Analysis

  • max time kernel
    150s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    29/12/2023, 23:31

General

  • Target

    06fe35b789da51df1aea13630efaaaf9.exe

  • Size

    184KB

  • MD5

    06fe35b789da51df1aea13630efaaaf9

  • SHA1

    1cbef43b2fa8f355e05287fd8ac1478b01d0f9b5

  • SHA256

    6f52b5efbef69473dcce681d05ebe2c7d7eb1c9222a25284e1002b621859652c

  • SHA512

    001217e3a9b67a9d97587d409dbeba0d0a092918e6ccb12373a5ea6183558ef49e9abdf11deaccc7fc85485a9b7d946bfb10df5d48890714deae279d132df106

  • SSDEEP

    3072:gqrmo/7x4zAHtQj3MVrNi8nMS4uMgyZUGrSxQxcZUylPrpFY:gq6oCsHtWMxNi8cGgjylPrpF

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 64 IoCs
  • Loads dropped DLL 64 IoCs
  • Program crash 2 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\06fe35b789da51df1aea13630efaaaf9.exe
    "C:\Users\Admin\AppData\Local\Temp\06fe35b789da51df1aea13630efaaaf9.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2652
    • C:\Users\Admin\AppData\Local\Temp\Unicorn-57838.exe
      C:\Users\Admin\AppData\Local\Temp\Unicorn-57838.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2136
      • C:\Users\Admin\AppData\Local\Temp\Unicorn-48383.exe
        C:\Users\Admin\AppData\Local\Temp\Unicorn-48383.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2728
        • C:\Users\Admin\AppData\Local\Temp\Unicorn-44657.exe
          C:\Users\Admin\AppData\Local\Temp\Unicorn-44657.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2636
          • C:\Users\Admin\AppData\Local\Temp\Unicorn-65482.exe
            C:\Users\Admin\AppData\Local\Temp\Unicorn-65482.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2916
            • C:\Users\Admin\AppData\Local\Temp\Unicorn-43967.exe
              C:\Users\Admin\AppData\Local\Temp\Unicorn-43967.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              PID:1608
              • C:\Users\Admin\AppData\Local\Temp\Unicorn-37273.exe
                C:\Users\Admin\AppData\Local\Temp\Unicorn-37273.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:1772
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-15565.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-15565.exe
                  8⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:2820
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-58744.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-58744.exe
                    9⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:1972
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-40245.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-40245.exe
                      10⤵
                        PID:2768
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-13798.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-13798.exe
                    8⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:1696
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-45434.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-45434.exe
                      9⤵
                      • Executes dropped EXE
                      • Suspicious use of SetWindowsHookEx
                      PID:1716
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-59212.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-59212.exe
                        10⤵
                          PID:2756
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-41670.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-41670.exe
                            11⤵
                              PID:1008
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-46738.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-46738.exe
                      7⤵
                      • Executes dropped EXE
                      • Suspicious use of SetWindowsHookEx
                      PID:2772
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-33664.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-33664.exe
                        8⤵
                        • Executes dropped EXE
                        PID:2384
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-45996.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-45996.exe
                    6⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:968
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-1066.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-1066.exe
                      7⤵
                      • Executes dropped EXE
                      PID:2940
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-20977.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-20977.exe
                        8⤵
                          PID:1708
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-474.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-474.exe
                    5⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of SetWindowsHookEx
                    PID:2348
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-132.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-132.exe
                      6⤵
                      • Executes dropped EXE
                      • Suspicious use of SetWindowsHookEx
                      PID:2116
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-35794.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-35794.exe
                        7⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:2976
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-1375.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-1375.exe
                          8⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:2396
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-22456.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-22456.exe
                            9⤵
                              PID:2488
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-6833.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-6833.exe
                                10⤵
                                  PID:904
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-21774.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-21774.exe
                            7⤵
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            PID:2068
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-38216.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-38216.exe
                              8⤵
                                PID:3056
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-33203.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-33203.exe
                                  9⤵
                                    PID:1288
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-10041.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-10041.exe
                                      10⤵
                                        PID:2848
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-61045.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-61045.exe
                                6⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                PID:2148
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-31.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-31.exe
                                  7⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetWindowsHookEx
                                  PID:2992
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-4972.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-4972.exe
                                    8⤵
                                    • Suspicious use of SetWindowsHookEx
                                    PID:640
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-30432.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-30432.exe
                                      9⤵
                                        PID:2428
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-8860.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-8860.exe
                              4⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • Suspicious use of SetWindowsHookEx
                              PID:1568
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-40952.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-40952.exe
                                5⤵
                                • Executes dropped EXE
                                • Loads dropped DLL
                                • Suspicious use of SetWindowsHookEx
                                PID:1796
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-3832.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-3832.exe
                                  6⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetWindowsHookEx
                                  PID:1300
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-44154.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-44154.exe
                                    7⤵
                                    • Executes dropped EXE
                                    • Suspicious use of SetWindowsHookEx
                                    PID:1784
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-9351.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-9351.exe
                                      8⤵
                                      • Executes dropped EXE
                                      • Suspicious use of SetWindowsHookEx
                                      PID:1480
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-34874.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-34874.exe
                                        9⤵
                                          PID:1120
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-38878.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-38878.exe
                                      7⤵
                                      • Executes dropped EXE
                                      • Suspicious use of SetWindowsHookEx
                                      PID:2336
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-47515.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-47515.exe
                                        8⤵
                                          PID:1816
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-53069.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-53069.exe
                                      6⤵
                                      • Executes dropped EXE
                                      • Suspicious use of SetWindowsHookEx
                                      PID:2828
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-32704.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-32704.exe
                                        7⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetWindowsHookEx
                                        PID:2788
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-62610.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-62610.exe
                                          8⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetWindowsHookEx
                                          PID:1916
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-14156.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-14156.exe
                                        7⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetWindowsHookEx
                                        PID:1372
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-27806.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-27806.exe
                                          8⤵
                                            PID:2540
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-48989.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-48989.exe
                                              9⤵
                                                PID:2912
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-12555.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-12555.exe
                                        5⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetWindowsHookEx
                                        PID:1840
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-54543.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-54543.exe
                                          6⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetWindowsHookEx
                                          PID:1736
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-50192.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-50192.exe
                                            7⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetWindowsHookEx
                                            PID:2036
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-17391.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-17391.exe
                                              8⤵
                                                PID:2752
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-58828.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-58828.exe
                                                  9⤵
                                                    PID:1092
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-14458.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-14458.exe
                                                  8⤵
                                                    PID:1724
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-24379.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-24379.exe
                                                6⤵
                                                • Executes dropped EXE
                                                • Suspicious use of SetWindowsHookEx
                                                PID:1096
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-40245.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-40245.exe
                                                  7⤵
                                                    PID:1924
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-41319.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-41319.exe
                                            3⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetWindowsHookEx
                                            • Suspicious use of WriteProcessMemory
                                            PID:2604
                                            • C:\Windows\SysWOW64\WerFault.exe
                                              C:\Windows\SysWOW64\WerFault.exe -u -p 2604 -s 244
                                              4⤵
                                              • Loads dropped DLL
                                              • Program crash
                                              PID:1652
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-36685.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-36685.exe
                                          2⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          • Suspicious use of SetWindowsHookEx
                                          • Suspicious use of WriteProcessMemory
                                          PID:2792
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-28321.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-28321.exe
                                            3⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            • Suspicious use of SetWindowsHookEx
                                            • Suspicious use of WriteProcessMemory
                                            PID:2944
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-7153.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-7153.exe
                                              4⤵
                                              • Executes dropped EXE
                                              • Suspicious use of SetWindowsHookEx
                                              • Suspicious use of WriteProcessMemory
                                              PID:1996
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -u -p 1996 -s 240
                                                5⤵
                                                • Loads dropped DLL
                                                • Program crash
                                                PID:872
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-16317.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-16317.exe
                                              4⤵
                                              • Executes dropped EXE
                                              • Loads dropped DLL
                                              • Suspicious use of SetWindowsHookEx
                                              PID:1644
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-48181.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-48181.exe
                                                5⤵
                                                • Executes dropped EXE
                                                • Loads dropped DLL
                                                • Suspicious use of SetWindowsHookEx
                                                PID:2092
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-39302.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-39302.exe
                                                  6⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:2220
                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-17520.exe
                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-17520.exe
                                                    7⤵
                                                    • Executes dropped EXE
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:1064
                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-13337.exe
                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-13337.exe
                                                      8⤵
                                                        PID:524
                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-22158.exe
                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-22158.exe
                                                    6⤵
                                                    • Executes dropped EXE
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:2456
                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-17391.exe
                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-17391.exe
                                                      7⤵
                                                        PID:2284
                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-14453.exe
                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-14453.exe
                                                          8⤵
                                                            PID:2960
                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-52301.exe
                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-52301.exe
                                                      5⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:2172
                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-15046.exe
                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-15046.exe
                                                        6⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:2528
                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-44245.exe
                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-44245.exe
                                                          7⤵
                                                          • Executes dropped EXE
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:1768
                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-57297.exe
                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-57297.exe
                                                            8⤵
                                                              PID:1628
                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-1132.exe
                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-1132.exe
                                                                9⤵
                                                                  PID:2688
                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-34576.exe
                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-34576.exe
                                                            6⤵
                                                            • Executes dropped EXE
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:1764
                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-11464.exe
                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-11464.exe
                                                              7⤵
                                                                PID:2784
                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-52324.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-52324.exe
                                                                  8⤵
                                                                    PID:2460
                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-16836.exe
                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-16836.exe
                                                          3⤵
                                                          • Executes dropped EXE
                                                          • Loads dropped DLL
                                                          • Suspicious use of SetWindowsHookEx
                                                          • Suspicious use of WriteProcessMemory
                                                          PID:548
                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-47859.exe
                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-47859.exe
                                                            4⤵
                                                            • Executes dropped EXE
                                                            • Loads dropped DLL
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:2876
                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-11424.exe
                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-11424.exe
                                                              5⤵
                                                              • Executes dropped EXE
                                                              • Loads dropped DLL
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:904
                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-23926.exe
                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-23926.exe
                                                                6⤵
                                                                • Executes dropped EXE
                                                                • Suspicious use of SetWindowsHookEx
                                                                PID:3024
                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-39167.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-39167.exe
                                                                  7⤵
                                                                  • Executes dropped EXE
                                                                  • Suspicious use of SetWindowsHookEx
                                                                  PID:2240
                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-54115.exe
                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-54115.exe
                                                                    8⤵
                                                                    • Executes dropped EXE
                                                                    • Suspicious use of SetWindowsHookEx
                                                                    PID:2000
                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-1132.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-1132.exe
                                                                      9⤵
                                                                        PID:2772
                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-14156.exe
                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-14156.exe
                                                                    7⤵
                                                                    • Executes dropped EXE
                                                                    • Suspicious use of SetWindowsHookEx
                                                                    PID:948
                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-10395.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-10395.exe
                                                                      8⤵
                                                                        PID:1692
                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-7991.exe
                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-7991.exe
                                                                          9⤵
                                                                            PID:268
                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-28538.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-28538.exe
                                                                      6⤵
                                                                      • Executes dropped EXE
                                                                      • Suspicious use of SetWindowsHookEx
                                                                      PID:2900
                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-4338.exe
                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-4338.exe
                                                                        7⤵
                                                                        • Executes dropped EXE
                                                                        • Suspicious use of SetWindowsHookEx
                                                                        PID:788
                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-32461.exe
                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-32461.exe
                                                                          8⤵
                                                                            PID:2924
                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-32648.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-32648.exe
                                                                      5⤵
                                                                      • Executes dropped EXE
                                                                      • Suspicious use of SetWindowsHookEx
                                                                      PID:860
                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-49616.exe
                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-49616.exe
                                                                        6⤵
                                                                        • Executes dropped EXE
                                                                        • Suspicious use of SetWindowsHookEx
                                                                        PID:1032
                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-51599.exe
                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-51599.exe
                                                                          7⤵
                                                                            PID:348
                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-59954.exe
                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-59954.exe
                                                                              8⤵
                                                                                PID:2352
                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-40088.exe
                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-40088.exe
                                                                              7⤵
                                                                                PID:1300
                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-36675.exe
                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-36675.exe
                                                                          4⤵
                                                                          • Executes dropped EXE
                                                                          • Suspicious use of SetWindowsHookEx
                                                                          PID:2280
                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-7589.exe
                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-7589.exe
                                                                            5⤵
                                                                            • Executes dropped EXE
                                                                            • Suspicious use of SetWindowsHookEx
                                                                            PID:2212
                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-48404.exe
                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-48404.exe
                                                                              6⤵
                                                                              • Executes dropped EXE
                                                                              • Suspicious use of SetWindowsHookEx
                                                                              PID:2968
                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-21110.exe
                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-21110.exe
                                                                                7⤵
                                                                                  PID:2988
                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-32814.exe
                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-32814.exe
                                                                              5⤵
                                                                              • Executes dropped EXE
                                                                              • Suspicious use of SetWindowsHookEx
                                                                              PID:2896
                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-34022.exe
                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-34022.exe
                                                                                6⤵
                                                                                • Executes dropped EXE
                                                                                • Suspicious use of SetWindowsHookEx
                                                                                PID:556
                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-22397.exe
                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-22397.exe
                                                                                  7⤵
                                                                                    PID:2156

                                                                      Network

                                                                            MITRE ATT&CK Matrix

                                                                            Replay Monitor

                                                                            Loading Replay Monitor...

                                                                            Downloads

                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-16836.exe

                                                                              Filesize

                                                                              184KB

                                                                              MD5

                                                                              c5ed0c73cedc46874b028e64bb9cde0b

                                                                              SHA1

                                                                              3ad7eabe38a8acd14e5ca2488636e714971a55df

                                                                              SHA256

                                                                              f1d4f6ca8d2cc76c5e03e6fab68a2fcda732360fa8c80b894ac2223177c35c80

                                                                              SHA512

                                                                              c5e476f68dd20f98becfdda4229fa060c704866cd1545086dbe9f21df04a01fbf0c7a775409801951a541b54b330a9fe6abdf0944af76e705db6ca3a19294f99

                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-40952.exe

                                                                              Filesize

                                                                              184KB

                                                                              MD5

                                                                              3b28352e7d3c7438e8db33d422812c76

                                                                              SHA1

                                                                              e3254d8cdf7cce4dee9201f6587b433c1dd7cfdf

                                                                              SHA256

                                                                              c2a4800823f2aed8af13b9a1145c00d5ac673e3d277c9e05926adf8515e44e6a

                                                                              SHA512

                                                                              06031cb44d9949985aa120918780e1cee2dc807657adfcc2ee4503e31e6a3b2b7d63f7460605db3857fb8f6de4702a31c4de3102e56a541c4c91bb01f93a62fa

                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-474.exe

                                                                              Filesize

                                                                              184KB

                                                                              MD5

                                                                              e7cdc70a5972e1c715c429c8535ce66a

                                                                              SHA1

                                                                              73ac04859d42b3892bee5b5999b1634a6009b84a

                                                                              SHA256

                                                                              043af7aab083c2e91845a458007409272548e41c7e676964afef04a6b0e6f59a

                                                                              SHA512

                                                                              4ed3a8a324d5de3124a5c8e2c94edce0380e1dbc016c43dbdd11c7086cb2b5c14cbf5461cca67582589ec8c4630813a2a6e2a6d8da678665bd2908ea67aa9f99

                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-48383.exe

                                                                              Filesize

                                                                              184KB

                                                                              MD5

                                                                              67d4da00df2709f6d148d03616f700c1

                                                                              SHA1

                                                                              b56ba178b23b876de2b3a602784974c7bfff2bfc

                                                                              SHA256

                                                                              886cc6a74b1df5f0d2b83814aefa02fd6019fef8e961b070d7b11075694323d1

                                                                              SHA512

                                                                              0739b7f7cab373b497de66256102f55453720ea4b089860efcaca25455ba1cdddae19174479c6536e9b05678385dbae4e12be76eeeef7d3cd95b29c3e8b33fc2

                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-65482.exe

                                                                              Filesize

                                                                              184KB

                                                                              MD5

                                                                              4dc6aa435df818a743d724e32255024f

                                                                              SHA1

                                                                              77f8c817a4e64484ded0cc03ab7935c910e9e8ea

                                                                              SHA256

                                                                              f2326064daceb84279084457087ccf3d0e9d63d5bd66cacb4512584b176614ef

                                                                              SHA512

                                                                              6a1e4aa03647913d4eb2682e3e91c52bc73498dbb8487ea57028f154dca5696049a26e7be638f4045b22d699183c063f4944328a1d1f99c7114e420a10981bed

                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-6833.exe

                                                                              Filesize

                                                                              184KB

                                                                              MD5

                                                                              ac1b9919379b699c98eb08fc372f5c0d

                                                                              SHA1

                                                                              d73bcc9272710ccf8e0aaa2eb6e89e53dfd23225

                                                                              SHA256

                                                                              af994c62dded8074fdd88b6509bd398de077391a45038109de6c9d94ea1af59f

                                                                              SHA512

                                                                              0f6b2d174ef4de7946bdc464949651b4f78937e63611009f39a51fed8a74ae3f61ad9868eb145d1c9f1356e7a7dcfd115de2e9bcf15e16fdebc9441ee528cae0

                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-8860.exe

                                                                              Filesize

                                                                              184KB

                                                                              MD5

                                                                              32f2589908e1cd09c09714eb06a61931

                                                                              SHA1

                                                                              e86650d2aefe40bac0fa44d2a0ba76c56977a524

                                                                              SHA256

                                                                              b45b0d48d4a002b64791616fb4c4012d7a28098bfeac546fe994498512a1c9fb

                                                                              SHA512

                                                                              a0fec0133be82b54032fcadc1f1c9b77add71da0dd2e8a09cc71584f87325cb1f63bfb67bab3963a900efa12261587e30572e7d435a4220b43cf94cf5e38eb05

                                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-16317.exe

                                                                              Filesize

                                                                              184KB

                                                                              MD5

                                                                              0019054e2890d9b7f5c3de7cdda2db07

                                                                              SHA1

                                                                              043b891b3219358d58707ede10316471664bdb2e

                                                                              SHA256

                                                                              987488b0114497179c436882ea3dbc4b7aa8fb2d1d7cd3ad1037cceae61b2956

                                                                              SHA512

                                                                              e48075bdeb93254ec98730d7b6814353a129827c36bdc14ef29109cfa78597fe8e00fb91c178ba06f0f32259d8369964e4b4dbade897caab3ac4926ea8797534

                                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-28321.exe

                                                                              Filesize

                                                                              184KB

                                                                              MD5

                                                                              006b85e14e995504eb8a120c1227ddc2

                                                                              SHA1

                                                                              6aa56b74d828e2f359c3d729d692c6968cbfc0b7

                                                                              SHA256

                                                                              55fe62adeffdbc3c196dd31c8a11baf1f01f114d0a7cd1ba72c03f001c49e2c7

                                                                              SHA512

                                                                              f4e696473a9fd1ef9588cddce4eb0c26a987d0b64999f12724d608c008d947ecff6bb7aafacac9cae97f3233c546e7d675cfa4c959f8cfdc0cf1faec8efc72b9

                                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-36685.exe

                                                                              Filesize

                                                                              184KB

                                                                              MD5

                                                                              28bd1cefd7d4f7cc5cf6b16a14ec4146

                                                                              SHA1

                                                                              b111a5056a9b768eb8333379ec094f9977cc4b0b

                                                                              SHA256

                                                                              45cb72b78eb3fbb0919d419eaa0ace5300282c0429e6b85af6ae72cf291ba64a

                                                                              SHA512

                                                                              4a31ca66cb4a3c9c88ba44b7d71e4eb9aa3d043ad9298f0511d56b025f78d4cfba684bf891c4b1f5564d964273dccc599338d5640b9bb1385a2cd211e752d332

                                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-41319.exe

                                                                              Filesize

                                                                              184KB

                                                                              MD5

                                                                              240a1e0275ec6058b6e91381595a7adc

                                                                              SHA1

                                                                              26b34f972a33ee2f27040e970313570fba818fd6

                                                                              SHA256

                                                                              422a80d8e4097c0e2d1e744b666cef0058ac70f9a5d0022acd1a52cc8775955a

                                                                              SHA512

                                                                              a648b6364831b2ba1a77b7b70c1e5f1ae380f925abf09a9029e0350a69545497bbf8d5790fb6d9987d03c6bdb03b5fda6d1f91e0b3dd18d21679d152222178f5

                                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-43967.exe

                                                                              Filesize

                                                                              184KB

                                                                              MD5

                                                                              10e60df0a3820c0c3f41c6461f0652b0

                                                                              SHA1

                                                                              cc1dc72a2e5fa9147391dd6c737180549ae672de

                                                                              SHA256

                                                                              ae20c330ca2a20dab71d97a018294b120a27d8c653aee6edbe536044a834661e

                                                                              SHA512

                                                                              8f893100ae56b2f15f5b8b7f287262cdf61f27d01fcbfe37636dd26fffa17eddce3ff61d81c6e96a933353f9a687a30de3d2d1e2c4be17171be2768c7dbbb38c

                                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-44657.exe

                                                                              Filesize

                                                                              184KB

                                                                              MD5

                                                                              0a58a7978d675ffe5faa70793bfdfc9e

                                                                              SHA1

                                                                              85a06ae9d2c06df3fc76e576e745bff2a61b5fbb

                                                                              SHA256

                                                                              6e047ba243d9ada2bf06b7956d43343d18dacf3bac78651930bf1597099928f8

                                                                              SHA512

                                                                              0f1d01355be40ab5a4cd6d542a2581b96e03221674dd2f86d32ad1daf50fa2d7ffdc93b59a4417924f14b5c4be0cbbc898a7dd633a71ffcfecba60f2b7c21c81

                                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-47859.exe

                                                                              Filesize

                                                                              184KB

                                                                              MD5

                                                                              d0a54aab12d5ec47834d968569a40863

                                                                              SHA1

                                                                              7fb43ae4a2c140a4db021e423e7e8e88ba10d4e9

                                                                              SHA256

                                                                              a156ec6b3a468bab958f88516ed3f9783637f327eabef65c38801a74272aab5a

                                                                              SHA512

                                                                              c32d3b5d3b6ef26f9bb5f3e252e53599e39610dd6c7d3f0087f44cd3f253ae169740e5bfff9ad0c60d2138ecdbfe59bcc4c5daf5116177e4ae1bf88da8725310

                                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-57838.exe

                                                                              Filesize

                                                                              184KB

                                                                              MD5

                                                                              2255b8ef099caa24eac35e73f018eb65

                                                                              SHA1

                                                                              ddb293a20fd9b5e9d0506f0f1283118bb8edf7c4

                                                                              SHA256

                                                                              6f6c5a49b5c00e6aa68fb3af3c09c1cf8bb6b2b4095cdb9acd8cf62a219baf62

                                                                              SHA512

                                                                              4e3dd5da0639f65078bd1950c73737cdd303ce93d32f5ab1e4111ea37340052630c7312d2c1fa34eb7aef39d51dc821e1a7f524f85933b77fe9f43b8a0bb66bf

                                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-7153.exe

                                                                              Filesize

                                                                              184KB

                                                                              MD5

                                                                              2f80803c54728dd4432e7f304764e69d

                                                                              SHA1

                                                                              1fec47fed0ea4faac9e0135e68cdf9d0d6f5413a

                                                                              SHA256

                                                                              1ce78fc7f1c6879e5fc038328c3e8eafb0d3c3efd54592e026b17af466935730

                                                                              SHA512

                                                                              01dc5c91e42661dad048f14402c471490d1eceb8a19ac508422ee2fd3bca4f9abb35b593dd613f2f750c79b678b69c7189f701dac6591f964415d653a97c6c22