Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    141s
  • max time network
    126s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    31/12/2023, 13:04

General

  • Target

    373365cc81faa9e1a32755f14786aec6.exe

  • Size

    184KB

  • MD5

    373365cc81faa9e1a32755f14786aec6

  • SHA1

    172721e686d220850166386a74c62226dd30d945

  • SHA256

    e3f037a6b168e749473c0f4d3ee8985e2494e5fd0dc9f73e59dfb879e069d031

  • SHA512

    540eadb60f79aff1b3aa574a33ca7d3086d2f0e34969f2fd565029d4eb2977e6a95ca9adb43155621130670e94528aa4ba9c732bac4471b66aaaa210d2d799a9

  • SSDEEP

    3072:ZepcoNml4KvoFojMCuQieK/a2ZP6ot/IJpbxz4PmrAlPcpFx:ZeCoNQoFVCLieK7wtdAlPcpF

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 22 IoCs
  • Loads dropped DLL 44 IoCs
  • Suspicious use of SetWindowsHookEx 22 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\373365cc81faa9e1a32755f14786aec6.exe
    "C:\Users\Admin\AppData\Local\Temp\373365cc81faa9e1a32755f14786aec6.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2420
    • C:\Users\Admin\AppData\Local\Temp\Unicorn-32955.exe
      C:\Users\Admin\AppData\Local\Temp\Unicorn-32955.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1420
      • C:\Users\Admin\AppData\Local\Temp\Unicorn-54802.exe
        C:\Users\Admin\AppData\Local\Temp\Unicorn-54802.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2824
        • C:\Users\Admin\AppData\Local\Temp\Unicorn-9021.exe
          C:\Users\Admin\AppData\Local\Temp\Unicorn-9021.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2564
          • C:\Users\Admin\AppData\Local\Temp\Unicorn-48575.exe
            C:\Users\Admin\AppData\Local\Temp\Unicorn-48575.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2728
            • C:\Users\Admin\AppData\Local\Temp\Unicorn-6530.exe
              C:\Users\Admin\AppData\Local\Temp\Unicorn-6530.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:2188
              • C:\Users\Admin\AppData\Local\Temp\Unicorn-36811.exe
                C:\Users\Admin\AppData\Local\Temp\Unicorn-36811.exe
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:2536
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-4688.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-4688.exe
                  8⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:2900
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-29852.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-29852.exe
                    9⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of SetWindowsHookEx
                    • Suspicious use of WriteProcessMemory
                    PID:1964
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-18031.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-18031.exe
                      10⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Suspicious use of SetWindowsHookEx
                      • Suspicious use of WriteProcessMemory
                      PID:2448
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-516.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-516.exe
                        11⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Suspicious use of SetWindowsHookEx
                        • Suspicious use of WriteProcessMemory
                        PID:844
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-24118.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-24118.exe
                          12⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Suspicious use of SetWindowsHookEx
                          • Suspicious use of WriteProcessMemory
                          PID:2544
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-49424.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-49424.exe
                            13⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Suspicious use of SetWindowsHookEx
                            • Suspicious use of WriteProcessMemory
                            PID:1488
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-18838.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-18838.exe
                              14⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • Suspicious use of SetWindowsHookEx
                              • Suspicious use of WriteProcessMemory
                              PID:556
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-64769.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-64769.exe
                                15⤵
                                • Executes dropped EXE
                                • Loads dropped DLL
                                • Suspicious use of SetWindowsHookEx
                                • Suspicious use of WriteProcessMemory
                                PID:2368
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-10197.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-10197.exe
                                  16⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Suspicious use of SetWindowsHookEx
                                  • Suspicious use of WriteProcessMemory
                                  PID:1096
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-40488.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-40488.exe
                                    17⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • Suspicious use of SetWindowsHookEx
                                    PID:1544
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-39824.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-39824.exe
                                      18⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Suspicious use of SetWindowsHookEx
                                      PID:952
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-5864.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-5864.exe
                                        19⤵
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        • Suspicious use of SetWindowsHookEx
                                        PID:1088
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-4541.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-4541.exe
                                          20⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          • Suspicious use of SetWindowsHookEx
                                          PID:1752
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-4297.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-4297.exe
                                            21⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            • Suspicious use of SetWindowsHookEx
                                            PID:1700
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-26877.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-26877.exe
                                              22⤵
                                              • Executes dropped EXE
                                              • Loads dropped DLL
                                              • Suspicious use of SetWindowsHookEx
                                              PID:848
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-33265.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-33265.exe
                                                23⤵
                                                • Executes dropped EXE
                                                PID:1856
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-14702.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-14702.exe
                                                  24⤵
                                                    PID:1608

    Network

    MITRE ATT&CK Matrix

    Replay Monitor

    Loading Replay Monitor...

    Downloads

    • C:\Users\Admin\AppData\Local\Temp\Unicorn-10197.exe

      Filesize

      184KB

      MD5

      1f5000e49ac833132930fc721cd51515

      SHA1

      545e6a0f5f6ad7500f4846a90e36b4dd09225095

      SHA256

      c5b1169d95171c28400263b47b991e435229e9c91dc0caa67ba3276a9d47a389

      SHA512

      7d8682aeb71fc8b334cf01a4a440425d52035a22316c4a50257ceb0a667dfac3c9c1e7eba8b73b0df146563ce93bc84c557603dadcabc659ba4a017f1421d593

    • C:\Users\Admin\AppData\Local\Temp\Unicorn-29852.exe

      Filesize

      27KB

      MD5

      3793084a56c90abdc4a2ad9e447bbc6d

      SHA1

      8d1b0874c1a9ecbd8520cfe9e7c71a11e725cf7d

      SHA256

      677a415e7c55363ce10a0f5f23e887e4844da0ab460bf213590423c86ada1121

      SHA512

      144e7bbb9bb785aa00cba0ec315cb0b5d10d705d1d1ce7d4b93466df719e33c6e4f8aae67bcdcd004c76500fe6bfef8e97cecbd36ab0dba1e099cd891a64bd42

    • C:\Users\Admin\AppData\Local\Temp\Unicorn-36811.exe

      Filesize

      126KB

      MD5

      53fb60e1a639f520212e3407f56bd71d

      SHA1

      29dc67819536ec7659289368e5561b199de35f69

      SHA256

      77511d7da98ceb04145712e87f07283ab546e91bc03fa2c36c7ba28a34ebeab5

      SHA512

      256cea7a936bbc33c601c7b95d2ce88b107f8fb24c0095bfbbe079970da643e4a3cbb84462d77eaf7652b1a496bc1061b83ca8d70731b473ff63079ac5008a3c

    • C:\Users\Admin\AppData\Local\Temp\Unicorn-49424.exe

      Filesize

      128KB

      MD5

      7d216855c77d020a22a2906533e34a92

      SHA1

      a8aff4444cacaf8b07b65ddf745a18a82d0a7a18

      SHA256

      020668c5d17b1aece862aba54de2ccaef83924a6df1675df8f355f6c258b43d0

      SHA512

      df1dd982164c5776df456d476e9f88be442d8783b5282b136f8559ea6d1a9eab6a43497e72dd3cecb3a723ce49a573e1f6b46e48fce06c8cccdf976844c19db8

    • C:\Users\Admin\AppData\Local\Temp\Unicorn-5864.exe

      Filesize

      184KB

      MD5

      92d8f98d311f2e01f4dbe417df383ce7

      SHA1

      97948e11bbcc3b34bf588811933dc27a3176505d

      SHA256

      c3826669cbe0770e822e218ee02bf0ca1aa6fd6daaf1a4192d60e052db3b6f9e

      SHA512

      a158cad1b71c504bcba3b3626bd55bdf8a02edc824412ae126096e16afe06262564cba89168574f834eba8f37dd1518eedb87235e7857193e81875aa872a9868

    • C:\Users\Admin\AppData\Local\Temp\Unicorn-64769.exe

      Filesize

      64KB

      MD5

      45f30bc30f00a30ef26f86d7eea8aba2

      SHA1

      8e3d499e31812d09f274df72360f512390434d89

      SHA256

      8b7dc72bb5bf05e22891f5789a7b436a87862d29ac9c8f00214d95fab58c51f4

      SHA512

      9747e7e81cec70e0ec33b85124e9ed341effe673eec21c735e31323123c84e90de63b7e8b37ee0024712e8171cb27c508018b3436c2e4924558b3224de8964d7

    • \Users\Admin\AppData\Local\Temp\Unicorn-10197.exe

      Filesize

      128KB

      MD5

      007a8064db2e2d91858c796f44c256a5

      SHA1

      b28dc2b71c5d8a973e3896d22246e38f1a37a738

      SHA256

      4d1f2e33b463cc4870cb97c165ed7bf273cf74d70afd2b5a26e30f557db081fb

      SHA512

      4047e698bd44e464ece7d560b7dc6cbee705e96c4930b9b9dc733c0cd2b858647a70edd5c52bb30e043b5fd8a56b7acd53ccc760ff0f4c684328a8244cc151cc

    • \Users\Admin\AppData\Local\Temp\Unicorn-18031.exe

      Filesize

      184KB

      MD5

      7a16153f97609e36e4fdb33ff143e316

      SHA1

      9c53913b407b7e54906f9b77bee414f550c33abf

      SHA256

      d014d3359e8703489962cf64e6e8979ccf2c0939b52f2dbd11cdac9f295c2704

      SHA512

      85e90add0c25ea25e52e9c22bc6bb97c6d8c418fc8d8fa036678c009ba0b18ef8b4d91add413b91e6cdca54b0960402b991aac058a4136a2c485cee44ecfe07c

    • \Users\Admin\AppData\Local\Temp\Unicorn-18838.exe

      Filesize

      184KB

      MD5

      8cf17ceee4438c3fe744ebf271d33521

      SHA1

      15a83c86a29bec09fa9facf7d204115c2187610b

      SHA256

      433444bd4c8d20ddafc64196984955484704c70b394d4d9c02584758a1e722cc

      SHA512

      abc317e5f07bc9e8b78dbe708ddfa65d100de51fa7e75749a0da6261fde0b29c51aebe4221b84821ca51780603a816ea63de36bccc5802605fbf9a1b8966ba8e

    • \Users\Admin\AppData\Local\Temp\Unicorn-24118.exe

      Filesize

      184KB

      MD5

      ff83bbd344aceb9a82d66ee2d31f8071

      SHA1

      cfafc46a3e5b1e3ea44bfdc7f8c59d9b14525750

      SHA256

      23ad995a362e49e6d919fdb69cd92bd810adb0ef26f73a8a4c75addf00309db0

      SHA512

      cc342e1e30c1de639a12fc13902da891cd4fe26813f6a41eb22a701205f463e796489f06401decfc8a350385629d5711a66c25c0e69c58766555c478827d7952

    • \Users\Admin\AppData\Local\Temp\Unicorn-29852.exe

      Filesize

      184KB

      MD5

      e819e716a84c5217013a287bbcfe1bac

      SHA1

      04850e2f494b1794db2bad61a1a8005772636915

      SHA256

      7ccb17e4efe18d2884d2069af9585066be91642d7ca54aaa0992291ec355b1ed

      SHA512

      ec52b353b8776b639891826ed8fdcbc8ab35511918f812ca0cf948631898cfd8682bfff701a19f0094efbc3cbcdc995c761aafc8140ce7abcf0441843575bf0b

    • \Users\Admin\AppData\Local\Temp\Unicorn-32955.exe

      Filesize

      184KB

      MD5

      36c6d9366e8dd7f3ff9b7c21ae388eb8

      SHA1

      caa624008c7b15605da3e02bd6588c1d6dfd3710

      SHA256

      ee9b5b9276b6ebf846a010ec055d715c1a7a1d3c02331f4879610d7d2ba95127

      SHA512

      562f58d042fdd8c0337abdf4092b727104641121b61baf6c5225d514e56039f880c4ef5c962803bc813db19a17c6e32d9b2787e606d1ca17b1df4ca667a39686

    • \Users\Admin\AppData\Local\Temp\Unicorn-36811.exe

      Filesize

      184KB

      MD5

      44ad26506f752dcf2e7f4bbf4bed1339

      SHA1

      fd8d29dc0382d8ab78f502ea7ba782dba000ab21

      SHA256

      d5f57e0ef10a0b3fcc1852ecc533269c82325a1bb721c3d1268cadff658de61d

      SHA512

      749707f2e1d1ec980a34c6e78099bfddc35f74f2e7ed95e8bdc1e962e508dc6fdc39a07dd9c10602343ff9df7cac326bba7c7aef7bdc8453e2807b87f1faf819

    • \Users\Admin\AppData\Local\Temp\Unicorn-36811.exe

      Filesize

      128KB

      MD5

      f3a8632afbc6c65324818f34801c5fa9

      SHA1

      d8fa2c0865eb598ef24b2c6186c23e10bcd51f47

      SHA256

      add22789dbb98f1bff73210622f16fb0e5876cda8b43a2b24ab5fcf442076c02

      SHA512

      bcfd9b96a09750c190d8de29309c21f8eece0112f9470f3bf2e1ebd29637370611cc093392048edfd31d9c6faf1c70a4ef9b15bf11181ca4add167b496e25d5d

    • \Users\Admin\AppData\Local\Temp\Unicorn-40488.exe

      Filesize

      184KB

      MD5

      b4090b712d15fda0a3ca74af39ba754f

      SHA1

      b64b1ecb3ac8042e64c22d6adf412761def92fb3

      SHA256

      452dad56705cc1262c2ca213630e678832fe037d905d228564fde3d232009756

      SHA512

      4af769990267a729529485067697bc461b0046b94bcad5070ee2227d23eb717b560e4702f7ac21196ec8d30e65c3bda97b1259101383ec7d6e6437576e9c1d1e

    • \Users\Admin\AppData\Local\Temp\Unicorn-4688.exe

      Filesize

      184KB

      MD5

      3be3851f67fbbfeb7e3760f0398c7d0f

      SHA1

      025169668ec93f13b147fa4553fff7f4b826c988

      SHA256

      b1309fae79ba545c1a3678216950c8e056fcc4805fa1e485ba1882b037158c04

      SHA512

      dbb1e267614b11c162997cf1701814548cfb90fea5bcfd27c2eabc10e59a2f2f4a23d235cd2c753701257d5d3bcfeb9e308090f7444c9d896cb31294eb1480bf

    • \Users\Admin\AppData\Local\Temp\Unicorn-48575.exe

      Filesize

      184KB

      MD5

      bb38d1f2657d9948b69ea3a8c8776266

      SHA1

      552da1b98ff6e40a639605798b6f39a19c85f46a

      SHA256

      10ddb5999d22417d6d9a3d436d01ba1a5104668a945b9e584ad6a01fa95bf537

      SHA512

      5a966a7c73f2366c84123127d584594cb3e0f2debdf08fe9ae624aa41ff3ce460f36e77355c83885d3687c2ecf66c6388c14507d93cfebe391ab56ede8ce0e7a

    • \Users\Admin\AppData\Local\Temp\Unicorn-49424.exe

      Filesize

      184KB

      MD5

      6cfaaf51150b4d44cc7c0821bc061a15

      SHA1

      43b963a30beaa95ee9759d2dfab0f239f2cb420b

      SHA256

      3a1f8bd41da4407de4f97c8aeb2b73080cdf8219f83276805269883a3885258d

      SHA512

      c89951c6693cb4314f30ec505846a3315597dfccc6b888a70f93ced48ccf3337708a861e5c305253bb56fbe271b193ba51b7d2cd4dca1cc96915d0e37d1e6f6f

    • \Users\Admin\AppData\Local\Temp\Unicorn-516.exe

      Filesize

      184KB

      MD5

      681407b1468c64ed13a89a36da4c717e

      SHA1

      c5ee1fc0f9090ae6a0e91623d982aa1b520c4c97

      SHA256

      7ce68e46a06bc4e2528d6f2a32b0675f4bda4789d689893d2bea67d9be51b3b1

      SHA512

      e900787a837ca81b9209e80113abf3f24732c8285e42f4c833f545ea4a06bf704b9ea8f33fa3f0ada46d5cf3fdca9c08464186997dee7f33e2219e6e822b8c68

    • \Users\Admin\AppData\Local\Temp\Unicorn-54802.exe

      Filesize

      184KB

      MD5

      19c0f7b098b9006bcf99c6503fe512fd

      SHA1

      521fbf7de342c7799e78b58d5b6e9c243c32d57a

      SHA256

      29568e93c9a9dc0e96eef2540d768e552edf2fe1adb7d90fa30b4c17b796cb7c

      SHA512

      192d7e5d179f517cba19b1ab28067b7187b57038a472bd6d20013b092a1572120cf2ba4717748692b2ef22c7b880d28ac67115609f51be17a17aab0cd617aec6

    • \Users\Admin\AppData\Local\Temp\Unicorn-64769.exe

      Filesize

      184KB

      MD5

      dd5f0e299e6ff3edbc00093db9a8cdd5

      SHA1

      71b7b1af9eed332222a43bc63c7ddfe1bd7b1c46

      SHA256

      dc1309f2e74f9a7eaf47a8882cc1fc4db5637b6ac91ce205764b0f84dede16a2

      SHA512

      3a568ed8eb5c479f44b9d862723b976d4c313dcf8d11a46c96d99777d3b0309242d3c720961f465eeb9baaf34892b7c3bc33b1039b106fe098bc327c4ba77adf

    • \Users\Admin\AppData\Local\Temp\Unicorn-6530.exe

      Filesize

      184KB

      MD5

      d2e95779616802ac3cd70bf662fd111b

      SHA1

      8234386c87fd51f63a137201e8c4fa925f4ea4a4

      SHA256

      0996881c9ada6913c813d71bf751fcb05a2669e71000c2814404a352e2441905

      SHA512

      9980a3d932a62904756ba4001df5e1cbde5e239e2110f0ef9557c20dc2e2a5a07291f3eb47dcce48a5ecde94fc337fc9a5f3c245e5800c11d77612f842fa5bb7

    • \Users\Admin\AppData\Local\Temp\Unicorn-9021.exe

      Filesize

      184KB

      MD5

      5981a5a04f1bb596f43649fb8685dc83

      SHA1

      7bebc0588f15ef4234fbc80c69e1750c4631bd6f

      SHA256

      ca457fbd004d699a6d75d35daeefd4f4ab0bdb05eb375967b81cf385d4abb287

      SHA512

      0d1b44b9ddec8674f00c3e5c83a910bcb2f922b6a818e6d659fab9f7ef02cc0777d2b56cd7c2ba7a8789b92342088d2e259719f5526b7b5962aa1bb6fbc35b80