Analysis
-
max time kernel
12s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 03:53
Static task
static1
Behavioral task
behavioral1
Sample
0d8efc2871fa141f843108d014d8636f.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
0d8efc2871fa141f843108d014d8636f.exe
Resource
win10v2004-20231215-en
General
-
Target
0d8efc2871fa141f843108d014d8636f.exe
-
Size
184KB
-
MD5
0d8efc2871fa141f843108d014d8636f
-
SHA1
8292b9297d3132c04ed35c656d9ae59409201c3d
-
SHA256
c6cb38318859973d2e7f26570e2116199c95c47cb3d087fddec15fec879f9c8b
-
SHA512
3a00155fb78b8d1861aa526f2e8a7b82b2480f989dc5f11fc842252bffbeea55e73a3309409aa3ab310187486784bedb8c608a6276b8c9bc89ab63ba8b8a6cb6
-
SSDEEP
3072:ilESo4ryrNwooqjpoarKvJcCDLNMsE2Y26xvxEnNNlvvpFy:iltoPOoo2o0KvJpLgQNlvvpF
Malware Config
Signatures
-
Executes dropped EXE 8 IoCs
pid Process 1824 Unicorn-8161.exe 2164 Unicorn-53361.exe 2844 Unicorn-64222.exe 2720 Unicorn-15619.exe 2912 Unicorn-26479.exe 2600 Unicorn-11534.exe 1276 Unicorn-15702.exe 1664 Unicorn-46428.exe -
Loads dropped DLL 16 IoCs
pid Process 2992 0d8efc2871fa141f843108d014d8636f.exe 2992 0d8efc2871fa141f843108d014d8636f.exe 1824 Unicorn-8161.exe 1824 Unicorn-8161.exe 2992 Unicorn-27333.exe 2992 Unicorn-27333.exe 2164 Unicorn-53361.exe 2164 Unicorn-53361.exe 1824 Unicorn-8161.exe 1824 Unicorn-8161.exe 2844 Unicorn-64222.exe 2844 Unicorn-64222.exe 2720 Unicorn-15619.exe 2720 Unicorn-15619.exe 2912 Unicorn-26479.exe 2912 Unicorn-26479.exe -
Program crash 7 IoCs
pid pid_target Process procid_target 2096 2904 WerFault.exe 53 1624 1692 WerFault.exe 73 1640 344 WerFault.exe 111 2928 356 WerFault.exe 100 1636 1984 WerFault.exe 90 2564 1528 WerFault.exe 134 2260 2516 WerFault.exe 157 -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2992 0d8efc2871fa141f843108d014d8636f.exe 1824 Unicorn-8161.exe 2164 Unicorn-53361.exe 2844 Unicorn-64222.exe 2720 Unicorn-15619.exe 2912 Unicorn-26479.exe 2600 Unicorn-11534.exe 1276 Unicorn-15702.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2992 wrote to memory of 1824 2992 0d8efc2871fa141f843108d014d8636f.exe 28 PID 2992 wrote to memory of 1824 2992 0d8efc2871fa141f843108d014d8636f.exe 28 PID 2992 wrote to memory of 1824 2992 0d8efc2871fa141f843108d014d8636f.exe 28 PID 2992 wrote to memory of 1824 2992 0d8efc2871fa141f843108d014d8636f.exe 28 PID 1824 wrote to memory of 2164 1824 Unicorn-8161.exe 30 PID 1824 wrote to memory of 2164 1824 Unicorn-8161.exe 30 PID 1824 wrote to memory of 2164 1824 Unicorn-8161.exe 30 PID 1824 wrote to memory of 2164 1824 Unicorn-8161.exe 30 PID 2992 wrote to memory of 2844 2992 Unicorn-27333.exe 29 PID 2992 wrote to memory of 2844 2992 Unicorn-27333.exe 29 PID 2992 wrote to memory of 2844 2992 Unicorn-27333.exe 29 PID 2992 wrote to memory of 2844 2992 Unicorn-27333.exe 29 PID 2164 wrote to memory of 2720 2164 Unicorn-53361.exe 33 PID 2164 wrote to memory of 2720 2164 Unicorn-53361.exe 33 PID 2164 wrote to memory of 2720 2164 Unicorn-53361.exe 33 PID 2164 wrote to memory of 2720 2164 Unicorn-53361.exe 33 PID 1824 wrote to memory of 2912 1824 Unicorn-8161.exe 32 PID 1824 wrote to memory of 2912 1824 Unicorn-8161.exe 32 PID 1824 wrote to memory of 2912 1824 Unicorn-8161.exe 32 PID 1824 wrote to memory of 2912 1824 Unicorn-8161.exe 32 PID 2844 wrote to memory of 2600 2844 Unicorn-64222.exe 31 PID 2844 wrote to memory of 2600 2844 Unicorn-64222.exe 31 PID 2844 wrote to memory of 2600 2844 Unicorn-64222.exe 31 PID 2844 wrote to memory of 2600 2844 Unicorn-64222.exe 31 PID 2720 wrote to memory of 1276 2720 Unicorn-15619.exe 38 PID 2720 wrote to memory of 1276 2720 Unicorn-15619.exe 38 PID 2720 wrote to memory of 1276 2720 Unicorn-15619.exe 38 PID 2720 wrote to memory of 1276 2720 Unicorn-15619.exe 38 PID 2912 wrote to memory of 1664 2912 Unicorn-26479.exe 37 PID 2912 wrote to memory of 1664 2912 Unicorn-26479.exe 37 PID 2912 wrote to memory of 1664 2912 Unicorn-26479.exe 37 PID 2912 wrote to memory of 1664 2912 Unicorn-26479.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\0d8efc2871fa141f843108d014d8636f.exe"C:\Users\Admin\AppData\Local\Temp\0d8efc2871fa141f843108d014d8636f.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-8161.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8161.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1824 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-53361.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53361.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2164 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15619.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15619.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15702.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15702.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1276 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17887.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17887.exe6⤵PID:2524
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43543.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43543.exe7⤵PID:908
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46047.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46047.exe8⤵PID:2444
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22503.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22503.exe9⤵PID:1784
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33852.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33852.exe10⤵PID:1716
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20469.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20469.exe11⤵PID:2320
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4687.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4687.exe10⤵PID:1164
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45010.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45010.exe11⤵PID:688
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36352.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36352.exe9⤵PID:2672
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52757.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52757.exe10⤵PID:2660
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9623.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9623.exe11⤵PID:1620
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23057.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23057.exe8⤵PID:2800
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49804.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49804.exe9⤵PID:2380
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60624.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60624.exe10⤵PID:2876
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54404.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54404.exe6⤵PID:2536
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42256.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42256.exe7⤵PID:2208
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5014.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5014.exe8⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8112.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8112.exe9⤵PID:2500
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10805.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10805.exe8⤵PID:1680
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61309.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61309.exe9⤵PID:1476
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39930.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39930.exe5⤵PID:2172
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4648.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4648.exe6⤵PID:844
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42256.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42256.exe7⤵PID:2696
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48185.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48185.exe8⤵PID:584
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34947.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34947.exe9⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30754.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30754.exe10⤵PID:1760
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31818.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31818.exe11⤵PID:1652
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36043.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36043.exe12⤵PID:2888
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58719.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58719.exe9⤵PID:1316
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36613.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36613.exe10⤵PID:804
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27333.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27333.exe8⤵
- Loads dropped DLL
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35606.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35606.exe9⤵PID:1736
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17681.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17681.exe10⤵PID:2060
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21056.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21056.exe11⤵PID:2332
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22390.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22390.exe6⤵PID:1560
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13758.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13758.exe7⤵PID:1404
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16857.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16857.exe8⤵PID:1644
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17900.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17900.exe9⤵PID:2828
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14370.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14370.exe8⤵PID:2700
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58486.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58486.exe9⤵PID:2684
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46000.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46000.exe7⤵PID:2448
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9202.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9202.exe8⤵PID:2348
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8299.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8299.exe9⤵PID:2652
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55917.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55917.exe8⤵PID:752
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64615.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64615.exe9⤵PID:2836
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20916.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20916.exe10⤵PID:2568
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20340.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20340.exe4⤵PID:2840
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10595.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10595.exe5⤵PID:2968
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54425.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54425.exe6⤵PID:1252
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54215.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54215.exe7⤵PID:2440
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57313.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57313.exe8⤵PID:2896
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61864.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61864.exe9⤵PID:2616
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38834.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38834.exe10⤵PID:2768
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1734.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1734.exe8⤵PID:1780
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26582.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26582.exe9⤵PID:2724
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53784.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53784.exe7⤵PID:1956
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34236.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34236.exe8⤵PID:820
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12705.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12705.exe9⤵PID:1564
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24253.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24253.exe5⤵PID:1808
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33987.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33987.exe6⤵PID:3040
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26862.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26862.exe7⤵PID:1872
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33638.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33638.exe6⤵PID:344
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 344 -s 2007⤵
- Program crash
PID:1640
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26479.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26479.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46428.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46428.exe4⤵
- Executes dropped EXE
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3496.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3496.exe5⤵PID:1516
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29153.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29153.exe6⤵PID:1976
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36671.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36671.exe7⤵PID:1632
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60821.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60821.exe8⤵PID:2012
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12279.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12279.exe9⤵PID:2308
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44205.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44205.exe10⤵PID:888
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33889.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33889.exe11⤵PID:772
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19056.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19056.exe8⤵PID:1448
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3916.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3916.exe6⤵PID:2980
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24065.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24065.exe7⤵PID:964
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1119.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1119.exe5⤵PID:1884
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43491.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43491.exe6⤵PID:3016
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24065.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24065.exe7⤵PID:1052
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33385.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33385.exe8⤵PID:1672
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12767.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12767.exe9⤵PID:1064
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17086.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17086.exe10⤵PID:2352
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58444.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58444.exe7⤵PID:3004
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58548.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58548.exe8⤵PID:2312
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65201.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65201.exe9⤵PID:2764
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10525.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10525.exe8⤵PID:1600
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12219.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12219.exe4⤵PID:1164
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49573.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49573.exe5⤵PID:1036
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4220.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4220.exe6⤵PID:2060
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35030.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35030.exe7⤵PID:1688
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6462.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6462.exe8⤵PID:1428
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59810.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59810.exe9⤵PID:2672
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-774.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-774.exe6⤵PID:2568
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40121.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40121.exe7⤵PID:2708
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26582.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26582.exe8⤵PID:3012
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40739.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40739.exe9⤵PID:1648
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57781.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57781.exe10⤵PID:2076
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33166.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33166.exe7⤵PID:1432
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64222.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64222.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11534.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11534.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2600 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-36122.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36122.exe4⤵PID:2528
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48421.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48421.exe5⤵PID:488
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19615.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19615.exe6⤵PID:1076
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44485.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44485.exe7⤵PID:412
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53613.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53613.exe8⤵PID:1580
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63639.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63639.exe9⤵PID:2644
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33702.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33702.exe10⤵PID:1792
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12258.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12258.exe7⤵PID:1004
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19161.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19161.exe8⤵PID:2408
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61117.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61117.exe9⤵PID:2344
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52742.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52742.exe10⤵PID:1328
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7532.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7532.exe11⤵PID:2376
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60302.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60302.exe8⤵PID:1200
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50896.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50896.exe5⤵PID:2120
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29711.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29711.exe6⤵PID:2900
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6166.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6166.exe7⤵PID:2736
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4962.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4962.exe8⤵PID:1384
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6721.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6721.exe6⤵PID:3024
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29576.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29576.exe7⤵PID:320
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22415.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22415.exe8⤵PID:2548
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53603.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53603.exe9⤵PID:2656
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38165.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38165.exe10⤵PID:2188
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55198.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55198.exe4⤵PID:600
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44119.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44119.exe5⤵PID:1796
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62959.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62959.exe6⤵PID:700
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20448.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20448.exe7⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17681.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17681.exe8⤵PID:2596
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21002.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21002.exe6⤵PID:596
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41719.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41719.exe7⤵PID:1800
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46983.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46983.exe3⤵PID:1640
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54643.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54643.exe4⤵PID:2960
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62593.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62593.exe5⤵PID:968
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17560.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17560.exe6⤵PID:2804
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24065.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24065.exe7⤵PID:2004
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51667.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51667.exe8⤵PID:2268
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32337.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32337.exe9⤵PID:2956
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33747.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33747.exe7⤵PID:356
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 356 -s 2408⤵
- Program crash
PID:2928
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34450.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34450.exe5⤵PID:2760
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60629.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60629.exe6⤵PID:1432
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30562.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30562.exe7⤵PID:784
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13286.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13286.exe8⤵PID:2368
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45440.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45440.exe9⤵PID:1728
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13322.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13322.exe8⤵PID:1756
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57759.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57759.exe6⤵PID:2300
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25923.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25923.exe7⤵PID:2576
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15274.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15274.exe8⤵PID:1616
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34559.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34559.exe4⤵PID:2904
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6960.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6960.exe5⤵PID:1692
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60027.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60027.exe6⤵PID:1984
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47749.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47749.exe7⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18030.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18030.exe8⤵PID:2516
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21056.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21056.exe9⤵PID:1928
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2516 -s 2409⤵
- Program crash
PID:2260
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1528 -s 2368⤵
- Program crash
PID:2564
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1984 -s 2367⤵
- Program crash
PID:1636
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1692 -s 2366⤵
- Program crash
PID:1624
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2904 -s 2365⤵
- Program crash
PID:2096
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD5bbbf4a7e39007446ca96c338c14a0cf2
SHA10da4f3321c630c7a326abaff17af88d6e755e4f2
SHA2561f3e219bad4da6a6fff8639965e72d81bdb261ab067d8545960ca0ada87c5c58
SHA5123974aef9d0dc9a636a769bda0c87c7b6a08bd2d7f33f74357ae7feea642df197469d000fe373042c7f05495107f86510b0554a3d9abe07ce78265daa676f5bf8