Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
12s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
30/12/2023, 12:41
Static task
static1
Behavioral task
behavioral1
Sample
18d5d61402887a11004d7cdb5057ba47.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
18d5d61402887a11004d7cdb5057ba47.exe
Resource
win10v2004-20231215-en
General
-
Target
18d5d61402887a11004d7cdb5057ba47.exe
-
Size
184KB
-
MD5
18d5d61402887a11004d7cdb5057ba47
-
SHA1
38005291e9e6e22fa810230614d8bb3c263d0d34
-
SHA256
d0c1ba665ee0222f98c4cc21213ea357e1ebfb5d9e04df4ae88867948b2fa802
-
SHA512
57bd9e7a4dc5bb2706d102fc8c96b36b2d71b0cd42c7027d7465145d5b0729f67173e92955e9de7f2afaf217194485f14776bc269c5a4fd53404120ddc089c24
-
SSDEEP
3072:tqnUoJIovUA7WOjQdx5iNz1e4L76TWyykmyx/6PDW7lXvpLc:tqUo1l7WTd7iNzd9cx7lXvpL
Malware Config
Signatures
-
Executes dropped EXE 11 IoCs
pid Process 2404 Unicorn-24234.exe 1628 Unicorn-16149.exe 2616 Unicorn-57736.exe 2608 Unicorn-23331.exe 1688 Unicorn-64918.exe 2788 Unicorn-31499.exe 2844 Unicorn-15245.exe 2184 Unicorn-26106.exe 1572 Unicorn-21468.exe 1820 Unicorn-33720.exe 1592 Unicorn-9770.exe -
Loads dropped DLL 22 IoCs
pid Process 2924 18d5d61402887a11004d7cdb5057ba47.exe 2924 18d5d61402887a11004d7cdb5057ba47.exe 2404 Unicorn-24234.exe 2404 Unicorn-24234.exe 2924 18d5d61402887a11004d7cdb5057ba47.exe 2924 18d5d61402887a11004d7cdb5057ba47.exe 1628 Unicorn-16149.exe 1628 Unicorn-16149.exe 2404 Unicorn-24234.exe 2404 Unicorn-24234.exe 2616 Unicorn-57736.exe 2616 Unicorn-57736.exe 2608 Unicorn-23331.exe 2608 Unicorn-23331.exe 1628 Unicorn-16149.exe 1628 Unicorn-16149.exe 1688 Unicorn-64918.exe 1688 Unicorn-64918.exe 2788 Unicorn-31499.exe 2788 Unicorn-31499.exe 2616 Unicorn-57736.exe 2616 Unicorn-57736.exe -
Suspicious use of SetWindowsHookEx 10 IoCs
pid Process 2924 18d5d61402887a11004d7cdb5057ba47.exe 2404 Unicorn-24234.exe 1628 Unicorn-16149.exe 2616 Unicorn-57736.exe 2608 Unicorn-23331.exe 1688 Unicorn-64918.exe 2788 Unicorn-31499.exe 2844 Unicorn-15245.exe 2184 Unicorn-26106.exe 1572 Unicorn-21468.exe -
Suspicious use of WriteProcessMemory 44 IoCs
description pid Process procid_target PID 2924 wrote to memory of 2404 2924 18d5d61402887a11004d7cdb5057ba47.exe 28 PID 2924 wrote to memory of 2404 2924 18d5d61402887a11004d7cdb5057ba47.exe 28 PID 2924 wrote to memory of 2404 2924 18d5d61402887a11004d7cdb5057ba47.exe 28 PID 2924 wrote to memory of 2404 2924 18d5d61402887a11004d7cdb5057ba47.exe 28 PID 2404 wrote to memory of 1628 2404 Unicorn-24234.exe 29 PID 2404 wrote to memory of 1628 2404 Unicorn-24234.exe 29 PID 2404 wrote to memory of 1628 2404 Unicorn-24234.exe 29 PID 2404 wrote to memory of 1628 2404 Unicorn-24234.exe 29 PID 2924 wrote to memory of 2616 2924 18d5d61402887a11004d7cdb5057ba47.exe 30 PID 2924 wrote to memory of 2616 2924 18d5d61402887a11004d7cdb5057ba47.exe 30 PID 2924 wrote to memory of 2616 2924 18d5d61402887a11004d7cdb5057ba47.exe 30 PID 2924 wrote to memory of 2616 2924 18d5d61402887a11004d7cdb5057ba47.exe 30 PID 1628 wrote to memory of 2608 1628 Unicorn-16149.exe 33 PID 1628 wrote to memory of 2608 1628 Unicorn-16149.exe 33 PID 1628 wrote to memory of 2608 1628 Unicorn-16149.exe 33 PID 1628 wrote to memory of 2608 1628 Unicorn-16149.exe 33 PID 2404 wrote to memory of 1688 2404 Unicorn-24234.exe 32 PID 2404 wrote to memory of 1688 2404 Unicorn-24234.exe 32 PID 2404 wrote to memory of 1688 2404 Unicorn-24234.exe 32 PID 2404 wrote to memory of 1688 2404 Unicorn-24234.exe 32 PID 2616 wrote to memory of 2788 2616 Unicorn-57736.exe 31 PID 2616 wrote to memory of 2788 2616 Unicorn-57736.exe 31 PID 2616 wrote to memory of 2788 2616 Unicorn-57736.exe 31 PID 2616 wrote to memory of 2788 2616 Unicorn-57736.exe 31 PID 2608 wrote to memory of 2844 2608 Unicorn-23331.exe 38 PID 2608 wrote to memory of 2844 2608 Unicorn-23331.exe 38 PID 2608 wrote to memory of 2844 2608 Unicorn-23331.exe 38 PID 2608 wrote to memory of 2844 2608 Unicorn-23331.exe 38 PID 1628 wrote to memory of 2184 1628 Unicorn-16149.exe 37 PID 1628 wrote to memory of 2184 1628 Unicorn-16149.exe 37 PID 1628 wrote to memory of 2184 1628 Unicorn-16149.exe 37 PID 1628 wrote to memory of 2184 1628 Unicorn-16149.exe 37 PID 1688 wrote to memory of 1572 1688 Unicorn-64918.exe 36 PID 1688 wrote to memory of 1572 1688 Unicorn-64918.exe 36 PID 1688 wrote to memory of 1572 1688 Unicorn-64918.exe 36 PID 1688 wrote to memory of 1572 1688 Unicorn-64918.exe 36 PID 2788 wrote to memory of 1820 2788 Unicorn-31499.exe 35 PID 2788 wrote to memory of 1820 2788 Unicorn-31499.exe 35 PID 2788 wrote to memory of 1820 2788 Unicorn-31499.exe 35 PID 2788 wrote to memory of 1820 2788 Unicorn-31499.exe 35 PID 2616 wrote to memory of 1592 2616 Unicorn-57736.exe 34 PID 2616 wrote to memory of 1592 2616 Unicorn-57736.exe 34 PID 2616 wrote to memory of 1592 2616 Unicorn-57736.exe 34 PID 2616 wrote to memory of 1592 2616 Unicorn-57736.exe 34
Processes
-
C:\Users\Admin\AppData\Local\Temp\18d5d61402887a11004d7cdb5057ba47.exe"C:\Users\Admin\AppData\Local\Temp\18d5d61402887a11004d7cdb5057ba47.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-24234.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24234.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16149.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16149.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23331.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23331.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15245.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15245.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-31821.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31821.exe6⤵PID:2720
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41141.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41141.exe7⤵PID:1388
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4275.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4275.exe8⤵PID:832
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25547.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25547.exe9⤵PID:1264
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45822.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45822.exe10⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2779.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2779.exe11⤵PID:948
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23963.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23963.exe8⤵PID:1880
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30704.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30704.exe9⤵PID:1828
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6968.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6968.exe7⤵PID:2568
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20346.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20346.exe8⤵PID:452
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47918.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47918.exe6⤵PID:2448
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15157.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15157.exe7⤵PID:2784
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7871.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7871.exe5⤵PID:1444
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12360.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12360.exe6⤵PID:2420
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64358.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64358.exe7⤵PID:2668
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9018.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9018.exe8⤵PID:2456
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55145.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55145.exe9⤵PID:720
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21934.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21934.exe6⤵PID:2760
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15625.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15625.exe7⤵PID:2880
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26106.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26106.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2184 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-39989.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39989.exe5⤵PID:2948
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4192.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4192.exe6⤵PID:1792
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19050.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19050.exe7⤵PID:2364
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39190.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39190.exe8⤵PID:1096
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-210.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-210.exe9⤵PID:2864
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14150.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14150.exe6⤵PID:1968
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15053.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15053.exe5⤵PID:996
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23326.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23326.exe6⤵PID:2504
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15625.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15625.exe7⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22079.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22079.exe8⤵PID:1316
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61296.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61296.exe6⤵PID:1460
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50947.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50947.exe7⤵PID:2872
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64918.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64918.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21468.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21468.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46019.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46019.exe5⤵PID:2000
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49693.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49693.exe6⤵PID:1736
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27794.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27794.exe7⤵PID:780
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18618.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18618.exe6⤵PID:1312
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62566.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62566.exe7⤵PID:1964
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56470.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56470.exe5⤵PID:1408
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17680.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17680.exe6⤵PID:1748
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2428.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2428.exe7⤵PID:648
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15472.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15472.exe8⤵PID:1644
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3595.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3595.exe4⤵PID:2884
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57736.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57736.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-31499.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31499.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-33720.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33720.exe4⤵
- Executes dropped EXE
PID:1820 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50103.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50103.exe5⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29465.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29465.exe6⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39470.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39470.exe7⤵PID:2636
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20766.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20766.exe8⤵PID:2276
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14150.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14150.exe6⤵PID:2172
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15963.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15963.exe7⤵PID:2132
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17767.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17767.exe5⤵PID:288
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38484.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38484.exe6⤵PID:2816
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44628.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44628.exe4⤵PID:384
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47747.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47747.exe5⤵PID:2212
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17680.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17680.exe6⤵PID:956
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12012.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12012.exe5⤵PID:2360
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9770.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9770.exe3⤵
- Executes dropped EXE
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-29683.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29683.exe4⤵PID:1512
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25189.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25189.exe5⤵PID:2372
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53860.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53860.exe6⤵PID:2984
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50907.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50907.exe5⤵PID:2548
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29827.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29827.exe4⤵PID:2252
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8395.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8395.exe5⤵PID:1076
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35151.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35151.exe6⤵PID:1600
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
3KB
MD52f558647a763b5276c4829920c1ce8d0
SHA11277d0efad2a0709b246b1a966689e4dc8a20170
SHA25603fa5280ef0d10490b9d525e1e2322df7cddf60668751af0fc2d024c414c9837
SHA5129ffccda1a5ea6b149095b81bb659fe0a60b58a31907e6bca133582e2acc821c00c0fe7968750a5d390284bf10a1498ca84e3de021cf9e627514993fa29adb782
-
Filesize
184KB
MD57703981bfe88a257ae53113575956669
SHA1a887215dc9d3a0343b8439cdd0c1d16360fe3d6d
SHA256434de76615cb87059edc95e4d7ba5d8db45d068860b3b92072c7e45f472d64ff
SHA512d13e7df2d6b5e990533561edcfecf974885461ec6e251d118ea92545f94ad689a0d2f3d6f5803a2ae01e0b7d19f77cd7629ca8bc1d1fae3ed7f6700d556d84fb
-
Filesize
91KB
MD5a06086adf23e5274e345505fdd578a98
SHA1a38bb4ae20df045f2190748c01359bcca99cac7f
SHA2562e8f2c05417fbd5e8ad97c5e107d2e8f8cc5d7faf653b4b38606d9d13a6f0aa6
SHA512b865226040d0c96293f1deb7c31d335fe13924896a0eb36b45d13f24f6f6cb6227febc7268553b16e063f5e6496324f9e8b7c7bf219e451d5df5764d27fb6383
-
Filesize
184KB
MD54bb2b8de4a5ecf0206abf02b8fcad146
SHA10de38abfdcce05dab5446f372822f8b2145a2d55
SHA256dc8ef81173f1a0b6a982a5ed4c9b8e3fa9cc66fc7807b4435ed1893d7006cf75
SHA512dec6840d9db2d5b11a31722cbb60a9e6b201adf01184460a561df1daf7fb1267ed6d4f269b7a234b473a1d448919069b19863f3b6dfeafda03927b8fea305d06
-
Filesize
93KB
MD514e0f0232d12cfa552cf8bcdc9681442
SHA138b5b06c8551b1af64e138422772111a67dd5324
SHA256c36babc6c2afb05f8b50be6a23f402dd78a4116edc0e25058124947f3028e736
SHA5127ae3e6f88b1bdd98e9e8f3d2b61a65f88b0dd2c6790a40b507cd641d460ae2ba37877c33d686b6986e31f52c5024415617307dacc5ae50244b7107ab040e45f2