Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    156s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26/12/2023, 02:26

General

  • Target

    4cac2e594bfe2249c06b47900a7b2baf.exe

  • Size

    184KB

  • MD5

    4cac2e594bfe2249c06b47900a7b2baf

  • SHA1

    64b970d0ba48c2d5683ab5e0ba1a750f5a315e90

  • SHA256

    6c91229a0b0537638822817a477df34d5a5b56835cec578f243edb312f75b3fb

  • SHA512

    511f9beeb336b2dff7da32602f3bcb91349373bcbde15f29121307145667aea80be6ebc4921c46e8d9d38003d3bd77c14fcba5053c4a0620d5d2f60d43dff1e0

  • SSDEEP

    3072:yTkjomNLPUT0nOjLM3b6CJ01Wv0MKOln8SxK+a1MNlPvxFj:yTIoSm0nYML6CJkKcQNlPvxF

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 64 IoCs
  • Loads dropped DLL 64 IoCs
  • Program crash 1 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4cac2e594bfe2249c06b47900a7b2baf.exe
    "C:\Users\Admin\AppData\Local\Temp\4cac2e594bfe2249c06b47900a7b2baf.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2388
    • C:\Users\Admin\AppData\Local\Temp\Unicorn-37464.exe
      C:\Users\Admin\AppData\Local\Temp\Unicorn-37464.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2716
      • C:\Users\Admin\AppData\Local\Temp\Unicorn-37215.exe
        C:\Users\Admin\AppData\Local\Temp\Unicorn-37215.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1212
        • C:\Users\Admin\AppData\Local\Temp\Unicorn-65518.exe
          C:\Users\Admin\AppData\Local\Temp\Unicorn-65518.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2644
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2644 -s 240
            5⤵
            • Loads dropped DLL
            • Program crash
            PID:2912
        • C:\Users\Admin\AppData\Local\Temp\Unicorn-18891.exe
          C:\Users\Admin\AppData\Local\Temp\Unicorn-18891.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3048
          • C:\Users\Admin\AppData\Local\Temp\Unicorn-38272.exe
            C:\Users\Admin\AppData\Local\Temp\Unicorn-38272.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            PID:564
            • C:\Users\Admin\AppData\Local\Temp\Unicorn-22440.exe
              C:\Users\Admin\AppData\Local\Temp\Unicorn-22440.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:1640
              • C:\Users\Admin\AppData\Local\Temp\Unicorn-47930.exe
                C:\Users\Admin\AppData\Local\Temp\Unicorn-47930.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:2700
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-30964.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-30964.exe
                  8⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:756
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-50633.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-50633.exe
                    9⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:2964
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-53744.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-53744.exe
                      10⤵
                        PID:1724
              • C:\Users\Admin\AppData\Local\Temp\Unicorn-43715.exe
                C:\Users\Admin\AppData\Local\Temp\Unicorn-43715.exe
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:2172
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-35049.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-35049.exe
                  7⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:2420
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-5695.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-5695.exe
                    8⤵
                      PID:3040
              • C:\Users\Admin\AppData\Local\Temp\Unicorn-35438.exe
                C:\Users\Admin\AppData\Local\Temp\Unicorn-35438.exe
                5⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetWindowsHookEx
                PID:1540
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-31402.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-31402.exe
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:2696
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-35734.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-35734.exe
                    7⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:1976
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-53355.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-53355.exe
                      8⤵
                      • Executes dropped EXE
                      • Suspicious use of SetWindowsHookEx
                      PID:2776
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-11297.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-11297.exe
                        9⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:2772
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-14792.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-14792.exe
                          10⤵
                            PID:2976
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-60136.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-60136.exe
                              11⤵
                                PID:928
              • C:\Users\Admin\AppData\Local\Temp\Unicorn-45077.exe
                C:\Users\Admin\AppData\Local\Temp\Unicorn-45077.exe
                3⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:2660
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-5015.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-5015.exe
                  4⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:2888
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-50104.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-50104.exe
                    5⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of SetWindowsHookEx
                    PID:1300
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-62538.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-62538.exe
                      6⤵
                      • Executes dropped EXE
                      • Suspicious use of SetWindowsHookEx
                      PID:1088
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-23855.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-23855.exe
                        7⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:2844
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-36969.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-36969.exe
                          8⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:1528
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-33833.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-33833.exe
                            9⤵
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            PID:2828
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-15411.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-15411.exe
                              10⤵
                              • Executes dropped EXE
                              • Suspicious use of SetWindowsHookEx
                              PID:1428
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-49769.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-49769.exe
                                11⤵
                                  PID:3008
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-31061.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-31061.exe
                                    12⤵
                                      PID:2792
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-45361.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-45361.exe
                        5⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:824
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-7710.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-7710.exe
                          6⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:3012
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-30964.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-30964.exe
                            7⤵
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            PID:2920
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-41418.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-41418.exe
                              8⤵
                              • Executes dropped EXE
                              • Suspicious use of SetWindowsHookEx
                              PID:1524
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-49385.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-49385.exe
                                9⤵
                                  PID:2752
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-1013.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-1013.exe
                    2⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of SetWindowsHookEx
                    • Suspicious use of WriteProcessMemory
                    PID:2720
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-48606.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-48606.exe
                      3⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Suspicious use of SetWindowsHookEx
                      • Suspicious use of WriteProcessMemory
                      PID:2756
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-38373.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-38373.exe
                        4⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Suspicious use of SetWindowsHookEx
                        • Suspicious use of WriteProcessMemory
                        PID:2920
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-35968.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-35968.exe
                          5⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Suspicious use of SetWindowsHookEx
                          PID:552
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-7722.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-7722.exe
                            6⤵
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            PID:308
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-21885.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-21885.exe
                              7⤵
                              • Executes dropped EXE
                              • Suspicious use of SetWindowsHookEx
                              PID:2148
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-36284.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-36284.exe
                                8⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                PID:1832
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-34257.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-34257.exe
                                  9⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetWindowsHookEx
                                  PID:2484
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-37733.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-37733.exe
                                    10⤵
                                    • Executes dropped EXE
                                    • Suspicious use of SetWindowsHookEx
                                    PID:1104
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-33817.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-33817.exe
                                      11⤵
                                        PID:1120
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-16710.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-16710.exe
                              6⤵
                              • Executes dropped EXE
                              • Suspicious use of SetWindowsHookEx
                              PID:2300
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-37545.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-37545.exe
                                7⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                PID:1912
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-38176.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-38176.exe
                                  8⤵
                                    PID:1276
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-40588.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-40588.exe
                                      9⤵
                                        PID:1576
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-20337.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-20337.exe
                                5⤵
                                • Executes dropped EXE
                                • Loads dropped DLL
                                • Suspicious use of SetWindowsHookEx
                                PID:2544
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-19389.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-19389.exe
                                  6⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetWindowsHookEx
                                  PID:2680
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-50918.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-50918.exe
                                    7⤵
                                    • Executes dropped EXE
                                    • Suspicious use of SetWindowsHookEx
                                    PID:1276
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-56126.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-56126.exe
                                      8⤵
                                      • Executes dropped EXE
                                      • Suspicious use of SetWindowsHookEx
                                      PID:3056
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-58283.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-58283.exe
                                        9⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetWindowsHookEx
                                        PID:444
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-31238.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-31238.exe
                                          10⤵
                                          • Executes dropped EXE
                                          PID:880
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-23880.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-23880.exe
                                            11⤵
                                              PID:2740
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-9374.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-9374.exe
                                                12⤵
                                                  PID:2700
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-52639.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-52639.exe
                                              10⤵
                                                PID:2616
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-17721.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-17721.exe
                                    4⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • Suspicious use of SetWindowsHookEx
                                    PID:1624
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-57115.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-57115.exe
                                      5⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Suspicious use of SetWindowsHookEx
                                      PID:900
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-20240.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-20240.exe
                                        6⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetWindowsHookEx
                                        PID:2104
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-9195.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-9195.exe
                                          7⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetWindowsHookEx
                                          PID:344
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-35072.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-35072.exe
                                            8⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetWindowsHookEx
                                            PID:2632
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-38560.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-38560.exe
                                              9⤵
                                                PID:1708
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-51495.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-51495.exe
                                        5⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetWindowsHookEx
                                        PID:2704
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-35516.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-35516.exe
                                          6⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetWindowsHookEx
                                          PID:2008
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-64612.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-64612.exe
                                            7⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetWindowsHookEx
                                            PID:2200
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-54896.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-54896.exe
                                              8⤵
                                                PID:1700
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-526.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-526.exe
                                      3⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Suspicious use of SetWindowsHookEx
                                      • Suspicious use of WriteProcessMemory
                                      PID:2576
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-37203.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-37203.exe
                                        4⤵
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        • Suspicious use of SetWindowsHookEx
                                        PID:2020
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-38091.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-38091.exe
                                          5⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          • Suspicious use of SetWindowsHookEx
                                          PID:1612
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-54666.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-54666.exe
                                            6⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetWindowsHookEx
                                            PID:2804
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-60923.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-60923.exe
                                              7⤵
                                              • Executes dropped EXE
                                              • Suspicious use of SetWindowsHookEx
                                              PID:2660
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-16627.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-16627.exe
                                          5⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetWindowsHookEx
                                          PID:2608
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-16985.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-16985.exe
                                            6⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetWindowsHookEx
                                            PID:616
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-21141.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-21141.exe
                                              7⤵
                                              • Executes dropped EXE
                                              • Suspicious use of SetWindowsHookEx
                                              PID:876
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-22416.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-22416.exe
                                                8⤵
                                                  PID:2800
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-53394.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-53394.exe
                                          4⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          • Suspicious use of SetWindowsHookEx
                                          PID:2312
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-35040.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-35040.exe
                                            5⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetWindowsHookEx
                                            PID:2064
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-52838.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-52838.exe
                                              6⤵
                                              • Executes dropped EXE
                                              • Suspicious use of SetWindowsHookEx
                                              PID:1808

                                  Network

                                  MITRE ATT&CK Matrix

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-17721.exe

                                    Filesize

                                    184KB

                                    MD5

                                    895264c2ab6f572d2ea72b9a957d56cb

                                    SHA1

                                    f02ad153ac4b9edeb46a58ea32e9d73e42593c68

                                    SHA256

                                    471fed7ef64ee1dc157b4ce76a37290d2166ac21338147ee1dbc7fc1750b88d6

                                    SHA512

                                    e02ac7c829586c9007fc0172b59ac7a93b530067b4b8bb2094d5c33c569adb94d5b737a5c38b0f1fe3d3c05f5f90048abe72176114f536b6cd2252c9709bd158

                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-35968.exe

                                    Filesize

                                    184KB

                                    MD5

                                    ea2c1ef6b45bb64f50c30e0fd0881ef4

                                    SHA1

                                    586c2bacf0f02eae5f3439e508989fe6e3b778fa

                                    SHA256

                                    92233da1b6a5d9df2e74882ae9d1cec941b60a78f056263310cb1672f8b61e2a

                                    SHA512

                                    7908c3ee188f2622b0e46b8e70c1d62db2b8562daba1e248cb4523744f8b6e715d475917a85d6875be7e58ae14c9b4f525428199d25a684b1c14cf9113ec823e

                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-37203.exe

                                    Filesize

                                    95KB

                                    MD5

                                    909ebd35cc31cd56c45ef977b1f4fa8a

                                    SHA1

                                    14b4e6806dccec8e388ada99efb91163ac856034

                                    SHA256

                                    4e6335fe2fa8670ace199d304430b5c5f7371da9fbe59e21008f3b0a7dc86870

                                    SHA512

                                    834e9d10b07ee224744c00567fc6f769736bf246b404be88322d7b85e7acb7a2b2e27bbeb208c85f20f582cd5b377a9d01faaf7abd2b782229a1fff9a616f661

                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-37464.exe

                                    Filesize

                                    157KB

                                    MD5

                                    66f30544520c4b445840e88f1d2f87ce

                                    SHA1

                                    2ece38f4f5b5a1f21f6e850ac7c0673def7433a6

                                    SHA256

                                    4f2ce5f78a066db9d3258966ca8e6556799efa783d9a092026018df152035ec4

                                    SHA512

                                    b02534df417cd87ed1ac94a2ac553af401599e7546acad12f745a38d741e65d02cacf9cc7aa1de4c56e6c9e2b3064980568975930f08d58cc74382e4aa370cc6

                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-38272.exe

                                    Filesize

                                    128KB

                                    MD5

                                    0927465e5dc72fe6cb87a2f6d7362270

                                    SHA1

                                    aa4a7c0b96c0c8f645839d7cb421f380e6eabfb1

                                    SHA256

                                    afa399dc9f8e6ff8367611d026e8f7d5ae2685575f5f59d6f5f6db7e7ea594ee

                                    SHA512

                                    a2d7100b04754e3eb01997751da285de797043aa6e3c6485cad4498fa3b9f6170aa428267cd0b26ac3deed2191916ee5b45ed1c95911c22f9bf820f7d4935924

                                  • \Users\Admin\AppData\Local\Temp\Unicorn-1013.exe

                                    Filesize

                                    184KB

                                    MD5

                                    e59404175ce7e271d832b47a6e1ee9a4

                                    SHA1

                                    4f02ec318365ae4681cfc08375821c9556b9c05e

                                    SHA256

                                    4f96542de7fd97aac067118a34b1740dd027ac3901a667fc7795a6034b3feb62

                                    SHA512

                                    128bb496f0fbb5de1661a881caca08762bd1e713aa3b417859d299fc58050262f9d261638dddbf5b58dde6f30bc081c1318f22d0c52cc00787df2db0d47001a6

                                  • \Users\Admin\AppData\Local\Temp\Unicorn-18891.exe

                                    Filesize

                                    184KB

                                    MD5

                                    ca4bd8033ceb7e576b10db1a1fbb20f1

                                    SHA1

                                    342562aaf3f8e6077910024177385e9533258172

                                    SHA256

                                    9acd17d9f32c079ada81372f96172b48a763c22fca46001fb075227b68e30913

                                    SHA512

                                    52365e09ff750179178b1bd5466921ae8801947fd5c8825f89f6405e58be8939a1ee64c8dc41f946e9f880d3f83f04ca2b4bd8fdf6a162633c77a35c2480671b

                                  • \Users\Admin\AppData\Local\Temp\Unicorn-22440.exe

                                    Filesize

                                    184KB

                                    MD5

                                    a0f54de3806cfca0fd32500852de9b4c

                                    SHA1

                                    7233450cbce797aa98f9d8a01d1f939e5504df5b

                                    SHA256

                                    691cc4129523c92e27d0d72ea37d06c291dd206181c0e1cd77619aacbb30c245

                                    SHA512

                                    e26bb3bf50e2b8d685249bb8f3912043518f486a495dc176efc60b74a954f7c05ce550302ddefada9b2e5f439e43df660cba9dbf677fe04de18f76b38486bc38

                                  • \Users\Admin\AppData\Local\Temp\Unicorn-35438.exe

                                    Filesize

                                    184KB

                                    MD5

                                    047ce1da1a2897a3130cef4a90a2309a

                                    SHA1

                                    d771147a5b419b646fc2cbeb8858ab0db3647582

                                    SHA256

                                    83d5eed4b63f0d1e6bf8e419464206a945cfa8dd1e94a8ea28c53ed6951be21e

                                    SHA512

                                    6e582c8cd1c6a6614fdfc5fd7673d66e9e715ca48b0e308ad657bbf4de5ee46824aeef12d29b5d825112c96d3f2e7803e6f2c52d524f54f079d7027097877363

                                  • \Users\Admin\AppData\Local\Temp\Unicorn-35968.exe

                                    Filesize

                                    128KB

                                    MD5

                                    c39f868dc69ab55531b1ff7a654a3fc8

                                    SHA1

                                    b338f987370f73ba6d8399256092c872c84921b8

                                    SHA256

                                    d1b84531e5e55cd8ca7093bbe1b62222bcb2afa6f7172dd0e9766e170b6ab23b

                                    SHA512

                                    0da737b6a30bff5ca77340f47a3c86aef3f19645967f44f868bfe7228f3c8cf34047ca9e4072f5952a2574914fa067cf1b18b194ee4db54ab3821b072a79a758

                                  • \Users\Admin\AppData\Local\Temp\Unicorn-37203.exe

                                    Filesize

                                    128KB

                                    MD5

                                    e6fe4f911f0a7b86df3cdb3870da2d8f

                                    SHA1

                                    6080d7d55911492d8e428b80b6280269656dd805

                                    SHA256

                                    aaa23bd642078c8d2fff89ee9f95e6bdd16beeac7dec1849c30a8ab705af0fe6

                                    SHA512

                                    c6926947e5bfd62ba46b22423f40fa5ab6829e3f7dc3321298879770ee920a4e1f38c3f432499815dcae46a646ce302bca811d230c09fe73223924ff6a346bea

                                  • \Users\Admin\AppData\Local\Temp\Unicorn-37203.exe

                                    Filesize

                                    184KB

                                    MD5

                                    5e1f88e5b3028ef9f300d083d7bc5275

                                    SHA1

                                    501a99d1d8a0e6e87f6bc140ae9c8f69a4eedb8a

                                    SHA256

                                    3962e88c87393a969ccc7039c9df41849cdc0bd3f09c506a5a7e19f8032f784b

                                    SHA512

                                    02a3e62f8d0ab72dc8126fbdebbf05a482e5266d841974896896fb9798609e109009af2e28a301aff84b4adcf44f8ae2aae4c4557eb25c55d63c18b47e2942d4

                                  • \Users\Admin\AppData\Local\Temp\Unicorn-37215.exe

                                    Filesize

                                    184KB

                                    MD5

                                    f99632f0a772a8133130a76f6b10c3a1

                                    SHA1

                                    bceb4d6102a1540cd00c6c85a2d097cfa9a97b42

                                    SHA256

                                    5a909af5800d4985c042bd9bfe36f72602564fdc29834be45d51f7209813681b

                                    SHA512

                                    e5b2e3189e1648bc1f1d09a7082f88ceabc904b1dc853636e283810933181312d4ed44281810558c35bc557eb29d003bddb45cb1a76493a47278627bffe2df62

                                  • \Users\Admin\AppData\Local\Temp\Unicorn-37464.exe

                                    Filesize

                                    128KB

                                    MD5

                                    f9c11b3a8eb05250ae792fa77b964d92

                                    SHA1

                                    d5ce151f45dee981e62031c54c32a89efaa6e91f

                                    SHA256

                                    156463b3f9b29f0ab05bc90d499f8eb47b6a1d5a762d37a2801f1ca2c0266faf

                                    SHA512

                                    8e92629ba94a29b0c1dd913a5c2cfc613968f9306bb0ec50c8dfed1aab6f8be2a340ec0c8efae2c8e0352e398cedc81607183218752bd5fbe46ea0099a678425

                                  • \Users\Admin\AppData\Local\Temp\Unicorn-37464.exe

                                    Filesize

                                    184KB

                                    MD5

                                    3915323afd218d5c24b495ae6ba75a62

                                    SHA1

                                    a3250d84a8f03142f0f8fff9d4c562fa2ac57fee

                                    SHA256

                                    337392053551e5fd070498bc5a4f6b2e0481f00a739112059047e8e37d723ed9

                                    SHA512

                                    720e68b9285b24f9d5974edb33673d23b9687409e7335228d6b4359f2a72cb4bb666aac7e9680ef3dbca98c953f76fa6a50f0d4121b004a1326ac885fc581db0

                                  • \Users\Admin\AppData\Local\Temp\Unicorn-38272.exe

                                    Filesize

                                    184KB

                                    MD5

                                    4c7851ac28d454d395061e9721468548

                                    SHA1

                                    c23428cec1dafa185eae0d93d4ff515ddc4aad0d

                                    SHA256

                                    8c8c04b27e759be523f7713ab63499004148ce9fb4c088084268b5ec97194732

                                    SHA512

                                    a7c670a35389c46d9265ca547f3dedf1c954f05492f97886b60b5f2f2605525bcd7f0297386c4e0c69155bf01cf8db47f8e9cbf67be146f401d2eef4a6af13ba

                                  • \Users\Admin\AppData\Local\Temp\Unicorn-38373.exe

                                    Filesize

                                    184KB

                                    MD5

                                    c205c3dc01b7c048fd295aa6f8fbf8e8

                                    SHA1

                                    cd919d5ae04bf80d6909aa84f730b91b85acc676

                                    SHA256

                                    7943d99715fb1aaf5b0900ace96888fe1f684df6df3abc68446596b842f24e41

                                    SHA512

                                    3223891be8cb451a057f0ca81a18a22260575e92e671ccad7e3ea88a87d8946a993866dfb2f207bbb55b55ece1e94fa9ff3abe9c1a58ea03f51bbcb45aae40e0

                                  • \Users\Admin\AppData\Local\Temp\Unicorn-45077.exe

                                    Filesize

                                    184KB

                                    MD5

                                    c5f5c9e6e6dc7cbaca4765351b7f53fb

                                    SHA1

                                    a8624a384dbc70b087718ba25359513fbabb7045

                                    SHA256

                                    3a8ec46b3b8cb0242fa758de1839e917b3ce9378467269d8298a7d21a44cc303

                                    SHA512

                                    741a6d83f3c125238051a728f0a0c5357d11a7568937b6228a281dc10b8666ca068cf0525e05b23dac45d5ee1b123687e17d54c4104616721d4f3a7c3d79ced7

                                  • \Users\Admin\AppData\Local\Temp\Unicorn-48606.exe

                                    Filesize

                                    184KB

                                    MD5

                                    1a05e7705012042aa4e5b2d45a756796

                                    SHA1

                                    f1362b657d08097aa75e05e594c7af3727257a9f

                                    SHA256

                                    f6d720626f1f59fc552700ae5ed39b3fb5cd5a864c1602f7e76926cf647f8261

                                    SHA512

                                    167b1d84287a7d7f39882e1ea0d379953e3bdc0197f017d25e01efa59b2216e418de5ba61d9639b021045aec6bca89c150145d14d027d0e0291787e3db2c84ec

                                  • \Users\Admin\AppData\Local\Temp\Unicorn-50104.exe

                                    Filesize

                                    184KB

                                    MD5

                                    5fdfba86c5d05bf35d3603643e4c0513

                                    SHA1

                                    7e5b308174f1aa71f9151d7aa26d1ba8f8f2136d

                                    SHA256

                                    e0879ae07c6688241226a7dc28a1b89b7f7411474519aaa1422e5f485c05605e

                                    SHA512

                                    40140aeb037693ca10213f6f32bcb628a261801941a421014655bafe0c577fc489300eecff85c99071303da47cf464f061c3939a94d531f09f22cb40a82e99b5

                                  • \Users\Admin\AppData\Local\Temp\Unicorn-5015.exe

                                    Filesize

                                    184KB

                                    MD5

                                    eebf6acbec9893c1f7dacb6ec86d9aba

                                    SHA1

                                    bce5826bcccc5cd5efd734719e4487972af35fe5

                                    SHA256

                                    ba1c895524b3adc4025ca816ac2bb18f488be52788ce8e99f7b361c8da277a17

                                    SHA512

                                    da26d705d109f30302499c278182e8d0c8ab5d17827f727d0c5416b6158248f414b56f5d8d7f87d5565ac7a496d3188d42defeb0edd79bd9af055442132bcb46

                                  • \Users\Admin\AppData\Local\Temp\Unicorn-526.exe

                                    Filesize

                                    184KB

                                    MD5

                                    5df48472b574fb0ce3dd0f737c0528fb

                                    SHA1

                                    4abcd14c037ffd24c26b80ff259d8ef07645323e

                                    SHA256

                                    ff999540b7606ec0e9aa541443a594abd596caa3c462ec29aebb7d3fefef9f8f

                                    SHA512

                                    dbc960a2c9012a5de2dacbf2a35e7028b4e1942a9a9628a7df4e54d3732d5b0f407ced7a74bf03d2849310b7c64b230dcd39fdbd17273d6b967091abab09cfa2

                                  • \Users\Admin\AppData\Local\Temp\Unicorn-65518.exe

                                    Filesize

                                    184KB

                                    MD5

                                    216aebfc883d52baa11f0d3f87779fe1

                                    SHA1

                                    b45bfaa7d36499d5134f61231dab7608360ca2b6

                                    SHA256

                                    0b53d5e0ab9a8360b22d1fa0ef31dd4e479c9fa80b85c50d7c8339621ecb4e52

                                    SHA512

                                    a7945afaba75cbfa6d3b94aa6ade1cd871c569522415fda5f5fa190ec53c47721fdf6d70be68cceb1a2551ee55a5aa0220a2e284ab78b37a391b5f777cfa6173