Analysis
-
max time kernel
140s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
24-12-2023 15:36
Static task
static1
Behavioral task
behavioral1
Sample
03f875530fdd47bd3dbb2d21b2008782.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
03f875530fdd47bd3dbb2d21b2008782.exe
Resource
win10v2004-20231215-en
General
-
Target
03f875530fdd47bd3dbb2d21b2008782.exe
-
Size
184KB
-
MD5
03f875530fdd47bd3dbb2d21b2008782
-
SHA1
7a4032f3867934a0546f587e519926477df0d1ef
-
SHA256
718ad78e491414a5c3ce3b446fb9544e174b051844e6ac24dbbae85f3c7606d8
-
SHA512
afde69facda97d85945eadf1ce3f502e471ae4b88c47e6d3e3a5eda80ef694398a6d2f1acdfca44baad2c8df72ccef61b0a9a6adce93521679f71d2e85b5c212
-
SSDEEP
3072:0TwGomLLPUf0nYj6M3P6/JH1/kuMJ8qX8cKra/uNlPnpFC:0TxogC0nXMf6/Jy3cDNlPnpF
Malware Config
Signatures
-
Executes dropped EXE 46 IoCs
pid Process 2220 Unicorn-47250.exe 1372 Unicorn-23706.exe 2604 Unicorn-34095.exe 2456 Unicorn-43415.exe 3048 Unicorn-6741.exe 2820 Unicorn-21215.exe 2864 Unicorn-53057.exe 3020 Unicorn-51002.exe 1552 Unicorn-65475.exe 1532 Unicorn-44069.exe 1972 Unicorn-23732.exe 328 Unicorn-22902.exe 1092 Unicorn-18901.exe 1924 Unicorn-33374.exe 1900 Unicorn-14681.exe 2372 Unicorn-29155.exe 1980 Unicorn-13934.exe 1600 Unicorn-44744.exe 2632 Unicorn-59217.exe 2868 Unicorn-5138.exe 2440 Unicorn-19612.exe 2444 Unicorn-38133.exe 2748 Unicorn-390.exe 2808 Unicorn-29062.exe 2684 Unicorn-25061.exe 2368 Unicorn-52855.exe 1076 Unicorn-50992.exe 2068 Unicorn-35772.exe 1816 Unicorn-1044.exe 2352 Unicorn-15517.exe 2536 Unicorn-61594.exe 1744 Unicorn-41257.exe 856 Unicorn-57736.exe 2680 Unicorn-3657.exe 2484 Unicorn-18131.exe 2224 Unicorn-62261.exe 1472 Unicorn-41924.exe 1680 Unicorn-58307.exe 2756 Unicorn-36901.exe 2036 Unicorn-16564.exe 1736 Unicorn-58748.exe 584 Unicorn-19937.exe 2364 Unicorn-2277.exe 616 Unicorn-46408.exe 2432 Unicorn-26071.exe 1908 Unicorn-54934.exe -
Loads dropped DLL 64 IoCs
pid Process 1872 03f875530fdd47bd3dbb2d21b2008782.exe 1872 03f875530fdd47bd3dbb2d21b2008782.exe 2220 Unicorn-47250.exe 2220 Unicorn-47250.exe 2636 WerFault.exe 2636 WerFault.exe 2636 WerFault.exe 2636 WerFault.exe 2636 WerFault.exe 2636 WerFault.exe 2636 WerFault.exe 1372 Unicorn-23706.exe 1372 Unicorn-23706.exe 2468 WerFault.exe 2468 WerFault.exe 2468 WerFault.exe 2468 WerFault.exe 2468 WerFault.exe 2468 WerFault.exe 2468 WerFault.exe 2604 Unicorn-34095.exe 2604 Unicorn-34095.exe 2872 WerFault.exe 2872 WerFault.exe 2872 WerFault.exe 2872 WerFault.exe 2872 WerFault.exe 2872 WerFault.exe 2872 WerFault.exe 2456 Unicorn-43415.exe 2456 Unicorn-43415.exe 2544 WerFault.exe 2544 WerFault.exe 2544 WerFault.exe 2544 WerFault.exe 2544 WerFault.exe 2544 WerFault.exe 2544 WerFault.exe 3048 Unicorn-6741.exe 3048 Unicorn-6741.exe 1232 WerFault.exe 1232 WerFault.exe 1232 WerFault.exe 1232 WerFault.exe 1232 WerFault.exe 1232 WerFault.exe 1232 WerFault.exe 2820 Unicorn-21215.exe 2820 Unicorn-21215.exe 1612 WerFault.exe 1612 WerFault.exe 1612 WerFault.exe 1612 WerFault.exe 1612 WerFault.exe 1612 WerFault.exe 1612 WerFault.exe 2864 Unicorn-53057.exe 2864 Unicorn-53057.exe 2148 WerFault.exe 2148 WerFault.exe 2148 WerFault.exe 2148 WerFault.exe 2148 WerFault.exe 2148 WerFault.exe -
Program crash 49 IoCs
pid pid_target Process procid_target 2960 1872 WerFault.exe 27 2636 2220 WerFault.exe 28 2468 1372 WerFault.exe 30 2872 2604 WerFault.exe 32 2544 2456 WerFault.exe 34 1232 3048 WerFault.exe 37 1612 2820 WerFault.exe 39 2148 2864 WerFault.exe 41 2384 3020 WerFault.exe 42 700 1552 WerFault.exe 44 564 1532 WerFault.exe 46 356 1972 WerFault.exe 48 684 328 WerFault.exe 50 112 1092 WerFault.exe 53 980 1924 WerFault.exe 54 2928 1900 WerFault.exe 57 2172 2372 WerFault.exe 58 2168 1980 WerFault.exe 62 2732 1600 WerFault.exe 64 1864 2632 WerFault.exe 66 2448 2868 WerFault.exe 68 2700 2440 WerFault.exe 70 2332 2444 WerFault.exe 72 2676 2748 WerFault.exe 74 1620 2808 WerFault.exe 76 540 2684 WerFault.exe 78 816 2368 WerFault.exe 80 1120 1076 WerFault.exe 82 1440 2068 WerFault.exe 84 1580 1816 WerFault.exe 86 2268 2352 WerFault.exe 88 2480 2536 WerFault.exe 90 964 1744 WerFault.exe 92 2024 856 WerFault.exe 94 1652 2680 WerFault.exe 96 2056 2484 WerFault.exe 98 1688 2224 WerFault.exe 100 2592 1472 WerFault.exe 102 2520 1680 WerFault.exe 104 1876 2756 WerFault.exe 106 2044 2036 WerFault.exe 108 1948 1736 WerFault.exe 110 240 584 WerFault.exe 112 2936 2364 WerFault.exe 114 2240 616 WerFault.exe 116 1480 2432 WerFault.exe 118 2784 1908 WerFault.exe 120 1664 384 WerFault.exe 122 2660 2572 WerFault.exe 124 -
Suspicious use of SetWindowsHookEx 46 IoCs
pid Process 1872 03f875530fdd47bd3dbb2d21b2008782.exe 2220 Unicorn-47250.exe 1372 Unicorn-23706.exe 2604 Unicorn-34095.exe 2456 Unicorn-43415.exe 3048 Unicorn-6741.exe 2820 Unicorn-21215.exe 2864 Unicorn-53057.exe 3020 Unicorn-51002.exe 1552 Unicorn-65475.exe 1532 Unicorn-44069.exe 1972 Unicorn-23732.exe 328 Unicorn-22902.exe 1092 Unicorn-18901.exe 1924 Unicorn-33374.exe 1900 Unicorn-14681.exe 2372 Unicorn-29155.exe 1980 Unicorn-13934.exe 1600 Unicorn-44744.exe 2632 Unicorn-59217.exe 2868 Unicorn-5138.exe 2440 Unicorn-19612.exe 2444 Unicorn-38133.exe 2748 Unicorn-390.exe 2808 Unicorn-29062.exe 2684 Unicorn-25061.exe 2368 Unicorn-52855.exe 1076 Unicorn-50992.exe 2068 Unicorn-35772.exe 1816 Unicorn-1044.exe 2352 Unicorn-15517.exe 2536 Unicorn-61594.exe 1744 Unicorn-41257.exe 856 Unicorn-57736.exe 2680 Unicorn-3657.exe 2484 Unicorn-18131.exe 2224 Unicorn-62261.exe 1472 Unicorn-41924.exe 1680 Unicorn-58307.exe 2756 Unicorn-36901.exe 2036 Unicorn-16564.exe 1736 Unicorn-58748.exe 584 Unicorn-19937.exe 2364 Unicorn-2277.exe 616 Unicorn-46408.exe 2432 Unicorn-26071.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1872 wrote to memory of 2220 1872 03f875530fdd47bd3dbb2d21b2008782.exe 28 PID 1872 wrote to memory of 2220 1872 03f875530fdd47bd3dbb2d21b2008782.exe 28 PID 1872 wrote to memory of 2220 1872 03f875530fdd47bd3dbb2d21b2008782.exe 28 PID 1872 wrote to memory of 2220 1872 03f875530fdd47bd3dbb2d21b2008782.exe 28 PID 1872 wrote to memory of 2960 1872 03f875530fdd47bd3dbb2d21b2008782.exe 29 PID 1872 wrote to memory of 2960 1872 03f875530fdd47bd3dbb2d21b2008782.exe 29 PID 1872 wrote to memory of 2960 1872 03f875530fdd47bd3dbb2d21b2008782.exe 29 PID 1872 wrote to memory of 2960 1872 03f875530fdd47bd3dbb2d21b2008782.exe 29 PID 2220 wrote to memory of 1372 2220 Unicorn-47250.exe 30 PID 2220 wrote to memory of 1372 2220 Unicorn-47250.exe 30 PID 2220 wrote to memory of 1372 2220 Unicorn-47250.exe 30 PID 2220 wrote to memory of 1372 2220 Unicorn-47250.exe 30 PID 2220 wrote to memory of 2636 2220 Unicorn-47250.exe 31 PID 2220 wrote to memory of 2636 2220 Unicorn-47250.exe 31 PID 2220 wrote to memory of 2636 2220 Unicorn-47250.exe 31 PID 2220 wrote to memory of 2636 2220 Unicorn-47250.exe 31 PID 1372 wrote to memory of 2604 1372 Unicorn-23706.exe 32 PID 1372 wrote to memory of 2604 1372 Unicorn-23706.exe 32 PID 1372 wrote to memory of 2604 1372 Unicorn-23706.exe 32 PID 1372 wrote to memory of 2604 1372 Unicorn-23706.exe 32 PID 1372 wrote to memory of 2468 1372 Unicorn-23706.exe 33 PID 1372 wrote to memory of 2468 1372 Unicorn-23706.exe 33 PID 1372 wrote to memory of 2468 1372 Unicorn-23706.exe 33 PID 1372 wrote to memory of 2468 1372 Unicorn-23706.exe 33 PID 2604 wrote to memory of 2456 2604 Unicorn-34095.exe 34 PID 2604 wrote to memory of 2456 2604 Unicorn-34095.exe 34 PID 2604 wrote to memory of 2456 2604 Unicorn-34095.exe 34 PID 2604 wrote to memory of 2456 2604 Unicorn-34095.exe 34 PID 2604 wrote to memory of 2872 2604 Unicorn-34095.exe 35 PID 2604 wrote to memory of 2872 2604 Unicorn-34095.exe 35 PID 2604 wrote to memory of 2872 2604 Unicorn-34095.exe 35 PID 2604 wrote to memory of 2872 2604 Unicorn-34095.exe 35 PID 2456 wrote to memory of 3048 2456 Unicorn-43415.exe 37 PID 2456 wrote to memory of 3048 2456 Unicorn-43415.exe 37 PID 2456 wrote to memory of 3048 2456 Unicorn-43415.exe 37 PID 2456 wrote to memory of 3048 2456 Unicorn-43415.exe 37 PID 2456 wrote to memory of 2544 2456 Unicorn-43415.exe 36 PID 2456 wrote to memory of 2544 2456 Unicorn-43415.exe 36 PID 2456 wrote to memory of 2544 2456 Unicorn-43415.exe 36 PID 2456 wrote to memory of 2544 2456 Unicorn-43415.exe 36 PID 3048 wrote to memory of 2820 3048 Unicorn-6741.exe 39 PID 3048 wrote to memory of 2820 3048 Unicorn-6741.exe 39 PID 3048 wrote to memory of 2820 3048 Unicorn-6741.exe 39 PID 3048 wrote to memory of 2820 3048 Unicorn-6741.exe 39 PID 3048 wrote to memory of 1232 3048 Unicorn-6741.exe 38 PID 3048 wrote to memory of 1232 3048 Unicorn-6741.exe 38 PID 3048 wrote to memory of 1232 3048 Unicorn-6741.exe 38 PID 3048 wrote to memory of 1232 3048 Unicorn-6741.exe 38 PID 2820 wrote to memory of 2864 2820 Unicorn-21215.exe 41 PID 2820 wrote to memory of 2864 2820 Unicorn-21215.exe 41 PID 2820 wrote to memory of 2864 2820 Unicorn-21215.exe 41 PID 2820 wrote to memory of 2864 2820 Unicorn-21215.exe 41 PID 2820 wrote to memory of 1612 2820 Unicorn-21215.exe 40 PID 2820 wrote to memory of 1612 2820 Unicorn-21215.exe 40 PID 2820 wrote to memory of 1612 2820 Unicorn-21215.exe 40 PID 2820 wrote to memory of 1612 2820 Unicorn-21215.exe 40 PID 2864 wrote to memory of 3020 2864 Unicorn-53057.exe 42 PID 2864 wrote to memory of 3020 2864 Unicorn-53057.exe 42 PID 2864 wrote to memory of 3020 2864 Unicorn-53057.exe 42 PID 2864 wrote to memory of 3020 2864 Unicorn-53057.exe 42 PID 2864 wrote to memory of 2148 2864 Unicorn-53057.exe 43 PID 2864 wrote to memory of 2148 2864 Unicorn-53057.exe 43 PID 2864 wrote to memory of 2148 2864 Unicorn-53057.exe 43 PID 2864 wrote to memory of 2148 2864 Unicorn-53057.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\03f875530fdd47bd3dbb2d21b2008782.exe"C:\Users\Admin\AppData\Local\Temp\03f875530fdd47bd3dbb2d21b2008782.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1872 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47250.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47250.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23706.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23706.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1372 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34095.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34095.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-43415.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43415.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2456 -s 2366⤵
- Loads dropped DLL
- Program crash
PID:2544
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6741.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6741.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3048 -s 2367⤵
- Loads dropped DLL
- Program crash
PID:1232
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21215.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21215.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2820 -s 2368⤵
- Loads dropped DLL
- Program crash
PID:1612
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53057.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53057.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51002.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51002.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-65475.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65475.exe10⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44069.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44069.exe11⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23732.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23732.exe12⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22902.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22902.exe13⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:328 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 328 -s 23614⤵
- Program crash
PID:684
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18901.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18901.exe14⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1092 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-33374.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33374.exe15⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1924 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1924 -s 23616⤵
- Program crash
PID:980
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14681.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14681.exe16⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-29155.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29155.exe17⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13934.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13934.exe18⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44744.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44744.exe19⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-59217.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59217.exe20⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5138.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5138.exe21⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-19612.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19612.exe22⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38133.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38133.exe23⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-390.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-390.exe24⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-29062.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29062.exe25⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-25061.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25061.exe26⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-52855.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52855.exe27⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2368 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50992.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50992.exe28⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1076 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35772.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35772.exe29⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-1044.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1044.exe30⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1816 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15517.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15517.exe31⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61594.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61594.exe32⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-41257.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41257.exe33⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-57736.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57736.exe34⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:856 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3657.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3657.exe35⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18131.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18131.exe36⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62261.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62261.exe37⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-41924.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41924.exe38⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1472 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58307.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58307.exe39⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-36901.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36901.exe40⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16564.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16564.exe41⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58748.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58748.exe42⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-19937.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19937.exe43⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:584 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-2277.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2277.exe44⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46408.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46408.exe45⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:616 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26071.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26071.exe46⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54934.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54934.exe47⤵
- Executes dropped EXE
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-33528.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33528.exe48⤵PID:384
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13190.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13190.exe49⤵PID:2572
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42895.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42895.exe50⤵PID:1936
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2572 -s 23650⤵
- Program crash
PID:2660
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 384 -s 23649⤵
- Program crash
PID:1664
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1908 -s 23648⤵
- Program crash
PID:2784
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2432 -s 23647⤵
- Program crash
PID:1480
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 616 -s 23646⤵
- Program crash
PID:2240
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2364 -s 23645⤵
- Program crash
PID:2936
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 584 -s 23644⤵
- Program crash
PID:240
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1736 -s 23643⤵
- Program crash
PID:1948
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2036 -s 23642⤵
- Program crash
PID:2044
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2756 -s 23641⤵
- Program crash
PID:1876
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1680 -s 23640⤵
- Program crash
PID:2520
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1472 -s 23639⤵
- Program crash
PID:2592
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2224 -s 23638⤵
- Program crash
PID:1688
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2484 -s 23637⤵
- Program crash
PID:2056
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2680 -s 23636⤵
- Program crash
PID:1652
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 856 -s 23635⤵
- Program crash
PID:2024
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1744 -s 23634⤵
- Program crash
PID:964
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2536 -s 23633⤵
- Program crash
PID:2480
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2352 -s 23632⤵
- Program crash
PID:2268
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1816 -s 23631⤵
- Program crash
PID:1580
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2068 -s 23630⤵
- Program crash
PID:1440
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1076 -s 23629⤵
- Program crash
PID:1120
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2368 -s 23628⤵
- Program crash
PID:816
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2684 -s 23627⤵
- Program crash
PID:540
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2808 -s 23626⤵
- Program crash
PID:1620
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2748 -s 23625⤵
- Program crash
PID:2676
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2444 -s 23624⤵
- Program crash
PID:2332
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2440 -s 23623⤵
- Program crash
PID:2700
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2868 -s 23622⤵
- Program crash
PID:2448
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2632 -s 23621⤵
- Program crash
PID:1864
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1600 -s 23620⤵
- Program crash
PID:2732
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1980 -s 23619⤵
- Program crash
PID:2168
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2372 -s 23618⤵
- Program crash
PID:2172
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1900 -s 23617⤵
- Program crash
PID:2928
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1092 -s 23615⤵
- Program crash
PID:112
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1972 -s 23613⤵
- Program crash
PID:356
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1532 -s 23612⤵
- Program crash
PID:564
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1552 -s 23611⤵
- Program crash
PID:700
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3020 -s 23610⤵
- Program crash
PID:2384
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2864 -s 2369⤵
- Loads dropped DLL
- Program crash
PID:2148
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2604 -s 2365⤵
- Loads dropped DLL
- Program crash
PID:2872
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1372 -s 2364⤵
- Loads dropped DLL
- Program crash
PID:2468
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2220 -s 2363⤵
- Loads dropped DLL
- Program crash
PID:2636
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1872 -s 2362⤵
- Program crash
PID:2960
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
135KB
MD5ed9ac6a82f79c9a173341ded5261f764
SHA139bbbbbbdcc44cb1974ce227b05083c7170267fa
SHA2569d599a18b5d5b2605fa9a76b386a656f9fe112476047e09baf25e81fea2375ec
SHA51265875c02d15fe58725c2d6cc8c50b1b60f5369a45e95194c5c92801eed201f35c91b665dc119962dfed2a7052dc4d37a29a32fad2cf71208b2951018467a9555
-
Filesize
184KB
MD5018f549e2137ac662018185dfef5ae73
SHA11e82cd3ed673478f28af820f93fb71547e080501
SHA256fed03e68c18159e69c823cf36e1049c11d206b69f5e349f4f3902db5b38ce3c7
SHA5122c8cc8d71440c0d0c9dcb264fe6c51b71f37fa9983688541cedc2907467fb7258d9e8b17624d0770a627c53a480d7b61f48d2b99a362bc68617f0dca5a5a7744
-
Filesize
184KB
MD5c9513950723cda5aed6b79b4a1580ba4
SHA17686726b5d0323b68f14060a77f7ad407c5a0f6d
SHA2569d73b9ab5de55f3844362f83f3ed23f6340bb443c73e5d2bc527be0a5d7ae640
SHA512a025340c3eca601df762da8cd2e639faeef4c6c90d09cb8e4e70397de7fb100246c0502b7c17d0377e0fbe719b8306731c262b88620d1e05e252deb44e4df7e1
-
Filesize
184KB
MD596b25ce02b7862e905d9c6d04184077d
SHA1bc812e57751c23f0c5c63963ea2679ffe3a3629d
SHA256364bed1e6c64af15d5ba832923e1363b28ad91478bf9af4204269ce397fb1b87
SHA5126116d50ecea5528ae31cf104315478bed54c9bfddd7da52296dd912f07ab88ff969a07539a9493df9736a5c16875a2d2c6d5ceaf26c42004699e4f787ceef5e5
-
Filesize
105KB
MD50d088942cf6601589408c29f71ac7423
SHA147addefae67ddaa9ebe1abf30e258889f2e0478d
SHA2568bd8269d219ed4d0f09a8430e0bce9f4fafbc0452d34adddf2423a6daafbd2aa
SHA512a2c26ec817c94f0ae8c5e4c3c5d474c64e2efe9714647cbc76dd9f83cf54545fdd9c9f06e748db29b0b1e58b2ead6d9cb349a86281f7b08d979dea06559effae
-
Filesize
184KB
MD522ff4f03b77859eb6a05204b510cab78
SHA114adbd8922880b070338604399984a019a07444e
SHA25635a81e12dfe3ddac285ec8e6435ca1440d86de4652bfcab959e1ff9c04105bcb
SHA512c4a8303c9935e8fa5edf64d00acfc8bd4a345426fc5bd6ac3056575296325ba7d8ca781926ae985fcffed2abbc01a0da7a6ff0655ce03cad3d31f107a2bf369c
-
Filesize
80KB
MD55c34150c5e3d4def1736b094479d446c
SHA19153a1f71f5252cfc4f9fd04b3dabb7ff3cd10af
SHA256a4cac56822e86b44ffe690232b101cc05bd0173382c0d3fdfca08be616f1684e
SHA51270b4f293b5ce8369fea06e789473eddaecd89ce1a8b10d21f7a381b585bd774d061b256e3bada75fd8bb56b36e09b66d3bf9089b9d42ece8e3968c396d7bca2a
-
Filesize
93KB
MD54dbe58b2808d275f34235c6a7091c1e8
SHA11a41c27dd2c345855b3450cd9523bf2159c1c62c
SHA2567ad60cc41d82b1b7d2a0e8e3b6687daa3fd1e14ac1e63644a7874038f7c06f24
SHA51258024a84259940c01b4024e9c03713af9d4d16aa34904d9cad303d1cd2bf0d6c870ec5842fc0929684d04c73711734f0b717869d3bc583d50e284dec14ea544c
-
Filesize
184KB
MD52cfda7cf74bd61cdc004d0b219253d07
SHA176d29f0cb7e6580f06ee3d595c48f1ee9f385540
SHA256d28dec605088e9b5fb94bb7b8282f34dd04e5ace31bfa735d3388b3980be200c
SHA51240d948afbcf5138b9a1c67f29263e547564c364d7d535490459b7461a160ebc61dd69d04e74dbbb09a6343589eab8c6258adb889d4e3b98ca1a4334e52843694
-
Filesize
64KB
MD52d199dfe2a81a9fcd750a5e9ca99c025
SHA1e3dca355d21e89c800e52535edc6d83623ab7601
SHA2562f20fe208be679e44f3b8139d49006b3fc5cb5100b8054550fd26398b84506fb
SHA512739e2bd1b4ba4e944fdacc97422179012e3725d7783c04cf1f4e170d5503cf8921e8247e4c285f7de5eba1df931b6c32c4ebf754f924dc9a7ef731f2448f1ce3
-
Filesize
143KB
MD56b38df77f28f89dff390ff7623c4a7b4
SHA1ecbb2a6842fa5160e847e951a1cc59ac22afe63a
SHA256b12a9eccffa55c579ca436a965e950f6165ea607f62e8e01d91fde4923994d05
SHA512ebb4e1a4763495a1af6fb498ba0d251c54a71bab49f9d6622c8e79d1893f5574044dbfb4033150b86f24cb00099b58379d47800ff087fa53023e15c89c73cdac
-
Filesize
128KB
MD5920c63bdc8a211e5cd56064c7ff6999a
SHA137261508cd7bdc6ad746843aaf42741e61884ff4
SHA25634b2a213277e96ec97917c3686707c5f9629b03b0b1323dad92f36bdd5fd1aa8
SHA51263de26df40fce552c69024eeffe4d9d7894482e9d240be073b2676db854a76a041a77077363d09970294067ebd3731751d3f1b39924dd085ee6b63adaa930ce1
-
Filesize
184KB
MD522961905537b2e6a5b5bd481fd5130c1
SHA1db5cebb370f9db509c88b6bc30fed8bb414b77fd
SHA2569d01324aae6ea4bcc8182b304f1c8de6f2be9ffd451b413cba68c84c5495d1a4
SHA5123db2d7e4a89fc8221a447f2d5552eb1239006f0258465fa0c935e1640e036f066b64b0976ba5c07689da72b5c5401170004bcd1b792a484a619625dcb9700f6c
-
Filesize
172KB
MD5b75da47eb8d4ef5e6899346c612a8ef7
SHA1eee18fc9b32ba2a804e674e9e22bf901eb7d8841
SHA2569f03468940bc5413aa0845fe33751141db6e1238a0f152971f61e546730c6fc8
SHA512950ba4f315d114f3989fa3c287e86bf8b29116a1b13dddbb43d025966ef9cea0461e4029ed5a0009a416631f4635fe5dea418802d3798b2ef08b32cd7b54116a
-
Filesize
184KB
MD5f55accd959ccddf2915c0eaf9e1cf6c0
SHA1b6c52e96174e7559794efbe3efc435075dfc407b
SHA2561eb260d2f0aef39766cd59ce1eccdba69af1251ee2b7f2ecfea5a2d05121b775
SHA51204e1dc8a032794898ca8d7489cd66c8fbe9caaa19a21255cfe4b99238baa716227a259e4c7ce0878d6471333fc34d9959033235f4307ab9262c8020c0404fda6
-
Filesize
95KB
MD5aa640555c122f8cd38c642f86563eec5
SHA12785d055bda63b46eb4b540c95175788016a626d
SHA2568916459b2f39e5e2a504ce2e18e88131004a73d3694adf407885798c9ceaadf1
SHA512a3f80d0bc1b2d10dc51113012e0d73d5a6696670ccde6686ae92a617f86153d1c9b7c23b928e96661b9908879a8b44f9b971d0ad81031c34dc740f65470ac567
-
Filesize
115KB
MD59a62d37ca83064f70644d144857b624d
SHA13a5c61e3cad05bf9a7f674790c99454ac24ee9bd
SHA256460d886343700ecc9db7a1ae4bb1744628a7b16e5f4d3f4af26c84dcbafc2b25
SHA512c43d48df91b755eaa0d5b45edf3b17a23622ed22f5278b1328662d1d5e3d683512f7cb1c331d0fb57b6430cb7f701a8494bd73f01b1a6008df8e1cd52e653c8c
-
Filesize
83KB
MD54c12be471a61c1c64d028c7a7a53539c
SHA13d98047e6232a2c7cfd7c1780c025871b8d4d207
SHA25677909b7500f47ff22d61a2c2bfc48e64a5518cf32cea677049b695de176142d0
SHA5126a68f84d3f69f05d7408ceafc073200f97557a37bfa0820bb26a5e621108461716aed61eefe5280b20cd3d757cd2a70a6c0c4e71dc90b0f943d3f788e12633ce
-
Filesize
174KB
MD5022875c6f5ba71e0935cdcbdfc2ba710
SHA105f97bb69a2d43b88f4acd402ca8da1bb322f89c
SHA2563548c986f35d21de09798059add486f384fba6ead3657f4cce44cc3b317ec444
SHA51287802fd8e7cd101fb89799561318cededfdbadfefdc6d414afe7bb81f45ff2ab11f4338da9af07d03a74566353068888b172265f968c5b4f3aa6f6814370467d
-
Filesize
118KB
MD57b55ccebfe9062c0f3ad82ad7a04da7d
SHA1cc5ade9416cbc99e4970484cfb3f96648a7d9a18
SHA2567413fc0803579d76d79bc2a1bdc4e388039d77b5f03218ee9c58936a281f3e3d
SHA5122ffc7a75b659d25c4cca88276ff4d8c57df98e3027f8ed30704005c33512cb458f154dd1a43bb8508a6d2fbc835deee99c5039ab2b88ab7d1abb099e60d55a76
-
Filesize
162KB
MD573dd2261e858dbc1eb65fd138dd42c12
SHA127ec271b885bb024109d3d1cbf934c50e81f181a
SHA256203b81236681b4f53d0f2f3a8fe4c7e4b44715afa7af4f49c45d189c8b45bfe1
SHA512a9fcadd780ed35a471bfb1d612938fcc5b056b911405f6192cc78d5de76af2c2a1088b403af270115b5680b6233a0e24fb95f00784ccf1d1480797027b9ee876
-
Filesize
113KB
MD554e469c4c68b1d83964a697c50997a25
SHA1cafd0cc2db4ca00230255a31f8abf10bee2588f5
SHA2567d5b752da4b1eb661a4ac308b8993c3451cd56359257e32724ea6807e7c5fcaf
SHA512894279c3f0b988411cff096359a45620c393263f98b6c5614e831553035d17bc75697d0d8e34045f2c3a5e291ef45c759f44b91cb915fc94246b5f1c4b5829b1