Analysis
-
max time kernel
13s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
28-12-2023 22:58
Static task
static1
Behavioral task
behavioral1
Sample
fe5b6f35f49b326a1de3c62c0482a6f2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
fe5b6f35f49b326a1de3c62c0482a6f2.exe
Resource
win10v2004-20231222-en
General
-
Target
fe5b6f35f49b326a1de3c62c0482a6f2.exe
-
Size
184KB
-
MD5
fe5b6f35f49b326a1de3c62c0482a6f2
-
SHA1
1c2cf1ba5898db30212bb404466ce7e46f58425f
-
SHA256
4df708c4794e020f32848b41057e2975b5decb3b3c13b2664bcaa140671377ad
-
SHA512
4958440238f5b6647e51876e1df9a70cb12a9b4faaf6b19505e6ceb793e1a446b3ff8152ae9c28be6996511496cd3162fae663e05b6b09430711353c3ec935cd
-
SSDEEP
3072:yT9MomALPUf0gOj1M3+6vJ01WX0ME8pu8SxKia1SNlPvpFq:yTaorC0geMO6vJCYBKNlPvpF
Malware Config
Signatures
-
Executes dropped EXE 9 IoCs
pid Process 2008 Unicorn-5832.exe 2820 Unicorn-59475.exe 2824 Unicorn-15982.exe 2660 Unicorn-36206.exe 2732 Unicorn-12665.exe 2612 Unicorn-56818.exe 1916 Unicorn-45765.exe 2944 Unicorn-17731.exe 3064 Unicorn-58977.exe -
Loads dropped DLL 18 IoCs
pid Process 1080 fe5b6f35f49b326a1de3c62c0482a6f2.exe 1080 fe5b6f35f49b326a1de3c62c0482a6f2.exe 2008 Unicorn-5832.exe 2008 Unicorn-5832.exe 1080 fe5b6f35f49b326a1de3c62c0482a6f2.exe 1080 fe5b6f35f49b326a1de3c62c0482a6f2.exe 2820 Unicorn-59475.exe 2820 Unicorn-59475.exe 2008 Unicorn-5832.exe 2008 Unicorn-5832.exe 2824 Unicorn-15982.exe 2824 Unicorn-15982.exe 2660 Unicorn-36206.exe 2660 Unicorn-36206.exe 2820 Unicorn-59475.exe 2820 Unicorn-59475.exe 2732 Unicorn-12665.exe 2732 Unicorn-12665.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2428 928 WerFault.exe 55 -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 1080 fe5b6f35f49b326a1de3c62c0482a6f2.exe 2008 Unicorn-5832.exe 2820 Unicorn-59475.exe 2824 Unicorn-15982.exe 2660 Unicorn-36206.exe 2732 Unicorn-12665.exe 2612 Unicorn-56818.exe 1916 Unicorn-45765.exe -
Suspicious use of WriteProcessMemory 36 IoCs
description pid Process procid_target PID 1080 wrote to memory of 2008 1080 fe5b6f35f49b326a1de3c62c0482a6f2.exe 28 PID 1080 wrote to memory of 2008 1080 fe5b6f35f49b326a1de3c62c0482a6f2.exe 28 PID 1080 wrote to memory of 2008 1080 fe5b6f35f49b326a1de3c62c0482a6f2.exe 28 PID 1080 wrote to memory of 2008 1080 fe5b6f35f49b326a1de3c62c0482a6f2.exe 28 PID 2008 wrote to memory of 2820 2008 Unicorn-5832.exe 30 PID 2008 wrote to memory of 2820 2008 Unicorn-5832.exe 30 PID 2008 wrote to memory of 2820 2008 Unicorn-5832.exe 30 PID 2008 wrote to memory of 2820 2008 Unicorn-5832.exe 30 PID 1080 wrote to memory of 2824 1080 fe5b6f35f49b326a1de3c62c0482a6f2.exe 29 PID 1080 wrote to memory of 2824 1080 fe5b6f35f49b326a1de3c62c0482a6f2.exe 29 PID 1080 wrote to memory of 2824 1080 fe5b6f35f49b326a1de3c62c0482a6f2.exe 29 PID 1080 wrote to memory of 2824 1080 fe5b6f35f49b326a1de3c62c0482a6f2.exe 29 PID 2820 wrote to memory of 2660 2820 Unicorn-59475.exe 33 PID 2820 wrote to memory of 2660 2820 Unicorn-59475.exe 33 PID 2820 wrote to memory of 2660 2820 Unicorn-59475.exe 33 PID 2820 wrote to memory of 2660 2820 Unicorn-59475.exe 33 PID 2008 wrote to memory of 2732 2008 Unicorn-5832.exe 74 PID 2008 wrote to memory of 2732 2008 Unicorn-5832.exe 74 PID 2008 wrote to memory of 2732 2008 Unicorn-5832.exe 74 PID 2008 wrote to memory of 2732 2008 Unicorn-5832.exe 74 PID 2824 wrote to memory of 2612 2824 Unicorn-15982.exe 31 PID 2824 wrote to memory of 2612 2824 Unicorn-15982.exe 31 PID 2824 wrote to memory of 2612 2824 Unicorn-15982.exe 31 PID 2824 wrote to memory of 2612 2824 Unicorn-15982.exe 31 PID 2660 wrote to memory of 1916 2660 Unicorn-36206.exe 38 PID 2660 wrote to memory of 1916 2660 Unicorn-36206.exe 38 PID 2660 wrote to memory of 1916 2660 Unicorn-36206.exe 38 PID 2660 wrote to memory of 1916 2660 Unicorn-36206.exe 38 PID 2820 wrote to memory of 2944 2820 Unicorn-59475.exe 37 PID 2820 wrote to memory of 2944 2820 Unicorn-59475.exe 37 PID 2820 wrote to memory of 2944 2820 Unicorn-59475.exe 37 PID 2820 wrote to memory of 2944 2820 Unicorn-59475.exe 37 PID 2732 wrote to memory of 3064 2732 Unicorn-12665.exe 36 PID 2732 wrote to memory of 3064 2732 Unicorn-12665.exe 36 PID 2732 wrote to memory of 3064 2732 Unicorn-12665.exe 36 PID 2732 wrote to memory of 3064 2732 Unicorn-12665.exe 36
Processes
-
C:\Users\Admin\AppData\Local\Temp\fe5b6f35f49b326a1de3c62c0482a6f2.exe"C:\Users\Admin\AppData\Local\Temp\fe5b6f35f49b326a1de3c62c0482a6f2.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1080 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5832.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5832.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-59475.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59475.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-36206.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36206.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45765.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45765.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18303.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18303.exe6⤵PID:1608
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45734.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45734.exe7⤵PID:1640
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16823.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16823.exe6⤵PID:2152
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40346.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40346.exe5⤵PID:1708
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48858.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48858.exe6⤵PID:1124
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14725.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14725.exe7⤵PID:2244
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31353.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31353.exe8⤵PID:796
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56322.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56322.exe9⤵PID:2868
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19613.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19613.exe10⤵PID:2420
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17731.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17731.exe4⤵
- Executes dropped EXE
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-19372.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19372.exe5⤵PID:3016
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36414.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36414.exe6⤵PID:1804
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28800.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28800.exe5⤵PID:2324
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4144.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4144.exe6⤵PID:1468
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52432.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52432.exe7⤵PID:2460
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21024.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21024.exe8⤵PID:2020
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8172.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8172.exe3⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58977.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58977.exe4⤵
- Executes dropped EXE
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51167.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51167.exe5⤵PID:880
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52750.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52750.exe6⤵PID:3020
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58709.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58709.exe7⤵PID:2880
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53497.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53497.exe5⤵PID:592
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40083.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40083.exe6⤵PID:2896
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42416.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42416.exe7⤵PID:1536
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65043.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65043.exe4⤵PID:1576
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36606.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36606.exe5⤵PID:300
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15982.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15982.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-56818.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56818.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9776.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9776.exe4⤵PID:1200
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39984.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39984.exe5⤵PID:2084
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65194.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65194.exe6⤵PID:928
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 928 -s 2207⤵
- Program crash
PID:2428
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61665.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61665.exe5⤵PID:2076
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42416.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42416.exe6⤵PID:1900
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27357.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27357.exe7⤵PID:2588
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19049.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19049.exe4⤵PID:2052
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44774.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44774.exe5⤵PID:2484
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42416.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42416.exe6⤵PID:1968
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44018.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44018.exe7⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56888.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56888.exe8⤵PID:2548
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42073.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42073.exe9⤵PID:1384
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51364.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51364.exe3⤵PID:2472
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11395.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11395.exe4⤵PID:1396
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37566.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37566.exe5⤵PID:332
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25527.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25527.exe6⤵PID:3040
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5661.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5661.exe5⤵PID:3060
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42416.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42416.exe6⤵PID:2080
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12665.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12665.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58213.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58213.exe8⤵PID:296
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21024.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21024.exe9⤵PID:1908
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6986.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6986.exe10⤵PID:2988
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25868.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25868.exe4⤵PID:1620
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33425.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33425.exe5⤵PID:2724
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
92KB
MD5b655e65f9e99635341f38ce5d99cf6d5
SHA14ae317999f17ce6fbaa51768c60c62f980a5408e
SHA256af64382cb6addd375fa97653a9f5828f812cf996adb86c8f8200834b914ce2f2
SHA512e81a6d48458ea1f3270d1a421c6ebb7ce70a4003c108bcb4ac165d4bab42339ab3a68015bfdffb8041082529ebeda80b0598b82ba031c54e18e25c14f1f012b7
-
Filesize
184KB
MD57a396698fbe27bc33524dc2632a3e9ae
SHA1e2cabc97c5d7bcf1fdfcb421822a165b94b5344d
SHA256cf35f2efb6f34a35b99454c21ce9af6b4b9ec73574a4e5f7fe2857c3bdf879de
SHA512a9db94f2ec54171459fa06f14889e5a9c288edb8c9e59cbab3b44d7767f6b4c8d3954bc525b3240ca207423a5acc106ae686847e19bc38b6c06a7e15c0d52bbc
-
Filesize
184KB
MD5c1571a331f858643e1d3c38deb56e14f
SHA1cb952ef5edea9d62607cf07c71eda55bbb1157c5
SHA256e70fa102b840d61e9f811da7740261ea31c77bf91122caf7b55671afa81d2074
SHA512612f9154c8ae65b9482fa71eb3547d71615b3f7901f62f1e6e5b038f8f7e4c924e4128d8dc3efbf57bfe641e76904670516cd86ce9062666afe53bf938140367
-
Filesize
184KB
MD570d3796b79775e0cc83e7aa077854c5d
SHA1d690ca79fd4d57671db753287c0eaa56d5a52ed7
SHA2562445746ca62674a56e1968941e33691730ff50747e19a44ecd761cf4e461f1fe
SHA512ba1d0ef29fe182074fc8e99ab4747b569e291491da960d4f5f8cbd8c0acb336c718ab72dc6cbbbbd7c57316d553c03193ba52899bdd0e219dd9ba8d61304fd87
-
Filesize
184KB
MD51e80a00c094ce17f694a5dc506bc7b49
SHA17645fdcbefbacc151e272d638150cccb4bae176e
SHA256fd8eef885f250a2973855e996d8841d1ede4ba46ae8dcf9b8c40243218c99a15
SHA5125c3bdc4b3bd546b7f4778fe9c1dafc29ced75f9b8fa3f2a80fcf61979d2f2d19969102ba567d9c6efe4f66648d5df26400e95f0d30d60a1f171342ce9e2a8461
-
Filesize
184KB
MD547e30d34bd6ec28060bc91a651709bbf
SHA1a8a24b53e796c0bc878178a3b785a8dc4495cd2b
SHA256414be5a8628b9ff5c62a9d96c8eaf5a632f8fbc39b30773ec9023abc155a8e66
SHA51298ee6c2e5f16cad110a2b90c5eb7cebae9e556d0d1edb4fedc57fd4908909df993512dbb561f0ed1523db06ad070ff29492389792dd59dd056e00bf5a59c5cb1
-
Filesize
93KB
MD5f90b0852147b98deadcf734d33211b6f
SHA1613f8cfa334d65a80ffcbf424c98907833d6327f
SHA256247b0afce55a3fd0d7f662197c0fac3e8ddf51a7b9c60aa81042d5c52fdfd7d5
SHA51274ceaaa0d3d10fb652ebea0ec21ef37e9a33fc2fd9ac6f2afd1449e4528de48c737cd37a8bcdb01762e2f4c689b9f886f191eea588d846a15e564dbe1ac41f87
-
Filesize
184KB
MD50d3cd52a38b0b44d453548fbbfb4f12d
SHA16f93a34b059af8ee95c6935a21dd595124ff9a35
SHA25621675ed72dd6beb85598d2baabeb89210fb7d1624167e6a36f3cda06a00b6db2
SHA512693215b2ff393338d3b1fc1e1a55f0d85ee7dd113d2bacfe031c61d0a635f9cdea1aebf52a44bc56a8f52f802570b4827d97fc196ea62173183a5b90ad32ca7e
-
Filesize
95KB
MD57cf3022bcc10fc1ca56460ec133a350d
SHA131a1041d0de31db94c1e21f2a07944437ad0b3c1
SHA2565945b42cb9eba060d393257047f619180da692a820c23e66536ef2f0b70d3f81
SHA5123bedff46701fef5488df0f4c8cf42bbbc18d4fd8d385b11ad29d89d31cf212d21aacf2a817293ab4f45aaa8d5149e64b24e3aa31b9b268a62c0dd7d8f4f03b30
-
Filesize
92KB
MD55f6323a7b1733ca20d042cebcdb44f02
SHA1e5b22119cc0baa24a6f516f0876102cc90c67c18
SHA25603ec5062c7830383ce7a9270a4bfb7edc6426857af42fe185df50b572cb481b1
SHA5121d114fabc16ce4d9f3b0a95ac5ccf558ee47450c48eea0765e77987877d5797ba50942b0569423ce0d0e000905eaf03339c7b74a93b2fab54497b5232b7c0f28