Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
29/12/2023, 23:31
Static task
static1
Behavioral task
behavioral1
Sample
06fe35b789da51df1aea13630efaaaf9.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
06fe35b789da51df1aea13630efaaaf9.exe
Resource
win10v2004-20231215-en
General
-
Target
06fe35b789da51df1aea13630efaaaf9.exe
-
Size
184KB
-
MD5
06fe35b789da51df1aea13630efaaaf9
-
SHA1
1cbef43b2fa8f355e05287fd8ac1478b01d0f9b5
-
SHA256
6f52b5efbef69473dcce681d05ebe2c7d7eb1c9222a25284e1002b621859652c
-
SHA512
001217e3a9b67a9d97587d409dbeba0d0a092918e6ccb12373a5ea6183558ef49e9abdf11deaccc7fc85485a9b7d946bfb10df5d48890714deae279d132df106
-
SSDEEP
3072:gqrmo/7x4zAHtQj3MVrNi8nMS4uMgyZUGrSxQxcZUylPrpFY:gq6oCsHtWMxNi8cGgjylPrpF
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2136 Unicorn-57838.exe 2792 Unicorn-36685.exe 2728 Unicorn-48383.exe 2944 Unicorn-28321.exe 2636 Unicorn-44657.exe 2604 Unicorn-41319.exe 1996 Unicorn-7153.exe 548 Unicorn-16836.exe 2916 Unicorn-65482.exe 1568 Unicorn-8860.exe 1644 Unicorn-16317.exe 2876 Unicorn-47859.exe 1608 Unicorn-43967.exe 2348 Unicorn-474.exe 1796 Unicorn-40952.exe 2092 Unicorn-48181.exe 904 Unicorn-11424.exe 2280 Unicorn-36675.exe 2116 Unicorn-132.exe 1772 Unicorn-37273.exe 968 Unicorn-45996.exe 1300 Unicorn-3832.exe 1840 Unicorn-12555.exe 2220 Unicorn-39302.exe 2172 Unicorn-52301.exe 3024 Unicorn-23926.exe 860 Unicorn-32648.exe 2212 Unicorn-7589.exe 2976 Unicorn-35794.exe 2148 Unicorn-61045.exe 1784 Unicorn-44154.exe 2828 Unicorn-53069.exe 2820 Unicorn-15565.exe 2772 Unicorn-46738.exe 2940 Unicorn-1066.exe 1736 Unicorn-54543.exe 2528 Unicorn-15046.exe 2240 Unicorn-39167.exe 2968 Unicorn-48404.exe 2900 Unicorn-28538.exe 2896 Unicorn-32814.exe 1032 Unicorn-49616.exe 2788 Unicorn-32704.exe 2992 Unicorn-31.exe 1064 Unicorn-17520.exe 2456 Unicorn-22158.exe 1480 Unicorn-9351.exe 2336 Unicorn-38878.exe 1972 Unicorn-58744.exe 2396 Unicorn-1375.exe 2068 Unicorn-21774.exe 1696 Unicorn-13798.exe 2384 Unicorn-33664.exe 2036 Unicorn-50192.exe 1096 Unicorn-24379.exe 1768 Unicorn-44245.exe 1372 Unicorn-14156.exe 1764 Unicorn-34576.exe 1916 Unicorn-62610.exe 556 Unicorn-34022.exe 948 Unicorn-14156.exe 788 Unicorn-4338.exe 2000 Unicorn-54115.exe 1716 Unicorn-45434.exe -
Loads dropped DLL 64 IoCs
pid Process 2652 06fe35b789da51df1aea13630efaaaf9.exe 2652 06fe35b789da51df1aea13630efaaaf9.exe 2652 06fe35b789da51df1aea13630efaaaf9.exe 2652 06fe35b789da51df1aea13630efaaaf9.exe 2136 Unicorn-57838.exe 2136 Unicorn-57838.exe 2792 Unicorn-36685.exe 2792 Unicorn-36685.exe 2728 Unicorn-48383.exe 2728 Unicorn-48383.exe 2136 Unicorn-57838.exe 2136 Unicorn-57838.exe 2944 Unicorn-28321.exe 2944 Unicorn-28321.exe 2792 Unicorn-36685.exe 2792 Unicorn-36685.exe 2636 Unicorn-44657.exe 2636 Unicorn-44657.exe 2728 Unicorn-48383.exe 2728 Unicorn-48383.exe 1652 WerFault.exe 1652 WerFault.exe 1652 WerFault.exe 1652 WerFault.exe 1652 WerFault.exe 872 WerFault.exe 872 WerFault.exe 872 WerFault.exe 872 WerFault.exe 872 WerFault.exe 2944 Unicorn-28321.exe 2944 Unicorn-28321.exe 548 Unicorn-16836.exe 548 Unicorn-16836.exe 2916 Unicorn-65482.exe 2916 Unicorn-65482.exe 2636 Unicorn-44657.exe 2636 Unicorn-44657.exe 1568 Unicorn-8860.exe 1568 Unicorn-8860.exe 1644 Unicorn-16317.exe 1644 Unicorn-16317.exe 2876 Unicorn-47859.exe 2876 Unicorn-47859.exe 548 Unicorn-16836.exe 548 Unicorn-16836.exe 2348 Unicorn-474.exe 2348 Unicorn-474.exe 1608 Unicorn-43967.exe 1608 Unicorn-43967.exe 2916 Unicorn-65482.exe 2916 Unicorn-65482.exe 1796 Unicorn-40952.exe 1796 Unicorn-40952.exe 1568 Unicorn-8860.exe 1568 Unicorn-8860.exe 2092 Unicorn-48181.exe 2092 Unicorn-48181.exe 1644 Unicorn-16317.exe 1644 Unicorn-16317.exe 904 Unicorn-11424.exe 904 Unicorn-11424.exe 2876 Unicorn-47859.exe 2876 Unicorn-47859.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 1652 2604 WerFault.exe 33 872 1996 WerFault.exe 34 -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2652 06fe35b789da51df1aea13630efaaaf9.exe 2136 Unicorn-57838.exe 2792 Unicorn-36685.exe 2728 Unicorn-48383.exe 2944 Unicorn-28321.exe 2636 Unicorn-44657.exe 2604 Unicorn-41319.exe 1996 Unicorn-7153.exe 548 Unicorn-16836.exe 2916 Unicorn-65482.exe 1568 Unicorn-8860.exe 1644 Unicorn-16317.exe 2876 Unicorn-47859.exe 1608 Unicorn-43967.exe 2348 Unicorn-474.exe 1796 Unicorn-40952.exe 2092 Unicorn-48181.exe 904 Unicorn-11424.exe 2280 Unicorn-36675.exe 2116 Unicorn-132.exe 1772 Unicorn-37273.exe 1300 Unicorn-3832.exe 968 Unicorn-45996.exe 1840 Unicorn-12555.exe 2172 Unicorn-52301.exe 3024 Unicorn-23926.exe 860 Unicorn-32648.exe 2220 Unicorn-39302.exe 2212 Unicorn-7589.exe 2148 Unicorn-61045.exe 2976 Unicorn-35794.exe 1784 Unicorn-44154.exe 2828 Unicorn-53069.exe 1736 Unicorn-54543.exe 2820 Unicorn-15565.exe 2772 Unicorn-46738.exe 2528 Unicorn-15046.exe 2900 Unicorn-28538.exe 2240 Unicorn-39167.exe 2896 Unicorn-32814.exe 2968 Unicorn-48404.exe 2788 Unicorn-32704.exe 2992 Unicorn-31.exe 1032 Unicorn-49616.exe 1480 Unicorn-9351.exe 2456 Unicorn-22158.exe 2396 Unicorn-1375.exe 2336 Unicorn-38878.exe 1696 Unicorn-13798.exe 2068 Unicorn-21774.exe 1064 Unicorn-17520.exe 1972 Unicorn-58744.exe 2036 Unicorn-50192.exe 948 Unicorn-14156.exe 1768 Unicorn-44245.exe 1372 Unicorn-14156.exe 788 Unicorn-4338.exe 1716 Unicorn-45434.exe 2000 Unicorn-54115.exe 556 Unicorn-34022.exe 1764 Unicorn-34576.exe 1096 Unicorn-24379.exe 1916 Unicorn-62610.exe 640 Unicorn-4972.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2652 wrote to memory of 2136 2652 06fe35b789da51df1aea13630efaaaf9.exe 28 PID 2652 wrote to memory of 2136 2652 06fe35b789da51df1aea13630efaaaf9.exe 28 PID 2652 wrote to memory of 2136 2652 06fe35b789da51df1aea13630efaaaf9.exe 28 PID 2652 wrote to memory of 2136 2652 06fe35b789da51df1aea13630efaaaf9.exe 28 PID 2652 wrote to memory of 2792 2652 06fe35b789da51df1aea13630efaaaf9.exe 29 PID 2652 wrote to memory of 2792 2652 06fe35b789da51df1aea13630efaaaf9.exe 29 PID 2652 wrote to memory of 2792 2652 06fe35b789da51df1aea13630efaaaf9.exe 29 PID 2652 wrote to memory of 2792 2652 06fe35b789da51df1aea13630efaaaf9.exe 29 PID 2136 wrote to memory of 2728 2136 Unicorn-57838.exe 30 PID 2136 wrote to memory of 2728 2136 Unicorn-57838.exe 30 PID 2136 wrote to memory of 2728 2136 Unicorn-57838.exe 30 PID 2136 wrote to memory of 2728 2136 Unicorn-57838.exe 30 PID 2792 wrote to memory of 2944 2792 Unicorn-36685.exe 31 PID 2792 wrote to memory of 2944 2792 Unicorn-36685.exe 31 PID 2792 wrote to memory of 2944 2792 Unicorn-36685.exe 31 PID 2792 wrote to memory of 2944 2792 Unicorn-36685.exe 31 PID 2728 wrote to memory of 2636 2728 Unicorn-48383.exe 32 PID 2728 wrote to memory of 2636 2728 Unicorn-48383.exe 32 PID 2728 wrote to memory of 2636 2728 Unicorn-48383.exe 32 PID 2728 wrote to memory of 2636 2728 Unicorn-48383.exe 32 PID 2136 wrote to memory of 2604 2136 Unicorn-57838.exe 33 PID 2136 wrote to memory of 2604 2136 Unicorn-57838.exe 33 PID 2136 wrote to memory of 2604 2136 Unicorn-57838.exe 33 PID 2136 wrote to memory of 2604 2136 Unicorn-57838.exe 33 PID 2944 wrote to memory of 1996 2944 Unicorn-28321.exe 34 PID 2944 wrote to memory of 1996 2944 Unicorn-28321.exe 34 PID 2944 wrote to memory of 1996 2944 Unicorn-28321.exe 34 PID 2944 wrote to memory of 1996 2944 Unicorn-28321.exe 34 PID 2792 wrote to memory of 548 2792 Unicorn-36685.exe 35 PID 2792 wrote to memory of 548 2792 Unicorn-36685.exe 35 PID 2792 wrote to memory of 548 2792 Unicorn-36685.exe 35 PID 2792 wrote to memory of 548 2792 Unicorn-36685.exe 35 PID 2636 wrote to memory of 2916 2636 Unicorn-44657.exe 36 PID 2636 wrote to memory of 2916 2636 Unicorn-44657.exe 36 PID 2636 wrote to memory of 2916 2636 Unicorn-44657.exe 36 PID 2636 wrote to memory of 2916 2636 Unicorn-44657.exe 36 PID 2728 wrote to memory of 1568 2728 Unicorn-48383.exe 37 PID 2728 wrote to memory of 1568 2728 Unicorn-48383.exe 37 PID 2728 wrote to memory of 1568 2728 Unicorn-48383.exe 37 PID 2728 wrote to memory of 1568 2728 Unicorn-48383.exe 37 PID 2604 wrote to memory of 1652 2604 Unicorn-41319.exe 38 PID 2604 wrote to memory of 1652 2604 Unicorn-41319.exe 38 PID 2604 wrote to memory of 1652 2604 Unicorn-41319.exe 38 PID 2604 wrote to memory of 1652 2604 Unicorn-41319.exe 38 PID 1996 wrote to memory of 872 1996 Unicorn-7153.exe 39 PID 1996 wrote to memory of 872 1996 Unicorn-7153.exe 39 PID 1996 wrote to memory of 872 1996 Unicorn-7153.exe 39 PID 1996 wrote to memory of 872 1996 Unicorn-7153.exe 39 PID 2944 wrote to memory of 1644 2944 Unicorn-28321.exe 40 PID 2944 wrote to memory of 1644 2944 Unicorn-28321.exe 40 PID 2944 wrote to memory of 1644 2944 Unicorn-28321.exe 40 PID 2944 wrote to memory of 1644 2944 Unicorn-28321.exe 40 PID 548 wrote to memory of 2876 548 Unicorn-16836.exe 41 PID 548 wrote to memory of 2876 548 Unicorn-16836.exe 41 PID 548 wrote to memory of 2876 548 Unicorn-16836.exe 41 PID 548 wrote to memory of 2876 548 Unicorn-16836.exe 41 PID 2916 wrote to memory of 1608 2916 Unicorn-65482.exe 42 PID 2916 wrote to memory of 1608 2916 Unicorn-65482.exe 42 PID 2916 wrote to memory of 1608 2916 Unicorn-65482.exe 42 PID 2916 wrote to memory of 1608 2916 Unicorn-65482.exe 42 PID 2636 wrote to memory of 2348 2636 Unicorn-44657.exe 43 PID 2636 wrote to memory of 2348 2636 Unicorn-44657.exe 43 PID 2636 wrote to memory of 2348 2636 Unicorn-44657.exe 43 PID 2636 wrote to memory of 2348 2636 Unicorn-44657.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\06fe35b789da51df1aea13630efaaaf9.exe"C:\Users\Admin\AppData\Local\Temp\06fe35b789da51df1aea13630efaaaf9.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-57838.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57838.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48383.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48383.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44657.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44657.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-65482.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65482.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-43967.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43967.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1608 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37273.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37273.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1772 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15565.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15565.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58744.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58744.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40245.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40245.exe10⤵PID:2768
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13798.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13798.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45434.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45434.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1716 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-59212.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59212.exe10⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41670.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41670.exe11⤵PID:1008
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46738.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46738.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-33664.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33664.exe8⤵
- Executes dropped EXE
PID:2384
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45996.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45996.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:968 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-1066.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1066.exe7⤵
- Executes dropped EXE
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-20977.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20977.exe8⤵PID:1708
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-474.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-474.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-132.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-132.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35794.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35794.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-1375.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1375.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22456.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22456.exe9⤵PID:2488
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6833.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6833.exe10⤵PID:904
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21774.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21774.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38216.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38216.exe8⤵PID:3056
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33203.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33203.exe9⤵PID:1288
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10041.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10041.exe10⤵PID:2848
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61045.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61045.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-31.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-4972.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4972.exe8⤵
- Suspicious use of SetWindowsHookEx
PID:640 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30432.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30432.exe9⤵PID:2428
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8860.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8860.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1568 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40952.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40952.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1796 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3832.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3832.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1300 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44154.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44154.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1784 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9351.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9351.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34874.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34874.exe9⤵PID:1120
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38878.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38878.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2336 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47515.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47515.exe8⤵PID:1816
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53069.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53069.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2828 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-32704.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32704.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62610.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62610.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1916
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14156.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14156.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1372 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27806.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27806.exe8⤵PID:2540
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48989.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48989.exe9⤵PID:2912
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12555.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12555.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54543.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54543.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50192.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50192.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17391.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17391.exe8⤵PID:2752
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58828.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58828.exe9⤵PID:1092
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14458.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14458.exe8⤵PID:1724
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24379.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24379.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1096 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40245.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40245.exe7⤵PID:1924
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41319.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41319.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2604 -s 2444⤵
- Loads dropped DLL
- Program crash
PID:1652
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36685.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36685.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-28321.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28321.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-7153.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7153.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1996 -s 2405⤵
- Loads dropped DLL
- Program crash
PID:872
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16317.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16317.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1644 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48181.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48181.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2092 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-39302.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39302.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17520.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17520.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1064 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13337.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13337.exe8⤵PID:524
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22158.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22158.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17391.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17391.exe7⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14453.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14453.exe8⤵PID:2960
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52301.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52301.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15046.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15046.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44245.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44245.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-57297.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57297.exe8⤵PID:1628
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1132.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1132.exe9⤵PID:2688
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34576.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34576.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1764 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11464.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11464.exe7⤵PID:2784
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52324.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52324.exe8⤵PID:2460
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16836.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16836.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:548 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47859.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47859.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11424.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11424.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:904 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23926.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23926.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-39167.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39167.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54115.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54115.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-1132.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1132.exe9⤵PID:2772
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14156.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14156.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:948 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10395.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10395.exe8⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7991.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7991.exe9⤵PID:268
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28538.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28538.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-4338.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4338.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:788 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-32461.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32461.exe8⤵PID:2924
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32648.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32648.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:860 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49616.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49616.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1032 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51599.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51599.exe7⤵PID:348
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59954.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59954.exe8⤵PID:2352
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40088.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40088.exe7⤵PID:1300
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36675.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36675.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-7589.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7589.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48404.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48404.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21110.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21110.exe7⤵PID:2988
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32814.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32814.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34022.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34022.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:556 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22397.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22397.exe7⤵PID:2156
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD5c5ed0c73cedc46874b028e64bb9cde0b
SHA13ad7eabe38a8acd14e5ca2488636e714971a55df
SHA256f1d4f6ca8d2cc76c5e03e6fab68a2fcda732360fa8c80b894ac2223177c35c80
SHA512c5e476f68dd20f98becfdda4229fa060c704866cd1545086dbe9f21df04a01fbf0c7a775409801951a541b54b330a9fe6abdf0944af76e705db6ca3a19294f99
-
Filesize
184KB
MD53b28352e7d3c7438e8db33d422812c76
SHA1e3254d8cdf7cce4dee9201f6587b433c1dd7cfdf
SHA256c2a4800823f2aed8af13b9a1145c00d5ac673e3d277c9e05926adf8515e44e6a
SHA51206031cb44d9949985aa120918780e1cee2dc807657adfcc2ee4503e31e6a3b2b7d63f7460605db3857fb8f6de4702a31c4de3102e56a541c4c91bb01f93a62fa
-
Filesize
184KB
MD5e7cdc70a5972e1c715c429c8535ce66a
SHA173ac04859d42b3892bee5b5999b1634a6009b84a
SHA256043af7aab083c2e91845a458007409272548e41c7e676964afef04a6b0e6f59a
SHA5124ed3a8a324d5de3124a5c8e2c94edce0380e1dbc016c43dbdd11c7086cb2b5c14cbf5461cca67582589ec8c4630813a2a6e2a6d8da678665bd2908ea67aa9f99
-
Filesize
184KB
MD567d4da00df2709f6d148d03616f700c1
SHA1b56ba178b23b876de2b3a602784974c7bfff2bfc
SHA256886cc6a74b1df5f0d2b83814aefa02fd6019fef8e961b070d7b11075694323d1
SHA5120739b7f7cab373b497de66256102f55453720ea4b089860efcaca25455ba1cdddae19174479c6536e9b05678385dbae4e12be76eeeef7d3cd95b29c3e8b33fc2
-
Filesize
184KB
MD54dc6aa435df818a743d724e32255024f
SHA177f8c817a4e64484ded0cc03ab7935c910e9e8ea
SHA256f2326064daceb84279084457087ccf3d0e9d63d5bd66cacb4512584b176614ef
SHA5126a1e4aa03647913d4eb2682e3e91c52bc73498dbb8487ea57028f154dca5696049a26e7be638f4045b22d699183c063f4944328a1d1f99c7114e420a10981bed
-
Filesize
184KB
MD5ac1b9919379b699c98eb08fc372f5c0d
SHA1d73bcc9272710ccf8e0aaa2eb6e89e53dfd23225
SHA256af994c62dded8074fdd88b6509bd398de077391a45038109de6c9d94ea1af59f
SHA5120f6b2d174ef4de7946bdc464949651b4f78937e63611009f39a51fed8a74ae3f61ad9868eb145d1c9f1356e7a7dcfd115de2e9bcf15e16fdebc9441ee528cae0
-
Filesize
184KB
MD532f2589908e1cd09c09714eb06a61931
SHA1e86650d2aefe40bac0fa44d2a0ba76c56977a524
SHA256b45b0d48d4a002b64791616fb4c4012d7a28098bfeac546fe994498512a1c9fb
SHA512a0fec0133be82b54032fcadc1f1c9b77add71da0dd2e8a09cc71584f87325cb1f63bfb67bab3963a900efa12261587e30572e7d435a4220b43cf94cf5e38eb05
-
Filesize
184KB
MD50019054e2890d9b7f5c3de7cdda2db07
SHA1043b891b3219358d58707ede10316471664bdb2e
SHA256987488b0114497179c436882ea3dbc4b7aa8fb2d1d7cd3ad1037cceae61b2956
SHA512e48075bdeb93254ec98730d7b6814353a129827c36bdc14ef29109cfa78597fe8e00fb91c178ba06f0f32259d8369964e4b4dbade897caab3ac4926ea8797534
-
Filesize
184KB
MD5006b85e14e995504eb8a120c1227ddc2
SHA16aa56b74d828e2f359c3d729d692c6968cbfc0b7
SHA25655fe62adeffdbc3c196dd31c8a11baf1f01f114d0a7cd1ba72c03f001c49e2c7
SHA512f4e696473a9fd1ef9588cddce4eb0c26a987d0b64999f12724d608c008d947ecff6bb7aafacac9cae97f3233c546e7d675cfa4c959f8cfdc0cf1faec8efc72b9
-
Filesize
184KB
MD528bd1cefd7d4f7cc5cf6b16a14ec4146
SHA1b111a5056a9b768eb8333379ec094f9977cc4b0b
SHA25645cb72b78eb3fbb0919d419eaa0ace5300282c0429e6b85af6ae72cf291ba64a
SHA5124a31ca66cb4a3c9c88ba44b7d71e4eb9aa3d043ad9298f0511d56b025f78d4cfba684bf891c4b1f5564d964273dccc599338d5640b9bb1385a2cd211e752d332
-
Filesize
184KB
MD5240a1e0275ec6058b6e91381595a7adc
SHA126b34f972a33ee2f27040e970313570fba818fd6
SHA256422a80d8e4097c0e2d1e744b666cef0058ac70f9a5d0022acd1a52cc8775955a
SHA512a648b6364831b2ba1a77b7b70c1e5f1ae380f925abf09a9029e0350a69545497bbf8d5790fb6d9987d03c6bdb03b5fda6d1f91e0b3dd18d21679d152222178f5
-
Filesize
184KB
MD510e60df0a3820c0c3f41c6461f0652b0
SHA1cc1dc72a2e5fa9147391dd6c737180549ae672de
SHA256ae20c330ca2a20dab71d97a018294b120a27d8c653aee6edbe536044a834661e
SHA5128f893100ae56b2f15f5b8b7f287262cdf61f27d01fcbfe37636dd26fffa17eddce3ff61d81c6e96a933353f9a687a30de3d2d1e2c4be17171be2768c7dbbb38c
-
Filesize
184KB
MD50a58a7978d675ffe5faa70793bfdfc9e
SHA185a06ae9d2c06df3fc76e576e745bff2a61b5fbb
SHA2566e047ba243d9ada2bf06b7956d43343d18dacf3bac78651930bf1597099928f8
SHA5120f1d01355be40ab5a4cd6d542a2581b96e03221674dd2f86d32ad1daf50fa2d7ffdc93b59a4417924f14b5c4be0cbbc898a7dd633a71ffcfecba60f2b7c21c81
-
Filesize
184KB
MD5d0a54aab12d5ec47834d968569a40863
SHA17fb43ae4a2c140a4db021e423e7e8e88ba10d4e9
SHA256a156ec6b3a468bab958f88516ed3f9783637f327eabef65c38801a74272aab5a
SHA512c32d3b5d3b6ef26f9bb5f3e252e53599e39610dd6c7d3f0087f44cd3f253ae169740e5bfff9ad0c60d2138ecdbfe59bcc4c5daf5116177e4ae1bf88da8725310
-
Filesize
184KB
MD52255b8ef099caa24eac35e73f018eb65
SHA1ddb293a20fd9b5e9d0506f0f1283118bb8edf7c4
SHA2566f6c5a49b5c00e6aa68fb3af3c09c1cf8bb6b2b4095cdb9acd8cf62a219baf62
SHA5124e3dd5da0639f65078bd1950c73737cdd303ce93d32f5ab1e4111ea37340052630c7312d2c1fa34eb7aef39d51dc821e1a7f524f85933b77fe9f43b8a0bb66bf
-
Filesize
184KB
MD52f80803c54728dd4432e7f304764e69d
SHA11fec47fed0ea4faac9e0135e68cdf9d0d6f5413a
SHA2561ce78fc7f1c6879e5fc038328c3e8eafb0d3c3efd54592e026b17af466935730
SHA51201dc5c91e42661dad048f14402c471490d1eceb8a19ac508422ee2fd3bca4f9abb35b593dd613f2f750c79b678b69c7189f701dac6591f964415d653a97c6c22