Analysis
-
max time kernel
12s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30-12-2023 08:15
Static task
static1
1 signatures
Behavioral task
behavioral1
Sample
132696461897eb46ae5ff7530e55c40e.exe
Resource
win7-20231129-en
windows7-x64
4 signatures
150 seconds
Behavioral task
behavioral2
Sample
132696461897eb46ae5ff7530e55c40e.exe
Resource
win10v2004-20231215-en
windows10-2004-x64
0 signatures
150 seconds
General
-
Target
132696461897eb46ae5ff7530e55c40e.exe
-
Size
184KB
-
MD5
132696461897eb46ae5ff7530e55c40e
-
SHA1
b83059226e1660502313d1232a6c8038cd15ddf9
-
SHA256
0a48d1fc1a9679b87b0990777bda5c4cf9b8013c60e0ece9839b75633e151e80
-
SHA512
7205af4219fa74f6034ef508c48d493bf2d80551996a5535b8949c58a89b9ccef0293a6c098c5eb53167fb3dc5d7e0ac5d68dee746a0152defd0e4652fe866cf
-
SSDEEP
3072:84bYoJZTf0A0AOjAdxKbzz1ev/r62b2kBEEub82a67lXvpFh:84corF0Azdcbzzc7MV7lXvpF
Score
7/10
Malware Config
Signatures
-
Executes dropped EXE 8 IoCs
pid Process 2904 Unicorn-63061.exe 3044 Unicorn-44390.exe 2796 Unicorn-7522.exe 2584 Unicorn-21012.exe 2740 Unicorn-58515.exe 2632 Unicorn-4675.exe 2184 Unicorn-1956.exe 3064 Unicorn-39459.exe -
Loads dropped DLL 16 IoCs
pid Process 2848 132696461897eb46ae5ff7530e55c40e.exe 2848 132696461897eb46ae5ff7530e55c40e.exe 2848 132696461897eb46ae5ff7530e55c40e.exe 2904 Unicorn-38083.exe 2904 Unicorn-38083.exe 2848 132696461897eb46ae5ff7530e55c40e.exe 3044 Unicorn-44390.exe 3044 Unicorn-44390.exe 2904 Unicorn-38083.exe 2904 Unicorn-38083.exe 2796 Unicorn-7522.exe 2796 Unicorn-7522.exe 2584 Unicorn-21012.exe 2584 Unicorn-21012.exe 3044 Unicorn-44390.exe 3044 Unicorn-44390.exe -
Suspicious use of SetWindowsHookEx 8 IoCs
pid Process 2848 132696461897eb46ae5ff7530e55c40e.exe 2904 Unicorn-38083.exe 3044 Unicorn-44390.exe 2796 Unicorn-7522.exe 2584 Unicorn-21012.exe 2740 Unicorn-58515.exe 2632 Unicorn-4675.exe 2184 Unicorn-1956.exe -
Suspicious use of WriteProcessMemory 32 IoCs
description pid Process procid_target PID 2848 wrote to memory of 2904 2848 132696461897eb46ae5ff7530e55c40e.exe 28 PID 2848 wrote to memory of 2904 2848 132696461897eb46ae5ff7530e55c40e.exe 28 PID 2848 wrote to memory of 2904 2848 132696461897eb46ae5ff7530e55c40e.exe 28 PID 2848 wrote to memory of 2904 2848 132696461897eb46ae5ff7530e55c40e.exe 28 PID 2904 wrote to memory of 3044 2904 Unicorn-38083.exe 30 PID 2904 wrote to memory of 3044 2904 Unicorn-38083.exe 30 PID 2904 wrote to memory of 3044 2904 Unicorn-38083.exe 30 PID 2904 wrote to memory of 3044 2904 Unicorn-38083.exe 30 PID 2848 wrote to memory of 2796 2848 132696461897eb46ae5ff7530e55c40e.exe 74 PID 2848 wrote to memory of 2796 2848 132696461897eb46ae5ff7530e55c40e.exe 74 PID 2848 wrote to memory of 2796 2848 132696461897eb46ae5ff7530e55c40e.exe 74 PID 2848 wrote to memory of 2796 2848 132696461897eb46ae5ff7530e55c40e.exe 74 PID 3044 wrote to memory of 2584 3044 Unicorn-44390.exe 33 PID 3044 wrote to memory of 2584 3044 Unicorn-44390.exe 33 PID 3044 wrote to memory of 2584 3044 Unicorn-44390.exe 33 PID 3044 wrote to memory of 2584 3044 Unicorn-44390.exe 33 PID 2904 wrote to memory of 2740 2904 Unicorn-38083.exe 32 PID 2904 wrote to memory of 2740 2904 Unicorn-38083.exe 32 PID 2904 wrote to memory of 2740 2904 Unicorn-38083.exe 32 PID 2904 wrote to memory of 2740 2904 Unicorn-38083.exe 32 PID 2796 wrote to memory of 2632 2796 Unicorn-7522.exe 31 PID 2796 wrote to memory of 2632 2796 Unicorn-7522.exe 31 PID 2796 wrote to memory of 2632 2796 Unicorn-7522.exe 31 PID 2796 wrote to memory of 2632 2796 Unicorn-7522.exe 31 PID 2584 wrote to memory of 2184 2584 Unicorn-21012.exe 38 PID 2584 wrote to memory of 2184 2584 Unicorn-21012.exe 38 PID 2584 wrote to memory of 2184 2584 Unicorn-21012.exe 38 PID 2584 wrote to memory of 2184 2584 Unicorn-21012.exe 38 PID 3044 wrote to memory of 3064 3044 Unicorn-44390.exe 37 PID 3044 wrote to memory of 3064 3044 Unicorn-44390.exe 37 PID 3044 wrote to memory of 3064 3044 Unicorn-44390.exe 37 PID 3044 wrote to memory of 3064 3044 Unicorn-44390.exe 37
Processes
-
C:\Users\Admin\AppData\Local\Temp\132696461897eb46ae5ff7530e55c40e.exe"C:\Users\Admin\AppData\Local\Temp\132696461897eb46ae5ff7530e55c40e.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-63061.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63061.exe2⤵
- Executes dropped EXE
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44390.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44390.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21012.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21012.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-1956.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1956.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34528.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34528.exe6⤵PID:2512
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6494.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6494.exe5⤵PID:2232
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15639.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15639.exe6⤵PID:2936
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15249.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15249.exe7⤵PID:2672
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3085.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3085.exe8⤵PID:2072
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25524.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25524.exe9⤵PID:536
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59937.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59937.exe10⤵PID:2824
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59992.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59992.exe7⤵PID:2248
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60832.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60832.exe8⤵PID:2948
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11109.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11109.exe9⤵PID:1476
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27371.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27371.exe6⤵PID:2808
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14320.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14320.exe7⤵PID:888
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27941.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27941.exe8⤵PID:2396
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39459.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39459.exe4⤵
- Executes dropped EXE
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9831.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9831.exe5⤵PID:1788
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38415.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38415.exe6⤵PID:408
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6889.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6889.exe7⤵PID:1640
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28248.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28248.exe6⤵PID:2168
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3085.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3085.exe7⤵PID:1600
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62955.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62955.exe5⤵PID:1496
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30626.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30626.exe6⤵PID:2576
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58515.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58515.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-2148.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2148.exe4⤵PID:1400
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64377.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64377.exe5⤵PID:2268
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15062.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15062.exe6⤵PID:1948
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7522.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7522.exe7⤵PID:1764
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53194.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53194.exe6⤵PID:1252
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24770.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24770.exe7⤵PID:2364
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61803.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61803.exe5⤵PID:1128
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22131.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22131.exe6⤵PID:2436
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4729.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4729.exe7⤵PID:964
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64247.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64247.exe4⤵PID:976
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40444.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40444.exe5⤵PID:1132
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14673.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14673.exe6⤵PID:2224
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11928.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11928.exe7⤵PID:1072
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11196.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11196.exe6⤵PID:1508
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1391.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1391.exe7⤵PID:1992
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35179.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35179.exe8⤵PID:2016
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52369.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52369.exe5⤵PID:2480
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24524.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24524.exe2⤵PID:2796
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4675.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4675.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18677.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18677.exe4⤵PID:1844
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23345.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23345.exe5⤵PID:2288
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57247.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57247.exe6⤵PID:1124
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63163.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63163.exe7⤵PID:1348
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12286.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12286.exe8⤵PID:1892
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24258.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24258.exe9⤵PID:468
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57958.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57958.exe7⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52460.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52460.exe8⤵PID:1584
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52950.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52950.exe9⤵PID:1660
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2265.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2265.exe6⤵PID:852
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44753.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44753.exe7⤵PID:1712
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36037.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36037.exe5⤵PID:568
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7522.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7522.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2796
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31190.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31190.exe4⤵PID:2824
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48804.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48804.exe5⤵PID:2112
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48664.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48664.exe6⤵PID:268
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53194.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53194.exe5⤵PID:2976
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47820.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47820.exe3⤵PID:1932
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18576.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18576.exe4⤵PID:572
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40719.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40719.exe5⤵PID:804
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38083.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38083.exe6⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22951.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22951.exe7⤵PID:1920
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37952.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37952.exe5⤵PID:2892
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19659.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19659.exe6⤵PID:1740
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19509.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19509.exe4⤵PID:1912
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38659.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38659.exe5⤵PID:2388
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63872.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63872.exe6⤵PID:708
-
-
-
-
-