Analysis

  • max time kernel
    95s
  • max time network
    129s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    29/12/2023, 23:54

General

  • Target

    07a990086eb528a544d725d278577962.exe

  • Size

    184KB

  • MD5

    07a990086eb528a544d725d278577962

  • SHA1

    c20c7449ad03bff92174ce88c2c8ee3aafe49fd7

  • SHA256

    048c7648b8b6735a24e9bf79345351050362b28396bb260eb8dc1de9eb3ef271

  • SHA512

    441e67b966ad41002a9b8b279e8172babe6c919cd64609049c7b6036d56fd23289f16e7d215c6bac43ee82871b4c4e5562029b0b492ad1645a1995396233891a

  • SSDEEP

    3072:q+6woXLKoswQoOjmokeKoJcLGYTMVofw60xv+ESYyNlvvpFA:q+No95QohorKoJhG+/yNlvvpF

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 64 IoCs
  • Loads dropped DLL 64 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\07a990086eb528a544d725d278577962.exe
    "C:\Users\Admin\AppData\Local\Temp\07a990086eb528a544d725d278577962.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2392
    • C:\Users\Admin\AppData\Local\Temp\Unicorn-36931.exe
      C:\Users\Admin\AppData\Local\Temp\Unicorn-36931.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2764
      • C:\Users\Admin\AppData\Local\Temp\Unicorn-28545.exe
        C:\Users\Admin\AppData\Local\Temp\Unicorn-28545.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2856
        • C:\Users\Admin\AppData\Local\Temp\Unicorn-51570.exe
          C:\Users\Admin\AppData\Local\Temp\Unicorn-51570.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2676
          • C:\Users\Admin\AppData\Local\Temp\Unicorn-55737.exe
            C:\Users\Admin\AppData\Local\Temp\Unicorn-55737.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            PID:2796
            • C:\Users\Admin\AppData\Local\Temp\Unicorn-22920.exe
              C:\Users\Admin\AppData\Local\Temp\Unicorn-22920.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:2116
              • C:\Users\Admin\AppData\Local\Temp\Unicorn-22344.exe
                C:\Users\Admin\AppData\Local\Temp\Unicorn-22344.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:1952
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-22749.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-22749.exe
                  8⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:1104
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-57642.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-57642.exe
                    9⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:2156
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-7860.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-7860.exe
                      10⤵
                        PID:1716
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-45945.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-45945.exe
                    8⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:1008
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-46755.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-46755.exe
                      9⤵
                        PID:612
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-9145.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-9145.exe
                          10⤵
                            PID:1208
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-41948.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-41948.exe
                  5⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of SetWindowsHookEx
                  PID:1588
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-8996.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-8996.exe
                    6⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:2136
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-45992.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-45992.exe
                      7⤵
                      • Executes dropped EXE
                      • Suspicious use of SetWindowsHookEx
                      PID:3012
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-45774.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-45774.exe
                        8⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:2200
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-2250.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-2250.exe
                          9⤵
                            PID:2180
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-3350.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-3350.exe
                        7⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:1700
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-32941.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-32941.exe
                          8⤵
                            PID:1940
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-44040.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-44040.exe
                    4⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of SetWindowsHookEx
                    PID:2920
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-41394.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-41394.exe
                      5⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Suspicious use of SetWindowsHookEx
                      PID:1664
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-23963.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-23963.exe
                        6⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:2996
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-32370.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-32370.exe
                          7⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:2924
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-59972.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-59972.exe
                            8⤵
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            PID:484
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-33325.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-33325.exe
                              9⤵
                                PID:2292
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-46137.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-46137.exe
                            7⤵
                            • Executes dropped EXE
                            PID:2952
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-28665.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-28665.exe
                              8⤵
                                PID:2168
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-47076.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-47076.exe
                          5⤵
                          • Executes dropped EXE
                          PID:1632
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-5203.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-5203.exe
                            6⤵
                              PID:1872
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-51657.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-51657.exe
                                7⤵
                                  PID:2584
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-43957.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-43957.exe
                          3⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Suspicious use of SetWindowsHookEx
                          • Suspicious use of WriteProcessMemory
                          PID:2592
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-45431.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-45431.exe
                            4⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Suspicious use of SetWindowsHookEx
                            • Suspicious use of WriteProcessMemory
                            PID:2448
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-20782.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-20782.exe
                              5⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • Suspicious use of SetWindowsHookEx
                              PID:588
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-42437.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-42437.exe
                                6⤵
                                • Executes dropped EXE
                                • Loads dropped DLL
                                • Suspicious use of SetWindowsHookEx
                                PID:584
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-23143.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-23143.exe
                                  7⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetWindowsHookEx
                                  PID:2840
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-5068.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-5068.exe
                                    8⤵
                                    • Executes dropped EXE
                                    • Suspicious use of SetWindowsHookEx
                                    PID:1212
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-9619.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-9619.exe
                                      9⤵
                                      • Executes dropped EXE
                                      • Suspicious use of SetWindowsHookEx
                                      PID:1564
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-42074.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-42074.exe
                                        10⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetWindowsHookEx
                                        PID:2720
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-62105.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-62105.exe
                                          11⤵
                                            PID:1436
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-17055.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-17055.exe
                                        9⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetWindowsHookEx
                                        PID:1896
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-61721.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-61721.exe
                                          10⤵
                                            PID:2672
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-6090.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-6090.exe
                                        8⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetWindowsHookEx
                                        PID:2120
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-47035.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-47035.exe
                                          9⤵
                                            PID:2788
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-5203.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-5203.exe
                                              10⤵
                                                PID:584
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-13.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-13.exe
                                      5⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Suspicious use of SetWindowsHookEx
                                      PID:340
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-21545.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-21545.exe
                                        6⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetWindowsHookEx
                                        PID:2820
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-11757.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-11757.exe
                                          7⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetWindowsHookEx
                                          PID:1220
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-10278.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-10278.exe
                                            8⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetWindowsHookEx
                                            PID:2636
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-50839.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-50839.exe
                                              9⤵
                                                PID:2528
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-37475.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-37475.exe
                                            7⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetWindowsHookEx
                                            PID:588
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-36641.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-36641.exe
                                              8⤵
                                                PID:2648
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-6301.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-6301.exe
                                                  9⤵
                                                    PID:1952
                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-64485.exe
                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-64485.exe
                                                      10⤵
                                                        PID:868
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-22104.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-22104.exe
                                            4⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            • Suspicious use of SetWindowsHookEx
                                            PID:1484
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-38161.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-38161.exe
                                              5⤵
                                              • Executes dropped EXE
                                              • Suspicious use of SetWindowsHookEx
                                              PID:1552
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-52790.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-52790.exe
                                                6⤵
                                                • Executes dropped EXE
                                                • Suspicious use of SetWindowsHookEx
                                                PID:1816
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-64056.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-64056.exe
                                                  7⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:1968
                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-56485.exe
                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-56485.exe
                                                    8⤵
                                                      PID:2024
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-56443.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-56443.exe
                                                  6⤵
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:2412
                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-43055.exe
                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-43055.exe
                                                    7⤵
                                                      PID:2656
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-47574.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-47574.exe
                                            2⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            • Suspicious use of SetWindowsHookEx
                                            • Suspicious use of WriteProcessMemory
                                            PID:2892
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-63822.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-63822.exe
                                              3⤵
                                              • Executes dropped EXE
                                              • Loads dropped DLL
                                              • Suspicious use of SetWindowsHookEx
                                              • Suspicious use of WriteProcessMemory
                                              PID:2576
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-22873.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-22873.exe
                                                4⤵
                                                • Executes dropped EXE
                                                • Loads dropped DLL
                                                • Suspicious use of SetWindowsHookEx
                                                • Suspicious use of WriteProcessMemory
                                                PID:2008
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-12613.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-12613.exe
                                                  5⤵
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:1100
                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-1404.exe
                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-1404.exe
                                                    6⤵
                                                    • Executes dropped EXE
                                                    • Loads dropped DLL
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:1508
                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-40356.exe
                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-40356.exe
                                                      7⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:2092
                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-1643.exe
                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-1643.exe
                                                        8⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:2296
                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-657.exe
                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-657.exe
                                                          9⤵
                                                          • Executes dropped EXE
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:2664
                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-5722.exe
                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-5722.exe
                                                            10⤵
                                                              PID:2728
                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-58581.exe
                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-58581.exe
                                                          8⤵
                                                          • Executes dropped EXE
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:2480
                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-18276.exe
                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-18276.exe
                                                            9⤵
                                                              PID:2580
                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-48699.exe
                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-48699.exe
                                                                10⤵
                                                                  PID:1904
                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-24517.exe
                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-24517.exe
                                                        5⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:2416
                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-25214.exe
                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-25214.exe
                                                          6⤵
                                                          • Executes dropped EXE
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:1368
                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-15842.exe
                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-15842.exe
                                                            7⤵
                                                            • Executes dropped EXE
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:708
                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-63371.exe
                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-63371.exe
                                                              8⤵
                                                                PID:2116
                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-58488.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-58488.exe
                                                                  9⤵
                                                                    PID:2708
                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-55758.exe
                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-55758.exe
                                                                7⤵
                                                                  PID:1592
                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-1036.exe
                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-1036.exe
                                                                    8⤵
                                                                      PID:1016
                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-31642.exe
                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-31642.exe
                                                              4⤵
                                                              • Executes dropped EXE
                                                              • Loads dropped DLL
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:2804
                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-17741.exe
                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-17741.exe
                                                                5⤵
                                                                • Executes dropped EXE
                                                                • Suspicious use of SetWindowsHookEx
                                                                PID:2284
                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-45986.exe
                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-45986.exe
                                                            3⤵
                                                            • Executes dropped EXE
                                                            • Loads dropped DLL
                                                            • Suspicious use of SetWindowsHookEx
                                                            • Suspicious use of WriteProcessMemory
                                                            PID:2776
                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-51508.exe
                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-51508.exe
                                                              4⤵
                                                              • Executes dropped EXE
                                                              • Loads dropped DLL
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:2384
                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-9572.exe
                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-9572.exe
                                                                5⤵
                                                                • Executes dropped EXE
                                                                • Suspicious use of SetWindowsHookEx
                                                                PID:1660
                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-60496.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-60496.exe
                                                                  6⤵
                                                                  • Executes dropped EXE
                                                                  • Suspicious use of SetWindowsHookEx
                                                                  PID:2572
                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-64466.exe
                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-64466.exe
                                                                    7⤵
                                                                    • Executes dropped EXE
                                                                    • Suspicious use of SetWindowsHookEx
                                                                    PID:1520
                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-51996.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-51996.exe
                                                                      8⤵
                                                                      • Executes dropped EXE
                                                                      • Suspicious use of SetWindowsHookEx
                                                                      PID:2308
                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-17975.exe
                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-17975.exe
                                                                        9⤵
                                                                          PID:1168
                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-4786.exe
                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-4786.exe
                                                                            10⤵
                                                                              PID:1824
                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-40298.exe
                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-40298.exe
                                                                        7⤵
                                                                        • Executes dropped EXE
                                                                        • Suspicious use of SetWindowsHookEx
                                                                        PID:1748
                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-53361.exe
                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-53361.exe
                                                                          8⤵
                                                                            PID:2176
                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-49022.exe
                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-49022.exe
                                                                    4⤵
                                                                    • Executes dropped EXE
                                                                    • Suspicious use of SetWindowsHookEx
                                                                    PID:1228
                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-27824.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-27824.exe
                                                                      5⤵
                                                                      • Executes dropped EXE
                                                                      • Suspicious use of SetWindowsHookEx
                                                                      PID:2652
                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-11757.exe
                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-11757.exe
                                                                        6⤵
                                                                        • Executes dropped EXE
                                                                        • Suspicious use of SetWindowsHookEx
                                                                        PID:1060
                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-38867.exe
                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-38867.exe
                                                                          7⤵
                                                                            PID:1788
                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-2406.exe
                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-2406.exe
                                                                              8⤵
                                                                                PID:2216
                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-15648.exe
                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-15648.exe
                                                                                  9⤵
                                                                                    PID:1728
                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-23085.exe
                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-23085.exe
                                                                              6⤵
                                                                                PID:2344
                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-58488.exe
                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-58488.exe
                                                                                  7⤵
                                                                                    PID:2088

                                                                      Network

                                                                      MITRE ATT&CK Matrix

                                                                      Replay Monitor

                                                                      Loading Replay Monitor...

                                                                      Downloads

                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-12613.exe

                                                                        Filesize

                                                                        184KB

                                                                        MD5

                                                                        66d0ead677333371b15e347151ce23fa

                                                                        SHA1

                                                                        a6adefc5d2aa394fdb2d0674987ef1ab8582321c

                                                                        SHA256

                                                                        462f89df26500779ac643bc396ba92debd6c29cfde5e8d7fdf5342da10d1475b

                                                                        SHA512

                                                                        d05bc70b514605aeb490c954a68b02eddaf629b0c897425861caf9edb75dc5b0248ce2ecaa199069befc6db3c017a7b5e98dd5d1ec9b738f1cc4f08cfdb14935

                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-20782.exe

                                                                        Filesize

                                                                        184KB

                                                                        MD5

                                                                        8067c811fd0b206b5a5b48e86fd74084

                                                                        SHA1

                                                                        75c164fa44757b1aa11d2d0ed0bfd889b66dcc48

                                                                        SHA256

                                                                        1d34da392ae1815389f3021adb197140a2678969489692e5d9a9bcccdce1f1cb

                                                                        SHA512

                                                                        461557bb0a4c1c9968f3814d38a490edef87cc0305f15d97b155c9d0845054020c12298b101e5c9425f54319f78915bdf1fcae409c9bd737ba8ffa8d76ba6735

                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-40298.exe

                                                                        Filesize

                                                                        184KB

                                                                        MD5

                                                                        7335af8e0e807b29039740d2a212d285

                                                                        SHA1

                                                                        659766daccea9702410e12f6e2bdd9b0706b149f

                                                                        SHA256

                                                                        77fd058a42888dc1298da2a7b66b5c733e27e8f864f9925b58abdac5c9234400

                                                                        SHA512

                                                                        30e8434c7b858f327d80e2244cb2347dcd0f012ab4cd0c8e1b43eaa7d0e4ca9dbb2be86161e1c444f8c8471e263f40e5f9e24461ed1d21d8114699a6bfc27249

                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-41394.exe

                                                                        Filesize

                                                                        184KB

                                                                        MD5

                                                                        a06a0d1200ccdf5eb693a51a06279f47

                                                                        SHA1

                                                                        cb78abc023a6aab2e17cdb223e6402002ac4279a

                                                                        SHA256

                                                                        70d8be8b5e11daa01462bd0e0ac8997a9cedf3c7e0e0d32935688da79c2aa781

                                                                        SHA512

                                                                        c195be651b885b941be200ce5ad94d866a425e59cbe46a69743edc8bb58063067211e156800f69b63349e1d7a99a8ed908dff24c2464fdeffdd64727c11a989c

                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-43957.exe

                                                                        Filesize

                                                                        8KB

                                                                        MD5

                                                                        c415eacaf786202ce554f054a2cda7e1

                                                                        SHA1

                                                                        073f79d783379b6e6acbe2da5e0167aed9425ff1

                                                                        SHA256

                                                                        2078993db54d616a9f190e156b196aa2b75d8a712df46aab248f4691ab10c1fa

                                                                        SHA512

                                                                        ff8870c45427a760385005e7cb07aab45b9850a69bb5966d911cd64d8dac53d5fd27fe26b43d0ef1041df0fbb1b3fbc49c45638c64db37aedd712b7a2d2714d9

                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-44040.exe

                                                                        Filesize

                                                                        22KB

                                                                        MD5

                                                                        a1ac76377a78c51e7b0a8a120b82f296

                                                                        SHA1

                                                                        386c76ce8a4dddbd7318a8e66f497a4ac739e705

                                                                        SHA256

                                                                        1347085e6b6e115a980e4579f109319b45ec23b85d074be331527b14989aade0

                                                                        SHA512

                                                                        4cfc59004ebf82d70eb236caa211cce51d19556fddd2f72e3442d4c445ffb4427a9d566432b77b387b0fd2a4f2979a5a5cb2dd5eec81d6733fca3f1861527fb0

                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-45986.exe

                                                                        Filesize

                                                                        184KB

                                                                        MD5

                                                                        64eaa135e5426445062463f66e96c917

                                                                        SHA1

                                                                        2b3138ea47e6532c3cb77a9524cabbee490acb83

                                                                        SHA256

                                                                        d6ebfff82146e4f898faf10f69547964182015edfb7a54074b17e7ba984a2bb9

                                                                        SHA512

                                                                        fe1a8ff1c3ea44c3ee4ed065f86523a329524b940c25b762e56c23e16dea5ee04eef0fa3ffb50dac12ab5f95ce93f4df8e19e903743b73cc1c2bbe2dd3749d73

                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-47574.exe

                                                                        Filesize

                                                                        184KB

                                                                        MD5

                                                                        5d566b1487dc78eac537a8a1826e5d9a

                                                                        SHA1

                                                                        81d37129c8f445d7e1675ae81d646fc7e571c857

                                                                        SHA256

                                                                        9454e49e5695d11051de12556299ab21b27991e8d75b566338418f29278fa782

                                                                        SHA512

                                                                        01d1410afce5642cad7a67cccf4d1825b7a0118f95c793858eb8e640f1b2f370e3b4de412347c9f1064e4833cf5870a7e3b91b777dea804a72db912ebb341b95

                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-55737.exe

                                                                        Filesize

                                                                        19KB

                                                                        MD5

                                                                        0db095d816be5b0f58a5166b1e3314b0

                                                                        SHA1

                                                                        dca249fa6a0da44fd8d69c264d74c191c17cedfc

                                                                        SHA256

                                                                        d5c217b705cf0aef54a666f8a2deb2255efc1307144f04ae02c3f6f5db9bccbc

                                                                        SHA512

                                                                        2f05c9dbc75e2cac0d5af6a9ce91a27fef4abf084828f0f8548b0312ec69f8b523ee769503b0bef5dc17c46e4d78adcf9c465d5e91d538ea6c13f69c52822542

                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-5722.exe

                                                                        Filesize

                                                                        184KB

                                                                        MD5

                                                                        c87c7c90dd6b4f3ea6eb750c83c46ec4

                                                                        SHA1

                                                                        788a4fda52b3dbfe623f51920055d12dfa7c5a64

                                                                        SHA256

                                                                        8c74768f91867b64b066ee13337d6d3f3ff5994bc17d776fdc6ef36301ae9149

                                                                        SHA512

                                                                        566f6f80f0dac5d2aa86fdc07d586dcdf47b8b9d0f21778b3449b3c98a45019e9ca3bdd09a7ee265fb1b11926971bab4a6a12793eae606b8a95bef3c772213e5

                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-6301.exe

                                                                        Filesize

                                                                        184KB

                                                                        MD5

                                                                        073128af87e0f318c7f98eacfd6b9c23

                                                                        SHA1

                                                                        9384bb7588268bf9566d7ca7e3d03295f98098fb

                                                                        SHA256

                                                                        d18a270c6df0c61eaf7c98311129a33ebb139e9b1d88b2a0e542d1a79324f739

                                                                        SHA512

                                                                        c936e4a470f9ae71cba3bf6336dcfa6f83a9a21a8f37df9fdd62cc82da69319be7ef952ee9d7e239d1deb249e5fe568451e9d3ec16db6f320274b9bb9c209cce

                                                                      • \Users\Admin\AppData\Local\Temp\Unicorn-12613.exe

                                                                        Filesize

                                                                        64KB

                                                                        MD5

                                                                        e7982551dd32bad7619f898a36f693ef

                                                                        SHA1

                                                                        d660847af042f9f628cc77dd1435f3079961d981

                                                                        SHA256

                                                                        02abf28a0dde90438de93cce8c66e8b473db399b9002d3f7623678ebc9cd904f

                                                                        SHA512

                                                                        6b91a699757b9ac6409ceb9f8ead4bbb4018d83a6095e2ced995dd062208d9321609794cd8c14bc93013c786229cdb1b74da18bfb834b42315e53efed95fddfb

                                                                      • \Users\Admin\AppData\Local\Temp\Unicorn-20782.exe

                                                                        Filesize

                                                                        128KB

                                                                        MD5

                                                                        8f05ae7d042a8a575561a932fe8b86f8

                                                                        SHA1

                                                                        3560947604b9d91d0ae07eda773bdd7f52f2a9e7

                                                                        SHA256

                                                                        2329f2da8d01e0019c71cc543103b38f044605d469732c7cec829a20a5377cad

                                                                        SHA512

                                                                        a5720bb4af303a0b5d21699e68e0e70825a2c00f28089303ea9a38ae3cfc217b7270799db3d7b586e3287caac4e5f8e5f382fac05d494b17e83f239f59ef72f5

                                                                      • \Users\Admin\AppData\Local\Temp\Unicorn-22104.exe

                                                                        Filesize

                                                                        184KB

                                                                        MD5

                                                                        3004e249493ce9ac3ed7960549cef6dc

                                                                        SHA1

                                                                        26ab685464ef072e285b836ecaf57c21b239e980

                                                                        SHA256

                                                                        4f990bfa129534553102430462e0ab657a514a682d8fbbb229f3dffa5f84c1f0

                                                                        SHA512

                                                                        9386240c17c1a9fc960d1f08c7baba28fe3616d039e827bdf98c15a2f91ec6e2c04e1761c27de928ab6480f2595c9fa7ca8c5e5055292ee1ce354ff5d916525a

                                                                      • \Users\Admin\AppData\Local\Temp\Unicorn-22873.exe

                                                                        Filesize

                                                                        184KB

                                                                        MD5

                                                                        00229cc4bf4368ecaad258d366a65600

                                                                        SHA1

                                                                        909841ffa1bbde7e559f6df0ab2afc5b1350184e

                                                                        SHA256

                                                                        90e7d48c9f343a7ab835854ffad3e21038dcdab2daea3f5d29feffdb04f9ec63

                                                                        SHA512

                                                                        ef5eaaa5ca4f5cb683567ba5c4f22af9f9d5c0f9d7b1b7399156d56a9b3e014d71cba7ce8f15b4ba488618802cd5c19e6b518bf217b7220d874fc6fcb0098d18

                                                                      • \Users\Admin\AppData\Local\Temp\Unicorn-28545.exe

                                                                        Filesize

                                                                        184KB

                                                                        MD5

                                                                        9cb2b9a2312bcb859670aad3fd7d7d7c

                                                                        SHA1

                                                                        f559a28e423f250634b72c81fe251b58ab4e85dc

                                                                        SHA256

                                                                        9721205f5e860c69c498265794724193a9e305eec55758df8ceb37d50f0ba68e

                                                                        SHA512

                                                                        d98c27814dcd7a3817770bb84cf4394878f48c6862972b869976b69e5ba09eaf20b24abc821d2a76818da28091d7eecab1d08c9875b36853a5a080fb15974269

                                                                      • \Users\Admin\AppData\Local\Temp\Unicorn-31642.exe

                                                                        Filesize

                                                                        184KB

                                                                        MD5

                                                                        48153f38f8446344e27258b546f0800a

                                                                        SHA1

                                                                        36dd86f9402de726085390c6e58667180da3bc10

                                                                        SHA256

                                                                        996c192bfa5bc08d42677b1e34218afab83fd57dbfd14bcbd7ba684f66a5b2b1

                                                                        SHA512

                                                                        786d693f299873e8f3cea5c6384615352cb77f68d81dd36cc7cc9b9fbef0a71104981dc117bfe0b21d3b438d66443888c32908263fa010e0cab15ed9cd51fe95

                                                                      • \Users\Admin\AppData\Local\Temp\Unicorn-36931.exe

                                                                        Filesize

                                                                        184KB

                                                                        MD5

                                                                        e8a6989fcf5369f8efa7f2aea2f30158

                                                                        SHA1

                                                                        b22d5aa25aa5c05981a547329de67e62b0b10b8d

                                                                        SHA256

                                                                        49974dec76251abec95ecfc8f919ce7ea8af23441c7f4853f4e5fd2672d499dd

                                                                        SHA512

                                                                        b35a43c064d09b7a64fcf879370c27656486550cc9f53ef452e385a727e145c0d7c8a1bb17d3401737490e8d821866f56661aefd996f0c186b28325cdcc7d28c

                                                                      • \Users\Admin\AppData\Local\Temp\Unicorn-41948.exe

                                                                        Filesize

                                                                        184KB

                                                                        MD5

                                                                        5c37a453fac31c88407c1eb05489800d

                                                                        SHA1

                                                                        808c187dad98039084b4f72e0443936ced667bf9

                                                                        SHA256

                                                                        67fe52570f1efdda4a8c17b5d08e7f9c2e8932421c3d11764e78fa5b1924bd8d

                                                                        SHA512

                                                                        7921144ba1106257bcea4985caa8faf06c44e26f811e0d1191c1216c4924234f91a617333f6f5c23fe5a36ec1e80bc18dc6e33c5d112ba361e9966c21d0a1a9d

                                                                      • \Users\Admin\AppData\Local\Temp\Unicorn-43957.exe

                                                                        Filesize

                                                                        184KB

                                                                        MD5

                                                                        87c1684e5c41d95181a5e065da1f7584

                                                                        SHA1

                                                                        7bb4c3d2f91c523b1ddc287b4881a3c7a77ef0e8

                                                                        SHA256

                                                                        20595189d71c39a4e4a3db1f534f09e0556a28748e04bcb70aa35d03c3a9e806

                                                                        SHA512

                                                                        48e6a2db7ea6f01767b8e27ec1d91e754f185162079851f718ed45dcd323ce66a4244a45bf9bf2dede4e81efc7823b81c25b627701fc843e0bde81099e8ae807

                                                                      • \Users\Admin\AppData\Local\Temp\Unicorn-44040.exe

                                                                        Filesize

                                                                        184KB

                                                                        MD5

                                                                        4a552a0171b134518ce4db885efad757

                                                                        SHA1

                                                                        08abfa06480db6d47bdd9be2cc29af080afb0956

                                                                        SHA256

                                                                        1e7e1bb5add265a463b218abb207b1f3bf86bc9f74cae5238ebb95b94cff1226

                                                                        SHA512

                                                                        a83e32d9ec8edbed020bda14a7906cb415c2c29e4b6ff2b58603989b5f630093a37091a782951aa274a6ecb10781516e01cb5e79218ab8d28b716658a260767b

                                                                      • \Users\Admin\AppData\Local\Temp\Unicorn-45431.exe

                                                                        Filesize

                                                                        184KB

                                                                        MD5

                                                                        4840e76a65eae593bc812fae39185977

                                                                        SHA1

                                                                        a48d36e80a301c1a0dc30289f702cb9fdf7697bf

                                                                        SHA256

                                                                        4c456d3f49521236ca67178995c2322f35d666eba86bbecb16d4711b6d865e71

                                                                        SHA512

                                                                        7ac440789e0ff85aa2fda4c44477dddae1a0d19ff5c4689c93a4dc284eb7364a607aef0dc5c10fcc15fd18df6aa6753b19394f9b577967ff506b51a2db864ca6

                                                                      • \Users\Admin\AppData\Local\Temp\Unicorn-51508.exe

                                                                        Filesize

                                                                        184KB

                                                                        MD5

                                                                        bbbbd69696baa447839e74ecc9013e10

                                                                        SHA1

                                                                        edb2ad3c579d4d46f2f8d7e64235bf378c879e02

                                                                        SHA256

                                                                        3fb910b1c80fa734005baecaea9edc80a0fe70daaa68e0c615c8af84542e3eb5

                                                                        SHA512

                                                                        f012d2d844c89b36d32a14d2f8ff2b18efbc05e81cde3798bed5f3730dd2fc18348bde1c164dfff0bf1745acadacc2b9fae0e5107cfbdb11669597370d1ecef2

                                                                      • \Users\Admin\AppData\Local\Temp\Unicorn-51570.exe

                                                                        Filesize

                                                                        184KB

                                                                        MD5

                                                                        6330191522f27c8f9be4cb286d9ba6e0

                                                                        SHA1

                                                                        3487cf315a097b67c7d90eebd4b0168ad0981e7d

                                                                        SHA256

                                                                        b0680c481f84454e48ce5b786a083a6eb2d7ab7597c16f977fb79f09f5cc3b47

                                                                        SHA512

                                                                        8f1cd5dcca65a9466a0afdebec870caa1aa10e7d6b70a218e8421ccc4de968812d0db5b0ff07bc69b7295c1be03e9d3fe2cac5f59cd28af31715440a7341cfb1

                                                                      • \Users\Admin\AppData\Local\Temp\Unicorn-55737.exe

                                                                        Filesize

                                                                        184KB

                                                                        MD5

                                                                        8c12780e76e91397f29ca3fc317d5ba1

                                                                        SHA1

                                                                        08ba8a6a340a8124b64cde5c9131d3f3c55536cb

                                                                        SHA256

                                                                        4192b1fc6769ceaa114d38a75c952d1bf6725b2c4ee26111e6f24df3ee0a9710

                                                                        SHA512

                                                                        e50b711dffb1d464f86275f596d080e29a2e24e9fe33f471fc819d2219676fe6a47f6b09e9daaad25c7f6fd63488b641a089966334306e1832efde8e00256daf

                                                                      • \Users\Admin\AppData\Local\Temp\Unicorn-63822.exe

                                                                        Filesize

                                                                        184KB

                                                                        MD5

                                                                        01002d58ee2a4f3553967af43d9785fa

                                                                        SHA1

                                                                        81807b46084273c25ab90229d11119b36cadf700

                                                                        SHA256

                                                                        995bc0bef7f4b12ea7f608b474b906ecb5906cd7f593bfaff8082c409e9099ef

                                                                        SHA512

                                                                        4b7197457ca187ba2e09e37d8601583a091769c896ac962ec4ebe490cef3875dabae133204dcf1d27bb424747da96f65b4a46124af08471e80ef45d0cad6d23d