Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
156s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26/12/2023, 02:26
Static task
static1
Behavioral task
behavioral1
Sample
4cac2e594bfe2249c06b47900a7b2baf.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4cac2e594bfe2249c06b47900a7b2baf.exe
Resource
win10v2004-20231215-en
General
-
Target
4cac2e594bfe2249c06b47900a7b2baf.exe
-
Size
184KB
-
MD5
4cac2e594bfe2249c06b47900a7b2baf
-
SHA1
64b970d0ba48c2d5683ab5e0ba1a750f5a315e90
-
SHA256
6c91229a0b0537638822817a477df34d5a5b56835cec578f243edb312f75b3fb
-
SHA512
511f9beeb336b2dff7da32602f3bcb91349373bcbde15f29121307145667aea80be6ebc4921c46e8d9d38003d3bd77c14fcba5053c4a0620d5d2f60d43dff1e0
-
SSDEEP
3072:yTkjomNLPUT0nOjLM3b6CJ01Wv0MKOln8SxK+a1MNlPvxFj:yTIoSm0nYML6CJkKcQNlPvxF
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2716 Unicorn-37464.exe 2720 Unicorn-1013.exe 1212 Unicorn-37215.exe 2644 Unicorn-65518.exe 2660 Unicorn-45077.exe 2756 Unicorn-48606.exe 2920 Unicorn-38373.exe 3048 Unicorn-18891.exe 2576 Unicorn-526.exe 2888 Unicorn-5015.exe 552 Unicorn-35968.exe 1624 Unicorn-17721.exe 564 Unicorn-38272.exe 2020 Unicorn-37203.exe 1300 Unicorn-50104.exe 1540 Unicorn-35438.exe 1640 Unicorn-22440.exe 1612 Unicorn-38091.exe 308 Unicorn-7722.exe 900 Unicorn-57115.exe 2312 Unicorn-53394.exe 2544 Unicorn-20337.exe 824 Unicorn-45361.exe 1088 Unicorn-62538.exe 2804 Unicorn-54666.exe 2696 Unicorn-31402.exe 2104 Unicorn-20240.exe 2064 Unicorn-35040.exe 2700 Unicorn-47930.exe 2704 Unicorn-51495.exe 2680 Unicorn-19389.exe 2608 Unicorn-16627.exe 2300 Unicorn-16710.exe 3012 Unicorn-7710.exe 2172 Unicorn-43715.exe 2148 Unicorn-21885.exe 2844 Unicorn-23855.exe 2660 Unicorn-60923.exe 2420 Unicorn-35049.exe 1976 Unicorn-35734.exe 1276 Unicorn-50918.exe 1528 Unicorn-36969.exe 1808 Unicorn-52838.exe 616 Unicorn-16985.exe 1832 Unicorn-36284.exe 1912 Unicorn-37545.exe 2008 Unicorn-35516.exe 344 Unicorn-9195.exe 756 Unicorn-30964.exe 2920 Unicorn-30964.exe 3056 Unicorn-56126.exe 2776 Unicorn-53355.exe 2828 Unicorn-33833.exe 2632 Unicorn-35072.exe 2484 Unicorn-34257.exe 2772 Unicorn-11297.exe 2964 Unicorn-50633.exe 1104 Unicorn-37733.exe 444 Unicorn-58283.exe 1524 Unicorn-41418.exe 1428 Unicorn-15411.exe 2200 Unicorn-64612.exe 876 Unicorn-21141.exe 880 Unicorn-31238.exe -
Loads dropped DLL 64 IoCs
pid Process 2388 4cac2e594bfe2249c06b47900a7b2baf.exe 2388 4cac2e594bfe2249c06b47900a7b2baf.exe 2716 Unicorn-37464.exe 2388 4cac2e594bfe2249c06b47900a7b2baf.exe 2388 4cac2e594bfe2249c06b47900a7b2baf.exe 2716 Unicorn-37464.exe 1212 Unicorn-37215.exe 1212 Unicorn-37215.exe 2716 Unicorn-37464.exe 2716 Unicorn-37464.exe 2720 Unicorn-1013.exe 2720 Unicorn-1013.exe 1212 Unicorn-37215.exe 1212 Unicorn-37215.exe 2756 Unicorn-48606.exe 2756 Unicorn-48606.exe 2720 Unicorn-1013.exe 2720 Unicorn-1013.exe 2660 Unicorn-45077.exe 2660 Unicorn-45077.exe 3048 Unicorn-18891.exe 2920 Unicorn-38373.exe 2576 Unicorn-526.exe 2756 Unicorn-48606.exe 2920 Unicorn-38373.exe 3048 Unicorn-18891.exe 2576 Unicorn-526.exe 2756 Unicorn-48606.exe 2888 Unicorn-5015.exe 2888 Unicorn-5015.exe 2912 WerFault.exe 2912 WerFault.exe 2912 WerFault.exe 2912 WerFault.exe 564 Unicorn-38272.exe 564 Unicorn-38272.exe 3048 Unicorn-18891.exe 3048 Unicorn-18891.exe 2020 Unicorn-37203.exe 552 Unicorn-35968.exe 2020 Unicorn-37203.exe 552 Unicorn-35968.exe 1624 Unicorn-17721.exe 1624 Unicorn-17721.exe 2576 Unicorn-526.exe 2576 Unicorn-526.exe 2920 Unicorn-38373.exe 2920 Unicorn-38373.exe 2912 WerFault.exe 2888 Unicorn-5015.exe 1300 Unicorn-50104.exe 2888 Unicorn-5015.exe 1300 Unicorn-50104.exe 1612 Unicorn-38091.exe 1540 Unicorn-35438.exe 1612 Unicorn-38091.exe 1540 Unicorn-35438.exe 900 Unicorn-57115.exe 900 Unicorn-57115.exe 2312 Unicorn-53394.exe 1624 Unicorn-17721.exe 2312 Unicorn-53394.exe 1624 Unicorn-17721.exe 2544 Unicorn-20337.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2912 2644 WerFault.exe 30 -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2388 4cac2e594bfe2249c06b47900a7b2baf.exe 2716 Unicorn-37464.exe 1212 Unicorn-37215.exe 2720 Unicorn-1013.exe 2644 Unicorn-65518.exe 2660 Unicorn-45077.exe 2756 Unicorn-48606.exe 2920 Unicorn-38373.exe 2576 Unicorn-526.exe 3048 Unicorn-18891.exe 2888 Unicorn-5015.exe 552 Unicorn-35968.exe 564 Unicorn-38272.exe 1624 Unicorn-17721.exe 2020 Unicorn-37203.exe 1300 Unicorn-50104.exe 1640 Unicorn-22440.exe 1540 Unicorn-35438.exe 1612 Unicorn-38091.exe 900 Unicorn-57115.exe 2544 Unicorn-20337.exe 2312 Unicorn-53394.exe 308 Unicorn-7722.exe 1088 Unicorn-62538.exe 824 Unicorn-45361.exe 2804 Unicorn-54666.exe 2696 Unicorn-31402.exe 2104 Unicorn-20240.exe 2608 Unicorn-16627.exe 2700 Unicorn-47930.exe 2680 Unicorn-19389.exe 2704 Unicorn-51495.exe 2064 Unicorn-35040.exe 2844 Unicorn-23855.exe 2300 Unicorn-16710.exe 2148 Unicorn-21885.exe 2172 Unicorn-43715.exe 3012 Unicorn-7710.exe 2660 Unicorn-60923.exe 1276 Unicorn-50918.exe 1976 Unicorn-35734.exe 1808 Unicorn-52838.exe 1528 Unicorn-36969.exe 1832 Unicorn-36284.exe 344 Unicorn-9195.exe 2008 Unicorn-35516.exe 1912 Unicorn-37545.exe 3056 Unicorn-56126.exe 2920 Unicorn-30964.exe 2776 Unicorn-53355.exe 756 Unicorn-30964.exe 616 Unicorn-16985.exe 2484 Unicorn-34257.exe 2828 Unicorn-33833.exe 2964 Unicorn-50633.exe 2632 Unicorn-35072.exe 444 Unicorn-58283.exe 2772 Unicorn-11297.exe 1104 Unicorn-37733.exe 1428 Unicorn-15411.exe 876 Unicorn-21141.exe 1524 Unicorn-41418.exe 2200 Unicorn-64612.exe 2420 Unicorn-35049.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2388 wrote to memory of 2716 2388 4cac2e594bfe2249c06b47900a7b2baf.exe 27 PID 2388 wrote to memory of 2716 2388 4cac2e594bfe2249c06b47900a7b2baf.exe 27 PID 2388 wrote to memory of 2716 2388 4cac2e594bfe2249c06b47900a7b2baf.exe 27 PID 2388 wrote to memory of 2716 2388 4cac2e594bfe2249c06b47900a7b2baf.exe 27 PID 2388 wrote to memory of 2720 2388 4cac2e594bfe2249c06b47900a7b2baf.exe 29 PID 2388 wrote to memory of 2720 2388 4cac2e594bfe2249c06b47900a7b2baf.exe 29 PID 2388 wrote to memory of 2720 2388 4cac2e594bfe2249c06b47900a7b2baf.exe 29 PID 2388 wrote to memory of 2720 2388 4cac2e594bfe2249c06b47900a7b2baf.exe 29 PID 2716 wrote to memory of 1212 2716 Unicorn-37464.exe 28 PID 2716 wrote to memory of 1212 2716 Unicorn-37464.exe 28 PID 2716 wrote to memory of 1212 2716 Unicorn-37464.exe 28 PID 2716 wrote to memory of 1212 2716 Unicorn-37464.exe 28 PID 1212 wrote to memory of 2644 1212 Unicorn-37215.exe 30 PID 1212 wrote to memory of 2644 1212 Unicorn-37215.exe 30 PID 1212 wrote to memory of 2644 1212 Unicorn-37215.exe 30 PID 1212 wrote to memory of 2644 1212 Unicorn-37215.exe 30 PID 2716 wrote to memory of 2660 2716 Unicorn-37464.exe 31 PID 2716 wrote to memory of 2660 2716 Unicorn-37464.exe 31 PID 2716 wrote to memory of 2660 2716 Unicorn-37464.exe 31 PID 2716 wrote to memory of 2660 2716 Unicorn-37464.exe 31 PID 2720 wrote to memory of 2756 2720 Unicorn-1013.exe 32 PID 2720 wrote to memory of 2756 2720 Unicorn-1013.exe 32 PID 2720 wrote to memory of 2756 2720 Unicorn-1013.exe 32 PID 2720 wrote to memory of 2756 2720 Unicorn-1013.exe 32 PID 1212 wrote to memory of 3048 1212 Unicorn-37215.exe 33 PID 1212 wrote to memory of 3048 1212 Unicorn-37215.exe 33 PID 1212 wrote to memory of 3048 1212 Unicorn-37215.exe 33 PID 1212 wrote to memory of 3048 1212 Unicorn-37215.exe 33 PID 2756 wrote to memory of 2920 2756 Unicorn-48606.exe 35 PID 2756 wrote to memory of 2920 2756 Unicorn-48606.exe 35 PID 2756 wrote to memory of 2920 2756 Unicorn-48606.exe 35 PID 2756 wrote to memory of 2920 2756 Unicorn-48606.exe 35 PID 2720 wrote to memory of 2576 2720 Unicorn-1013.exe 34 PID 2720 wrote to memory of 2576 2720 Unicorn-1013.exe 34 PID 2720 wrote to memory of 2576 2720 Unicorn-1013.exe 34 PID 2720 wrote to memory of 2576 2720 Unicorn-1013.exe 34 PID 2660 wrote to memory of 2888 2660 Unicorn-45077.exe 36 PID 2660 wrote to memory of 2888 2660 Unicorn-45077.exe 36 PID 2660 wrote to memory of 2888 2660 Unicorn-45077.exe 36 PID 2660 wrote to memory of 2888 2660 Unicorn-45077.exe 36 PID 2644 wrote to memory of 2912 2644 Unicorn-65518.exe 37 PID 2644 wrote to memory of 2912 2644 Unicorn-65518.exe 37 PID 2644 wrote to memory of 2912 2644 Unicorn-65518.exe 37 PID 2644 wrote to memory of 2912 2644 Unicorn-65518.exe 37 PID 2920 wrote to memory of 552 2920 Unicorn-38373.exe 40 PID 2920 wrote to memory of 552 2920 Unicorn-38373.exe 40 PID 2920 wrote to memory of 552 2920 Unicorn-38373.exe 40 PID 2920 wrote to memory of 552 2920 Unicorn-38373.exe 40 PID 3048 wrote to memory of 564 3048 Unicorn-18891.exe 41 PID 3048 wrote to memory of 564 3048 Unicorn-18891.exe 41 PID 3048 wrote to memory of 564 3048 Unicorn-18891.exe 41 PID 3048 wrote to memory of 564 3048 Unicorn-18891.exe 41 PID 2576 wrote to memory of 2020 2576 Unicorn-526.exe 39 PID 2576 wrote to memory of 2020 2576 Unicorn-526.exe 39 PID 2576 wrote to memory of 2020 2576 Unicorn-526.exe 39 PID 2576 wrote to memory of 2020 2576 Unicorn-526.exe 39 PID 2756 wrote to memory of 1624 2756 Unicorn-48606.exe 42 PID 2756 wrote to memory of 1624 2756 Unicorn-48606.exe 42 PID 2756 wrote to memory of 1624 2756 Unicorn-48606.exe 42 PID 2756 wrote to memory of 1624 2756 Unicorn-48606.exe 42 PID 2888 wrote to memory of 1300 2888 Unicorn-5015.exe 43 PID 2888 wrote to memory of 1300 2888 Unicorn-5015.exe 43 PID 2888 wrote to memory of 1300 2888 Unicorn-5015.exe 43 PID 2888 wrote to memory of 1300 2888 Unicorn-5015.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\4cac2e594bfe2249c06b47900a7b2baf.exe"C:\Users\Admin\AppData\Local\Temp\4cac2e594bfe2249c06b47900a7b2baf.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37464.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37464.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37215.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37215.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1212 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-65518.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65518.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2644 -s 2405⤵
- Loads dropped DLL
- Program crash
PID:2912
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18891.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18891.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38272.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38272.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:564 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22440.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22440.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47930.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47930.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30964.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30964.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:756 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50633.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50633.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-53744.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53744.exe10⤵PID:1724
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43715.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43715.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35049.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35049.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5695.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5695.exe8⤵PID:3040
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35438.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35438.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1540 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-31402.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31402.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35734.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35734.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-53355.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53355.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11297.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11297.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14792.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14792.exe10⤵PID:2976
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60136.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60136.exe11⤵PID:928
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45077.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45077.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5015.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5015.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50104.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50104.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1300 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62538.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62538.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1088 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23855.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23855.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-36969.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36969.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-33833.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33833.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2828 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15411.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15411.exe10⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1428 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49769.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49769.exe11⤵PID:3008
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31061.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31061.exe12⤵PID:2792
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45361.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45361.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:824 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-7710.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7710.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30964.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30964.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-41418.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41418.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49385.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49385.exe9⤵PID:2752
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1013.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1013.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48606.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48606.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38373.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38373.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35968.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35968.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:552 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-7722.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7722.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:308 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21885.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21885.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-36284.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36284.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34257.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34257.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37733.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37733.exe10⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1104 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-33817.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33817.exe11⤵PID:1120
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16710.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16710.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37545.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37545.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38176.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38176.exe8⤵PID:1276
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40588.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40588.exe9⤵PID:1576
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20337.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20337.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-19389.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19389.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50918.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50918.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1276 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-56126.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56126.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58283.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58283.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:444 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-31238.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31238.exe10⤵
- Executes dropped EXE
PID:880 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23880.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23880.exe11⤵PID:2740
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9374.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9374.exe12⤵PID:2700
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52639.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52639.exe10⤵PID:2616
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17721.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17721.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-57115.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57115.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:900 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-20240.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20240.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9195.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9195.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:344 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35072.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35072.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38560.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38560.exe9⤵PID:1708
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51495.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51495.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35516.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35516.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-64612.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64612.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54896.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54896.exe8⤵PID:1700
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-526.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-526.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37203.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37203.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38091.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38091.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54666.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54666.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60923.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60923.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2660
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16627.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16627.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16985.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16985.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:616 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21141.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21141.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:876 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22416.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22416.exe8⤵PID:2800
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53394.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53394.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2312 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35040.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35040.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-52838.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52838.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1808
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD5895264c2ab6f572d2ea72b9a957d56cb
SHA1f02ad153ac4b9edeb46a58ea32e9d73e42593c68
SHA256471fed7ef64ee1dc157b4ce76a37290d2166ac21338147ee1dbc7fc1750b88d6
SHA512e02ac7c829586c9007fc0172b59ac7a93b530067b4b8bb2094d5c33c569adb94d5b737a5c38b0f1fe3d3c05f5f90048abe72176114f536b6cd2252c9709bd158
-
Filesize
184KB
MD5ea2c1ef6b45bb64f50c30e0fd0881ef4
SHA1586c2bacf0f02eae5f3439e508989fe6e3b778fa
SHA25692233da1b6a5d9df2e74882ae9d1cec941b60a78f056263310cb1672f8b61e2a
SHA5127908c3ee188f2622b0e46b8e70c1d62db2b8562daba1e248cb4523744f8b6e715d475917a85d6875be7e58ae14c9b4f525428199d25a684b1c14cf9113ec823e
-
Filesize
95KB
MD5909ebd35cc31cd56c45ef977b1f4fa8a
SHA114b4e6806dccec8e388ada99efb91163ac856034
SHA2564e6335fe2fa8670ace199d304430b5c5f7371da9fbe59e21008f3b0a7dc86870
SHA512834e9d10b07ee224744c00567fc6f769736bf246b404be88322d7b85e7acb7a2b2e27bbeb208c85f20f582cd5b377a9d01faaf7abd2b782229a1fff9a616f661
-
Filesize
157KB
MD566f30544520c4b445840e88f1d2f87ce
SHA12ece38f4f5b5a1f21f6e850ac7c0673def7433a6
SHA2564f2ce5f78a066db9d3258966ca8e6556799efa783d9a092026018df152035ec4
SHA512b02534df417cd87ed1ac94a2ac553af401599e7546acad12f745a38d741e65d02cacf9cc7aa1de4c56e6c9e2b3064980568975930f08d58cc74382e4aa370cc6
-
Filesize
128KB
MD50927465e5dc72fe6cb87a2f6d7362270
SHA1aa4a7c0b96c0c8f645839d7cb421f380e6eabfb1
SHA256afa399dc9f8e6ff8367611d026e8f7d5ae2685575f5f59d6f5f6db7e7ea594ee
SHA512a2d7100b04754e3eb01997751da285de797043aa6e3c6485cad4498fa3b9f6170aa428267cd0b26ac3deed2191916ee5b45ed1c95911c22f9bf820f7d4935924
-
Filesize
184KB
MD5e59404175ce7e271d832b47a6e1ee9a4
SHA14f02ec318365ae4681cfc08375821c9556b9c05e
SHA2564f96542de7fd97aac067118a34b1740dd027ac3901a667fc7795a6034b3feb62
SHA512128bb496f0fbb5de1661a881caca08762bd1e713aa3b417859d299fc58050262f9d261638dddbf5b58dde6f30bc081c1318f22d0c52cc00787df2db0d47001a6
-
Filesize
184KB
MD5ca4bd8033ceb7e576b10db1a1fbb20f1
SHA1342562aaf3f8e6077910024177385e9533258172
SHA2569acd17d9f32c079ada81372f96172b48a763c22fca46001fb075227b68e30913
SHA51252365e09ff750179178b1bd5466921ae8801947fd5c8825f89f6405e58be8939a1ee64c8dc41f946e9f880d3f83f04ca2b4bd8fdf6a162633c77a35c2480671b
-
Filesize
184KB
MD5a0f54de3806cfca0fd32500852de9b4c
SHA17233450cbce797aa98f9d8a01d1f939e5504df5b
SHA256691cc4129523c92e27d0d72ea37d06c291dd206181c0e1cd77619aacbb30c245
SHA512e26bb3bf50e2b8d685249bb8f3912043518f486a495dc176efc60b74a954f7c05ce550302ddefada9b2e5f439e43df660cba9dbf677fe04de18f76b38486bc38
-
Filesize
184KB
MD5047ce1da1a2897a3130cef4a90a2309a
SHA1d771147a5b419b646fc2cbeb8858ab0db3647582
SHA25683d5eed4b63f0d1e6bf8e419464206a945cfa8dd1e94a8ea28c53ed6951be21e
SHA5126e582c8cd1c6a6614fdfc5fd7673d66e9e715ca48b0e308ad657bbf4de5ee46824aeef12d29b5d825112c96d3f2e7803e6f2c52d524f54f079d7027097877363
-
Filesize
128KB
MD5c39f868dc69ab55531b1ff7a654a3fc8
SHA1b338f987370f73ba6d8399256092c872c84921b8
SHA256d1b84531e5e55cd8ca7093bbe1b62222bcb2afa6f7172dd0e9766e170b6ab23b
SHA5120da737b6a30bff5ca77340f47a3c86aef3f19645967f44f868bfe7228f3c8cf34047ca9e4072f5952a2574914fa067cf1b18b194ee4db54ab3821b072a79a758
-
Filesize
128KB
MD5e6fe4f911f0a7b86df3cdb3870da2d8f
SHA16080d7d55911492d8e428b80b6280269656dd805
SHA256aaa23bd642078c8d2fff89ee9f95e6bdd16beeac7dec1849c30a8ab705af0fe6
SHA512c6926947e5bfd62ba46b22423f40fa5ab6829e3f7dc3321298879770ee920a4e1f38c3f432499815dcae46a646ce302bca811d230c09fe73223924ff6a346bea
-
Filesize
184KB
MD55e1f88e5b3028ef9f300d083d7bc5275
SHA1501a99d1d8a0e6e87f6bc140ae9c8f69a4eedb8a
SHA2563962e88c87393a969ccc7039c9df41849cdc0bd3f09c506a5a7e19f8032f784b
SHA51202a3e62f8d0ab72dc8126fbdebbf05a482e5266d841974896896fb9798609e109009af2e28a301aff84b4adcf44f8ae2aae4c4557eb25c55d63c18b47e2942d4
-
Filesize
184KB
MD5f99632f0a772a8133130a76f6b10c3a1
SHA1bceb4d6102a1540cd00c6c85a2d097cfa9a97b42
SHA2565a909af5800d4985c042bd9bfe36f72602564fdc29834be45d51f7209813681b
SHA512e5b2e3189e1648bc1f1d09a7082f88ceabc904b1dc853636e283810933181312d4ed44281810558c35bc557eb29d003bddb45cb1a76493a47278627bffe2df62
-
Filesize
128KB
MD5f9c11b3a8eb05250ae792fa77b964d92
SHA1d5ce151f45dee981e62031c54c32a89efaa6e91f
SHA256156463b3f9b29f0ab05bc90d499f8eb47b6a1d5a762d37a2801f1ca2c0266faf
SHA5128e92629ba94a29b0c1dd913a5c2cfc613968f9306bb0ec50c8dfed1aab6f8be2a340ec0c8efae2c8e0352e398cedc81607183218752bd5fbe46ea0099a678425
-
Filesize
184KB
MD53915323afd218d5c24b495ae6ba75a62
SHA1a3250d84a8f03142f0f8fff9d4c562fa2ac57fee
SHA256337392053551e5fd070498bc5a4f6b2e0481f00a739112059047e8e37d723ed9
SHA512720e68b9285b24f9d5974edb33673d23b9687409e7335228d6b4359f2a72cb4bb666aac7e9680ef3dbca98c953f76fa6a50f0d4121b004a1326ac885fc581db0
-
Filesize
184KB
MD54c7851ac28d454d395061e9721468548
SHA1c23428cec1dafa185eae0d93d4ff515ddc4aad0d
SHA2568c8c04b27e759be523f7713ab63499004148ce9fb4c088084268b5ec97194732
SHA512a7c670a35389c46d9265ca547f3dedf1c954f05492f97886b60b5f2f2605525bcd7f0297386c4e0c69155bf01cf8db47f8e9cbf67be146f401d2eef4a6af13ba
-
Filesize
184KB
MD5c205c3dc01b7c048fd295aa6f8fbf8e8
SHA1cd919d5ae04bf80d6909aa84f730b91b85acc676
SHA2567943d99715fb1aaf5b0900ace96888fe1f684df6df3abc68446596b842f24e41
SHA5123223891be8cb451a057f0ca81a18a22260575e92e671ccad7e3ea88a87d8946a993866dfb2f207bbb55b55ece1e94fa9ff3abe9c1a58ea03f51bbcb45aae40e0
-
Filesize
184KB
MD5c5f5c9e6e6dc7cbaca4765351b7f53fb
SHA1a8624a384dbc70b087718ba25359513fbabb7045
SHA2563a8ec46b3b8cb0242fa758de1839e917b3ce9378467269d8298a7d21a44cc303
SHA512741a6d83f3c125238051a728f0a0c5357d11a7568937b6228a281dc10b8666ca068cf0525e05b23dac45d5ee1b123687e17d54c4104616721d4f3a7c3d79ced7
-
Filesize
184KB
MD51a05e7705012042aa4e5b2d45a756796
SHA1f1362b657d08097aa75e05e594c7af3727257a9f
SHA256f6d720626f1f59fc552700ae5ed39b3fb5cd5a864c1602f7e76926cf647f8261
SHA512167b1d84287a7d7f39882e1ea0d379953e3bdc0197f017d25e01efa59b2216e418de5ba61d9639b021045aec6bca89c150145d14d027d0e0291787e3db2c84ec
-
Filesize
184KB
MD55fdfba86c5d05bf35d3603643e4c0513
SHA17e5b308174f1aa71f9151d7aa26d1ba8f8f2136d
SHA256e0879ae07c6688241226a7dc28a1b89b7f7411474519aaa1422e5f485c05605e
SHA51240140aeb037693ca10213f6f32bcb628a261801941a421014655bafe0c577fc489300eecff85c99071303da47cf464f061c3939a94d531f09f22cb40a82e99b5
-
Filesize
184KB
MD5eebf6acbec9893c1f7dacb6ec86d9aba
SHA1bce5826bcccc5cd5efd734719e4487972af35fe5
SHA256ba1c895524b3adc4025ca816ac2bb18f488be52788ce8e99f7b361c8da277a17
SHA512da26d705d109f30302499c278182e8d0c8ab5d17827f727d0c5416b6158248f414b56f5d8d7f87d5565ac7a496d3188d42defeb0edd79bd9af055442132bcb46
-
Filesize
184KB
MD55df48472b574fb0ce3dd0f737c0528fb
SHA14abcd14c037ffd24c26b80ff259d8ef07645323e
SHA256ff999540b7606ec0e9aa541443a594abd596caa3c462ec29aebb7d3fefef9f8f
SHA512dbc960a2c9012a5de2dacbf2a35e7028b4e1942a9a9628a7df4e54d3732d5b0f407ced7a74bf03d2849310b7c64b230dcd39fdbd17273d6b967091abab09cfa2
-
Filesize
184KB
MD5216aebfc883d52baa11f0d3f87779fe1
SHA1b45bfaa7d36499d5134f61231dab7608360ca2b6
SHA2560b53d5e0ab9a8360b22d1fa0ef31dd4e479c9fa80b85c50d7c8339621ecb4e52
SHA512a7945afaba75cbfa6d3b94aa6ade1cd871c569522415fda5f5fa190ec53c47721fdf6d70be68cceb1a2551ee55a5aa0220a2e284ab78b37a391b5f777cfa6173