Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
148s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
31/12/2023, 13:25
Static task
static1
Behavioral task
behavioral1
Sample
37ebb9bb118030efdb5a808805e20cba.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
37ebb9bb118030efdb5a808805e20cba.exe
Resource
win10v2004-20231215-en
General
-
Target
37ebb9bb118030efdb5a808805e20cba.exe
-
Size
184KB
-
MD5
37ebb9bb118030efdb5a808805e20cba
-
SHA1
0cd39ef58ec4092db1c4d2535eb012d9624c5414
-
SHA256
f55c81b45b91cc08809c5f611aac877000f6786c581359be3d3bf02497290029
-
SHA512
58be9367983c7c62a9a6da2d8381e5f1dae4ebf0c0301929791d8ec537f9616f3d82be51d0fc580ea42db125b12f8d112ced5e4ed98ea48ef2422b488066e68f
-
SSDEEP
3072:2bHBo0RTWA0bOj7dTzclzRbxw36O8Z9js9x8kz177lPdpFL:2bhoU70bgd/clzR3jk7lPdpF
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2960 Unicorn-35995.exe 2744 Unicorn-29716.exe 2696 Unicorn-26186.exe 2564 Unicorn-14124.exe 2708 Unicorn-46797.exe 2556 Unicorn-59604.exe 1724 Unicorn-23990.exe 2856 Unicorn-7461.exe 2604 Unicorn-36796.exe 2972 Unicorn-20268.exe 1928 Unicorn-56470.exe 2508 Unicorn-13206.exe 784 Unicorn-42349.exe 1172 Unicorn-30420.exe 796 Unicorn-58494.exe 3024 Unicorn-16772.exe 2220 Unicorn-243.exe 2236 Unicorn-16388.exe 1072 Unicorn-12858.exe 1500 Unicorn-23264.exe 2896 Unicorn-52407.exe 1276 Unicorn-13663.exe 1568 Unicorn-29808.exe 1228 Unicorn-60020.exe 3056 Unicorn-63549.exe 912 Unicorn-43299.exe 1496 Unicorn-46445.exe 2428 Unicorn-46253.exe 400 Unicorn-13388.exe 292 Unicorn-29075.exe 1444 Unicorn-28883.exe 2316 Unicorn-31457.exe 1976 Unicorn-31457.exe 2512 Unicorn-51323.exe 808 Unicorn-51323.exe 1552 Unicorn-45193.exe 2680 Unicorn-31457.exe 2628 Unicorn-31457.exe 1056 Unicorn-51323.exe 2732 Unicorn-51323.exe 2672 Unicorn-24004.exe 2548 Unicorn-2680.exe 2032 Unicorn-38602.exe 1220 Unicorn-27351.exe 1424 Unicorn-11188.exe 280 Unicorn-10586.exe 1792 Unicorn-19030.exe 2988 Unicorn-57670.exe 2624 Unicorn-60109.exe 1120 Unicorn-48423.exe 768 Unicorn-61241.exe 1608 Unicorn-12590.exe 628 Unicorn-39013.exe 2668 Unicorn-11867.exe 2460 Unicorn-62274.exe 572 Unicorn-13634.exe 2660 Unicorn-47262.exe 3000 Unicorn-26505.exe 1756 Unicorn-13541.exe 1596 Unicorn-46757.exe 648 Unicorn-14577.exe 2632 Unicorn-44313.exe 1416 Unicorn-16678.exe 2916 Unicorn-33263.exe -
Loads dropped DLL 64 IoCs
pid Process 2264 37ebb9bb118030efdb5a808805e20cba.exe 2264 37ebb9bb118030efdb5a808805e20cba.exe 2960 Unicorn-35995.exe 2960 Unicorn-35995.exe 2264 37ebb9bb118030efdb5a808805e20cba.exe 2264 37ebb9bb118030efdb5a808805e20cba.exe 2696 Unicorn-26186.exe 2696 Unicorn-26186.exe 2744 Unicorn-29716.exe 2744 Unicorn-29716.exe 2960 Unicorn-35995.exe 2960 Unicorn-35995.exe 2564 Unicorn-14124.exe 2564 Unicorn-14124.exe 2696 Unicorn-26186.exe 2696 Unicorn-26186.exe 2708 Unicorn-46797.exe 2708 Unicorn-46797.exe 2744 Unicorn-29716.exe 2744 Unicorn-29716.exe 2556 Unicorn-59604.exe 2556 Unicorn-59604.exe 1724 Unicorn-23990.exe 1724 Unicorn-23990.exe 2564 Unicorn-14124.exe 2564 Unicorn-14124.exe 2856 Unicorn-7461.exe 2856 Unicorn-7461.exe 2708 Unicorn-46797.exe 2708 Unicorn-46797.exe 2604 Unicorn-36796.exe 2604 Unicorn-36796.exe 2972 Unicorn-20268.exe 2972 Unicorn-20268.exe 1928 Unicorn-56470.exe 1928 Unicorn-56470.exe 2556 Unicorn-59604.exe 2556 Unicorn-59604.exe 2508 Unicorn-13206.exe 2508 Unicorn-13206.exe 1724 Unicorn-23990.exe 1724 Unicorn-23990.exe 784 Unicorn-42349.exe 784 Unicorn-42349.exe 1172 Unicorn-30420.exe 1172 Unicorn-30420.exe 2604 Unicorn-36796.exe 2604 Unicorn-36796.exe 3024 Unicorn-16772.exe 3024 Unicorn-16772.exe 2856 Unicorn-7461.exe 2856 Unicorn-7461.exe 796 Unicorn-58494.exe 796 Unicorn-58494.exe 2236 Unicorn-16388.exe 2236 Unicorn-16388.exe 1072 Unicorn-12858.exe 1072 Unicorn-12858.exe 1928 Unicorn-56470.exe 1928 Unicorn-56470.exe 2972 Unicorn-20268.exe 2972 Unicorn-20268.exe 2164 WerFault.exe 2164 WerFault.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2164 2220 WerFault.exe 44 -
Suspicious use of SetWindowsHookEx 62 IoCs
pid Process 2264 37ebb9bb118030efdb5a808805e20cba.exe 2960 Unicorn-35995.exe 2696 Unicorn-26186.exe 2744 Unicorn-29716.exe 2564 Unicorn-14124.exe 2708 Unicorn-46797.exe 2556 Unicorn-59604.exe 1724 Unicorn-23990.exe 2604 Unicorn-36796.exe 2856 Unicorn-7461.exe 2972 Unicorn-20268.exe 1928 Unicorn-56470.exe 2508 Unicorn-13206.exe 784 Unicorn-42349.exe 1172 Unicorn-30420.exe 3024 Unicorn-16772.exe 796 Unicorn-58494.exe 2220 Unicorn-243.exe 2236 Unicorn-16388.exe 1072 Unicorn-12858.exe 1500 Unicorn-23264.exe 2896 Unicorn-52407.exe 1276 Unicorn-13663.exe 3056 Unicorn-63549.exe 1568 Unicorn-29808.exe 912 Unicorn-43299.exe 1496 Unicorn-46445.exe 2428 Unicorn-46253.exe 292 Unicorn-29075.exe 2732 Unicorn-51323.exe 1056 Unicorn-51323.exe 400 Unicorn-13388.exe 2628 Unicorn-31457.exe 1444 Unicorn-28883.exe 2680 Unicorn-31457.exe 1552 Unicorn-45193.exe 2548 Unicorn-2680.exe 280 Unicorn-10586.exe 2988 Unicorn-57670.exe 2032 Unicorn-38602.exe 1220 Unicorn-27351.exe 2672 Unicorn-24004.exe 2316 Unicorn-31457.exe 2512 Unicorn-51323.exe 1976 Unicorn-31457.exe 808 Unicorn-51323.exe 1120 Unicorn-48423.exe 1608 Unicorn-12590.exe 1792 Unicorn-19030.exe 1424 Unicorn-11188.exe 2668 Unicorn-11867.exe 768 Unicorn-61241.exe 2624 Unicorn-60109.exe 628 Unicorn-39013.exe 2460 Unicorn-62274.exe 572 Unicorn-13634.exe 3000 Unicorn-26505.exe 2632 Unicorn-44313.exe 1596 Unicorn-46757.exe 2660 Unicorn-47262.exe 1940 Unicorn-33263.exe 2332 UÅicorn-48442.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2264 wrote to memory of 2960 2264 37ebb9bb118030efdb5a808805e20cba.exe 28 PID 2264 wrote to memory of 2960 2264 37ebb9bb118030efdb5a808805e20cba.exe 28 PID 2264 wrote to memory of 2960 2264 37ebb9bb118030efdb5a808805e20cba.exe 28 PID 2264 wrote to memory of 2960 2264 37ebb9bb118030efdb5a808805e20cba.exe 28 PID 2960 wrote to memory of 2744 2960 Unicorn-35995.exe 29 PID 2960 wrote to memory of 2744 2960 Unicorn-35995.exe 29 PID 2960 wrote to memory of 2744 2960 Unicorn-35995.exe 29 PID 2960 wrote to memory of 2744 2960 Unicorn-35995.exe 29 PID 2264 wrote to memory of 2696 2264 37ebb9bb118030efdb5a808805e20cba.exe 30 PID 2264 wrote to memory of 2696 2264 37ebb9bb118030efdb5a808805e20cba.exe 30 PID 2264 wrote to memory of 2696 2264 37ebb9bb118030efdb5a808805e20cba.exe 30 PID 2264 wrote to memory of 2696 2264 37ebb9bb118030efdb5a808805e20cba.exe 30 PID 2696 wrote to memory of 2564 2696 Unicorn-26186.exe 31 PID 2696 wrote to memory of 2564 2696 Unicorn-26186.exe 31 PID 2696 wrote to memory of 2564 2696 Unicorn-26186.exe 31 PID 2696 wrote to memory of 2564 2696 Unicorn-26186.exe 31 PID 2744 wrote to memory of 2708 2744 Unicorn-29716.exe 32 PID 2744 wrote to memory of 2708 2744 Unicorn-29716.exe 32 PID 2744 wrote to memory of 2708 2744 Unicorn-29716.exe 32 PID 2744 wrote to memory of 2708 2744 Unicorn-29716.exe 32 PID 2960 wrote to memory of 2556 2960 Unicorn-35995.exe 33 PID 2960 wrote to memory of 2556 2960 Unicorn-35995.exe 33 PID 2960 wrote to memory of 2556 2960 Unicorn-35995.exe 33 PID 2960 wrote to memory of 2556 2960 Unicorn-35995.exe 33 PID 2564 wrote to memory of 1724 2564 Unicorn-14124.exe 34 PID 2564 wrote to memory of 1724 2564 Unicorn-14124.exe 34 PID 2564 wrote to memory of 1724 2564 Unicorn-14124.exe 34 PID 2564 wrote to memory of 1724 2564 Unicorn-14124.exe 34 PID 2696 wrote to memory of 2604 2696 Unicorn-26186.exe 35 PID 2696 wrote to memory of 2604 2696 Unicorn-26186.exe 35 PID 2696 wrote to memory of 2604 2696 Unicorn-26186.exe 35 PID 2696 wrote to memory of 2604 2696 Unicorn-26186.exe 35 PID 2708 wrote to memory of 2856 2708 Unicorn-46797.exe 36 PID 2708 wrote to memory of 2856 2708 Unicorn-46797.exe 36 PID 2708 wrote to memory of 2856 2708 Unicorn-46797.exe 36 PID 2708 wrote to memory of 2856 2708 Unicorn-46797.exe 36 PID 2744 wrote to memory of 2972 2744 Unicorn-29716.exe 37 PID 2744 wrote to memory of 2972 2744 Unicorn-29716.exe 37 PID 2744 wrote to memory of 2972 2744 Unicorn-29716.exe 37 PID 2744 wrote to memory of 2972 2744 Unicorn-29716.exe 37 PID 2556 wrote to memory of 1928 2556 Unicorn-59604.exe 38 PID 2556 wrote to memory of 1928 2556 Unicorn-59604.exe 38 PID 2556 wrote to memory of 1928 2556 Unicorn-59604.exe 38 PID 2556 wrote to memory of 1928 2556 Unicorn-59604.exe 38 PID 1724 wrote to memory of 2508 1724 Unicorn-23990.exe 39 PID 1724 wrote to memory of 2508 1724 Unicorn-23990.exe 39 PID 1724 wrote to memory of 2508 1724 Unicorn-23990.exe 39 PID 1724 wrote to memory of 2508 1724 Unicorn-23990.exe 39 PID 2564 wrote to memory of 784 2564 Unicorn-14124.exe 40 PID 2564 wrote to memory of 784 2564 Unicorn-14124.exe 40 PID 2564 wrote to memory of 784 2564 Unicorn-14124.exe 40 PID 2564 wrote to memory of 784 2564 Unicorn-14124.exe 40 PID 2856 wrote to memory of 1172 2856 Unicorn-7461.exe 41 PID 2856 wrote to memory of 1172 2856 Unicorn-7461.exe 41 PID 2856 wrote to memory of 1172 2856 Unicorn-7461.exe 41 PID 2856 wrote to memory of 1172 2856 Unicorn-7461.exe 41 PID 2708 wrote to memory of 796 2708 Unicorn-46797.exe 46 PID 2708 wrote to memory of 796 2708 Unicorn-46797.exe 46 PID 2708 wrote to memory of 796 2708 Unicorn-46797.exe 46 PID 2708 wrote to memory of 796 2708 Unicorn-46797.exe 46 PID 2604 wrote to memory of 3024 2604 Unicorn-36796.exe 45 PID 2604 wrote to memory of 3024 2604 Unicorn-36796.exe 45 PID 2604 wrote to memory of 3024 2604 Unicorn-36796.exe 45 PID 2604 wrote to memory of 3024 2604 Unicorn-36796.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\37ebb9bb118030efdb5a808805e20cba.exe"C:\Users\Admin\AppData\Local\Temp\37ebb9bb118030efdb5a808805e20cba.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35995.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35995.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-29716.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29716.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46797.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46797.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-7461.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7461.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30420.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30420.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1172 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-29808.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29808.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1568 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51323.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51323.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:808 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14577.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14577.exe9⤵
- Executes dropped EXE
PID:648
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31457.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31457.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1976
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43299.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43299.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:912
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58494.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58494.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:796 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46445.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46445.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1496 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-24004.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24004.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2672
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20268.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20268.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2972 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-243.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-243.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2220 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2220 -s 2406⤵
- Loads dropped DLL
- Program crash
PID:2164
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28883.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28883.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62274.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62274.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2460
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59604.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59604.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-56470.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56470.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1928 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16388.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16388.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46253.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46253.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2428 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26505.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26505.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-33263.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33263.exe8⤵
- Executes dropped EXE
PID:2916
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29075.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29075.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:292 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38602.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38602.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13634.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13634.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:572 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16678.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16678.exe8⤵
- Executes dropped EXE
PID:1416
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12858.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12858.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1072 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13388.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13388.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:400
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26186.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26186.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14124.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14124.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2564 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23990.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23990.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13206.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13206.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23264.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23264.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51323.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51323.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-33263.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33263.exe8⤵
- Suspicious use of SetWindowsHookEx
PID:1940
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31457.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31457.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2316
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52407.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52407.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51323.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51323.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10586.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10586.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:280 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48423.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48423.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1120 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-39013.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39013.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:628
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45193.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45193.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60109.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60109.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2624 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13541.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13541.exe7⤵
- Executes dropped EXE
PID:1756
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42349.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42349.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:784 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13663.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13663.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1276 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-2680.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2680.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2548 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-19030.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19030.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1792 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46757.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46757.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\UÅicorn-48442.exeC:\Users\Admin\AppData\Local\Temp\UÅicorn-48442.exe9⤵
- Suspicious use of SetWindowsHookEx
PID:2332
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31457.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31457.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11188.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11188.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1424
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36796.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36796.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16772.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16772.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-63549.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63549.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51323.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51323.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1056 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-57670.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57670.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61241.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61241.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:768 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44313.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44313.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49050.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49050.exe10⤵PID:1512
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31457.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31457.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27351.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27351.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12590.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12590.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1608 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11867.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11867.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47262.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47262.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2660
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60020.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60020.exe4⤵
- Executes dropped EXE
PID:1228
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
83KB
MD5c3d8c6a405591436ad0c922012aa7f85
SHA1d69533750ea7c3e9034fda41cae18954b31dcdcd
SHA25676745a0ba1e5a9bbafd9d73bf685508016b469efeea49fb8b858cd9cd439a100
SHA512ebf1e9882d16119e73feab7a191d74e43d2d8d6063635a2fdfd8d1a0cdb13fd2fc8d3870dd1f514e0501d66ddf3ff70a560a919bb0641b1047af14dbf2ac2590
-
Filesize
184KB
MD5d48a2bb782d60a15a9c763739bc4da10
SHA13a5f7a029892e835b7385e3f53a55ef588d8e9d8
SHA256f7ff2e0340724d1509ca1442a4f67958d8e4571fb2358fffef69d5570dafc633
SHA512c124ccebfddb792483d4dce38230ae8ddd2b835c9cc34b18436e3a34764f3ff05d77b7895093ddedab84e1a3c8c3a9e8046a192587e244ad28e8d9803a28085c
-
Filesize
168KB
MD5ed31dd7be3bf37ee1bf8f2fee10a881a
SHA1da65d9618159765003445beefe6a5f06a48f601a
SHA2567ce83a0ab6b8e7732c4f651ee2290e722e08d77ded03873b234b676f37b1438f
SHA512dcc632f2e59bdd4c4efbe4aab7861a0cc48da0b04ba585f29e2cd269c4fbe52c89119533697095d38bd8c8074e2e5f5587a0465d638a2ec5b21705d3d049403b
-
Filesize
184KB
MD59a6fb324e2bd5877b5a4deb49a7fd235
SHA10060938be09bb3b1b7469bff7e821adc9e8295a6
SHA256dcb47c762e87361aa68ba83e1c82a3065bf80d1dff907307cec148cadb4173d8
SHA512ba6093e1a7350fc3ae47760cfd4416ab451dbf98ee32cb4425d618d53a821e0caf6087c5ab7aa8f53d4c30653b3971bc13dc07dd96a36a34c02004bf14b7db06
-
Filesize
38KB
MD50b7de051efe1032e398549a19ab803c6
SHA1be050307fdb874074445a7aee5e80db560bcc8be
SHA25696863efaeb54748c2d29e1230d4a3cbcfdc243586d0633618880995a884cf613
SHA512e501c937dddc116a81188560a832e18821e7f54efbc189ef7407619424a02702787c58022384eafbeec8d630d5511e48aba8c6154cdffe10a02bdf19985cfd3c
-
Filesize
184KB
MD59a6098cf398e8cf563b50d62b103db68
SHA10db088bee73a427ff6774e420eb582390a32ac4f
SHA2566ebd183838eba5d7361604f11f7ce56e20e7f17b1dbe427de8b8184ab91a10dd
SHA5128aecf52ebee6a8d604fd6c082a11d89ee3d1cc0d63f339bd7bde4b52dac1e6ec00d2ca0a0e7209cfdc36a7fdf7ef2712b22b4552512a33103b21c2d47a567523
-
Filesize
184KB
MD5486d3ad4d8dae46f014fd527aa21fad2
SHA134b709bb8b4cbb839d15c3c9abf32533bd1db16a
SHA256c44d30306ab689710ac31b683626894c3f363625d12b7ee147f179b1cd6e9a1f
SHA512399f7bcd3cfa68422873971a04f8d3cd92701d105b2b0a1c71f528ddfbeb8b5c15e965ceab8054ba02e9b16e21c86d93384ecc5adc856feeae861ef681cb230c
-
Filesize
79KB
MD532a220dbc88beff7c93ae311de930945
SHA1e2709521990eaebe6ecb65662245780ab006f47e
SHA25620b518aac22d32ebe8ac048d8a07d50cb7a3ba5cfac0d4ff52df10390a260550
SHA5126493c7ffede1cde1d35b71104f9b0e77076f9b185bf3a8fa972a12bd4ca1fecc6750baff0615065b5b0f20d2bde8a388f335e111fc532a9cd3a38eb2458ab06a
-
Filesize
27KB
MD5b5f00f8bb382ef04d479bc9ea3d22912
SHA12202400348e29928dac6a63c8293c14d06c9a4ce
SHA25626ecc1750835e0ae8dfc4ac021bbbe62aa5539d54d2fc028c4b22cbf3594e230
SHA5125085fa982cbf6945968ae20dd977d534613667c6e230c029c8f1eaec18ce71323db81a7e8cacce6816f2fb0cb1653231813bb7ea3f7795bf229abed07f24d0ca
-
Filesize
184KB
MD51811b5148ca8868bc29ad153b1354bc8
SHA1d77e8d5964fc65fe9f178c341ba6720e396eb45b
SHA2562e1bbe4726fbad03f78af64fd6f0c465501b5458c1d7dfdbb871cf015a7ca2b5
SHA512540fd2d812c3a3eafa5caea487b91668da0c88f7b7e6d185c982753a4a7fc77770896bdc2a4805d649b6b5bb3d700140294b1d3ca24ccf4104847dab2ce25f73
-
Filesize
184KB
MD54fd63df0f8579fda84701fb82052e09b
SHA1f0f6b883bfdee53ca58781efa3c7b262b1d8b6f7
SHA256c435ae451394e62c62e22d726ba8d57a3c38e8f7f12c8b1cb5b3a1a52903dfb6
SHA5123242b56c86a902712f6e3db8a6871bce42e396292bc834999195fabc1d510225a41ec010ec3b9fb50f7a39d01c05e2500ef2abf6b810a7902a6c40357736fb75
-
Filesize
84KB
MD5260d32fba7e60826ec66a298f67cc1b6
SHA1a9d51b71c915643c8c15314f9f5ca62783db194b
SHA256841f1530ccd5f0115ecd74fd3b57262975182e4aca3c507d6a4410ca65231d8c
SHA512f6b4b131557b378925b88cd8111d26b08d12d48f47aa0b6cd5c8462e7da0802167554a344a84fb1b4d8b55243b5e90647bb722b147b9c59529528ac3f5ae0b03
-
Filesize
92KB
MD5539347003ae0ff7dcc460deaac2a048e
SHA1d040ac279c0fb7f92ea05f9d26634f1897650df9
SHA2568c51a41e29adf3c05eef622141bd3b27db3b0d6686880475a6bd8001b01054fa
SHA51205d01f7c4b30f5ccf1aca1060e15231dc303ff926c73ef678e77c2610ebbf6ccc4ce70e39fc8b1c2e858f2eb8bf8b1b103485cc8a83aa383a71bd1c96ae533b2
-
Filesize
184KB
MD583420869bd22c8bffb96f0c1e20bdcf3
SHA125bb98b31b931dc77b515c7ec39f2691e079a9d8
SHA256ceac543333470e046df30d1dbe259bbd3ec146ecb2343043a29771873b983881
SHA512a64273b0f507a843fe5394ed036679393c82dbac150a63435fd44d96d62747daf0d3acc82e8fe8352280fa41a67cff1a972244169ec17bb105b3d2c2dda469c5
-
Filesize
174KB
MD598f4c904facfbbe0f6185b8de30527d2
SHA18f3a941b03c24189c92f8ea131892d61c7354285
SHA256bf6a1ca1ace89bb14d0caff603b634b12ddfd6d10906269239df8a8762c42af4
SHA512a34324ffc379a7977beaa201cd628f049f81104d00aeeae328a3b235ee762f3be213688178f8be7c40fa82c8f9ff65f9a6932a8c99fff06c867d599ae5880a27
-
Filesize
142KB
MD598a1e95e8f6db0a6919b7fbd3c35edbf
SHA1cc8fd1834f7df9b871e46d235a2a558cb4c9ad93
SHA2561ebf2141a16d78785bac15a7ea4d306be50d90f8047b9c2339629b1d3b98de85
SHA512623f7bfae930e79a474ccd107de11f23875de00f3505039f2b982e78a140e8ebecd2cb13839e99e78c1c6a6aff93615b7660ea0cdfdb86da592ffec18f8e09ed
-
Filesize
184KB
MD56c3adafa7ef44481cca0aa53d16c7df4
SHA1b13f0b65efb7772afe537c438d59c103cf1f35fa
SHA256f2e3620fd2f6695c598768b202ccee2297c211bfdca8e51bd5b1109fff856915
SHA5127fb5b9378288227f69b86462ad4d55a5b7edd5f3f0898c2866d30817e632c578f060727f2fb45da16014d1761fc521b4f3fd9fa5ebefd9fe3b3c1ecdf15273c8
-
Filesize
184KB
MD5b7b08044d3ab18f5e553811e868ace41
SHA1c2a4aff8e819672856cd045e5ab50b90c6563723
SHA2560f656419f9d0033157714e1c26a3dec3500133789a51451aa940cbbd0ecd5ba0
SHA512081e5862bb7cdc6d09cf3d85b29fad3a65ec4f427a3c237fb729c20ff04ababd6c6ac88cee52e6951e2f6cb693767459fb8aa0b94d11008e377ac4020ec6c201
-
Filesize
45KB
MD546b485b615caf850d1736fe1388b405a
SHA1104f534e5734155b1a45adee0520e94cf1998a00
SHA256e4a98c73628b98c70b7b785d58f4c7e844e526889525b04b1ab27fc6309ac4b5
SHA512d09b22c5ebd2f365d5d16b893e335055024eaa794d65d543f445559b948fe27f422edb22cc45a7588d546a83c36058647c50c855cc94cb050a41e685b17438dd
-
Filesize
29KB
MD541f3383eb54547663bf801869d8e294d
SHA1639be30e7363dee9fe307b40b7904879ed72e018
SHA256221b45f8e24a5d2782a5d5740718ed090ffa8f61c67401ba79b0492526f8478f
SHA512eeb2e914469728ec417f8b9b000ea90f9c7f538325774081ffae8b5585a07c0567bd44b42d40ea1250e196059ede8464b95a8150354951fe9d597586dda21967
-
Filesize
58KB
MD5e1174b494a3edbf23b5863e7484d6a85
SHA17c8a93fd2c444b3db0b27d52a876d5ae63226d55
SHA256e055828a3735432e92df5100d5ec0bebc1c98138998b711cab49604288cd9bd7
SHA512df53e71b9fa26726e89c75d6467a5c0e8eed297b47cc2a99512202ce566e48bdafd2d57e941f9d5e4b1690b12c6a28714dbedf1aac1d35e09a433768cc81577b
-
Filesize
109KB
MD5381ba1e3bfbfbd5ec830f0c2f3c67b98
SHA168c906eea060ff0796e286292d0bc3f276b07600
SHA256b6f24de14c4bb7cead11c3f4aa0a0719d45ed18e2c3323863054211506a04b12
SHA512c5437073d5e7627c44d047cecd34201b8ac2298e37b73b40b2f429617ab43065fc8bfac5c991303e0c9b848f6a18cc1a7963c77633b3e837a95c498544585fe7
-
Filesize
113KB
MD566dc5809f4c63a10b39bc5a541cf0434
SHA1872a68d810f2e297a6da82b25e7813fe85b3b4b2
SHA25676229add29332fe6efad7ce1ff6a6cb60e239eb144749217231777c97fe8531b
SHA5126f72661353ea4e088c80e42a040d5de7e9a53b0faa881e8d0fe24854f92ab5ded2d71fbd81c04e578d1d9cd8de595d89b91c07108a2b29109bd78cb969e4770b
-
Filesize
45KB
MD5bcdab293e2630546ce4aa5a02e059e02
SHA1fec963cca0da3e551fe71e1322cfb50c62513fdc
SHA2560c6272cf396f6791702a2a69ff108444449898649d6dd5aedfab5959bd98189e
SHA51247b9b62b56a4ec363a7efb8312a96a7fbc211dcff80befe5fa41710c02e2ca96783af5f7b659b90d0e99e2b00ff98efc682a37358d37b749fb12516f6cd51e0c
-
Filesize
184KB
MD5fcc01ce577142e04b4dff3a02fe3962f
SHA12d959023b6f08dd2905d3985066c25887eae4d60
SHA25652b5e250a6c4f5eeb25bf1f84398a630bc018e63d54fbf248d90b72a419ef007
SHA51268d2e934e043939c4b86f8db748882a4153e05ef938ee9af65b980a90add04f5fde99ac3124f173b556bbd630acb56164f9f4b5c097f9e35400d0ea78687f6a6
-
Filesize
184KB
MD50e68082253183f420d353d001ade9dd0
SHA1a2741eaa980b606cff2464b8ad67d9c329541a3a
SHA2564a1c5b1ea25566bbedc10960c7c65e5863a3c4d4487616c94d73adc8010ace29
SHA512aa204dcc395d889dc1ddbb1aed32aff879dbd06d88723ad0d755903a7676e5b584ef1b67f4f75612625f009fd0f1c76da9b506fdeb41073f14c8ee41bd30de77
-
Filesize
141KB
MD5160aaae1fc791aa96dc228302516ce73
SHA11a2d59b447ae3855108281492d223620acdc8e62
SHA2562d5daada3f6eecb53f35a40dfa016b9934b5188ecbd321914803a11dbf2cb580
SHA512befc2e0ec051863a3ae4b460e269490fc5024e806572f6ff8fffa2b8c57640de3caa19a4f99d779090d4adecf837f833dfc8547ea49b4d9bb73e801af40114a0
-
Filesize
184KB
MD501b1d78e7eb430d943a8708017432e56
SHA15442d4ae5e520689f7482f22d6d0e43769732018
SHA256b4ba9a97906aa09e205688eacfc6a56db4c9a93fa0d35324e9a1fd67686a2f60
SHA512b560ea0df14c1ae63e94c768cdd5f8dc38ab56151c7fa133134ef5875dc2ba3270f3b917903a988b2b91dbe22ab11cb39318d29e9c54751e21425d8852f0bf64
-
Filesize
184KB
MD5be2933e026a40681aae40afd421e7a87
SHA1d2cfb657d97671aa98b194c9b8b526da3003a526
SHA256eec9d4fc89d0113325fb98bb965c3aac0106ff7edf525401e81dad528ae8c9e6
SHA512c3ba74cafcde83941cbf115f85b8c65437cd7923406aef31fa48b8401bbcd9998a888bf0b4caf4be0753f5bbab3d6dc447e492552d97485ec534e99132202fc4
-
Filesize
72KB
MD5591b218b960b871ed8a3515a56d359e5
SHA1aa20ea64bc0c18028e5ba7963668871a20fff0e7
SHA2567e76a7e789f7e6d1bcf5d733f357739ef5931b3999c6f2b478ef84b1b59eb96b
SHA512d2864f1afdc92adf4198a77c449541029c97020b11c4f05b3c9660aa50a666a7ad07e9519f503ac93dda99ef9a8c9f6361c04eeed07d8dcccea2ee8a9b79fd25
-
Filesize
36KB
MD5a1b490be7ee4a8b5a14dcf5906da787e
SHA14c55f20eccd1420b204193eb207ea02fbe401c75
SHA25656ed7c16199eb9b9722b9d9ed5992a5bae688dfe58d54a71bf1d49f777d0b746
SHA512bb8157b4f60eeae1d3db528f478db1fe5c6ebb5ea71c40423f39c965e0a12e34fd513827cfffb0587a30451da18cf6deba37ca1aed55eb0fe05aebec3725d778
-
Filesize
184KB
MD5af7af0e131cbc0fa8249f8705bed692a
SHA185f6cb2e0afed5c460d53119e36f1006a0c7b3d1
SHA256f34ecb444e31a83af993ea9896b4bdcde8a2145482d3d2241a1967d709cfc552
SHA512937ebcd5562667387044fdeb6d61a9ba6492cf4fd92bc2fb308e70b4d3e17cacc01d7d770655f9eba543debd9ee620273ff241cfb51163d7a8e88325eeed1e42