06200552e83bfb8a5e833917d78b9990860920934fe0a30096e7043ecd3a9184e2509778329a8121351920902953d145e5
-
Filesize
137KB
MD59013f88f1d3e3038d2efdbe10dcb858e
SHA1539bc8a921c4a449608e15759d8bfcfc6d87f18c
SHA2561f75d932c01f51fabf657d7d81cf1c63f8f9bc32819cecee0cae447bf4a9e2da
SHA512cefee194b4b7f472f61c15ef5bf920bd1920fbd5c971c37c23f8e0465a5cffc65420db544c05f06f1d9db9abe3fda5285598b2eb3e44f24e24cc6d0ceab00e29
-
Filesize
184KB
MD5cf82b90bdbbd231df3884de8b4fb63f3
SHA176e243fce92e39db6ae5ce847f4d86fd353a4936
SHA2560c2e7f1a5eece623e23c5d13a756a0142c4c43c2a40a3fdadaef21c4304a229b
SHA51293bf342d458b885d287e5c52d9425b0f58eb84ea3ed132484cceec81aa2a13e88b08d616eb8bf5298b66cf1a29734c0586ac4527b716fc67aab6317f1dd7590b
-
Filesize
184KB
MD5f03844ae0a4b01efd1fda1a766ec0b02
SHA154395acecaee907c699016ec37f16dca5fb6b93b
SHA2567be47f66f3c59740bbb9a64aece1fc4905379fbfc7c433198d95b9965f3568fe
SHA512e1e8baf64a5e8d95e84dd2849f980cc95bebbcfb2bb7e5234654cd9974f0153b8d1bf00658f6b49dd49a6167d519db3ffb1ba9ab56962e2f6a050e9a4f2c4aa4
-
Filesize
184KB
MD58dded40847af44671b3043ab9af6b21d
SHA1ca4551a59a56f7796bc3231e1aa3ffd5f3ff8af5
SHA2563433cca4e583af740e6f8274fbdaec0d664f54bd98b23078894847e409ca088d
SHA512b722e84ea66c394b918fe0bbc07d29d6fbe190586cea20d0b46dd5782563246ddde27038262a18faaf1f58a0af0282cddaf83516f51640613a466f6dd858fb35