Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
50s -
max time network
132s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01/01/2024, 01:35
Static task
static1
Behavioral task
behavioral1
Sample
3b8f0c52e61db9389506323003634b77.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3b8f0c52e61db9389506323003634b77.exe
Resource
win10v2004-20231222-en
General
-
Target
3b8f0c52e61db9389506323003634b77.exe
-
Size
184KB
-
MD5
3b8f0c52e61db9389506323003634b77
-
SHA1
5db6d7bddddc0a21cc3fff9e559ef04ad2f0cbfb
-
SHA256
16c3f8daae7b438859da9221fe07d22217f7cae34640cd5ea4395e3ce241a735
-
SHA512
e018577baaf828abacf20fea13b38f147754313c13cd2b8d5553c7a51d4acd3fdbbd6c033bd745c26de7785a4bbbcbd3cd040cb2c61d2717cf3d77fdefeababb
-
SSDEEP
3072:huRromuxcOAEAmjkMhmrC8PMEXYMuxGldk7xKDCeVylPvpFv:huhowDEAbMYrC8IyBDylPvpF
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2660 Unicorn-46313.exe 2780 Unicorn-25365.exe 2696 Unicorn-57248.exe 2592 Unicorn-63394.exe 2740 Unicorn-44053.exe 2620 Unicorn-63939.exe 1672 Unicorn-65025.exe 2656 Unicorn-18674.exe 1368 Unicorn-4060.exe 1612 Unicorn-49732.exe 1556 Unicorn-60972.exe 532 Unicorn-56983.exe 2848 Unicorn-3734.exe 1484 Unicorn-62603.exe 1376 Unicorn-11835.exe 1352 Unicorn-2027.exe 2180 Unicorn-22940.exe 1744 Unicorn-3369.exe 2276 Unicorn-42806.exe 2468 Unicorn-53160.exe 1388 Unicorn-27150.exe 960 Unicorn-50615.exe 1088 Unicorn-55576.exe 1080 Unicorn-44471.exe 2520 Unicorn-63153.exe 3064 Unicorn-53672.exe 3036 Unicorn-8000.exe 2652 Unicorn-9889.exe 3024 Unicorn-61999.exe 2156 Unicorn-22337.exe 2484 Unicorn-61864.exe 1972 Unicorn-2910.exe 2304 Unicorn-16645.exe 2804 Unicorn-22776.exe 1696 Unicorn-22776.exe 2252 Unicorn-22776.exe 2756 Unicorn-53310.exe 2008 Unicorn-7638.exe 2640 Unicorn-61935.exe 2612 Unicorn-12599.exe 2172 Unicorn-37076.exe 2884 Unicorn-42364.exe 1876 Unicorn-4689.exe 1768 Unicorn-7237.exe 3032 Unicorn-34455.exe 2152 Unicorn-27980.exe 524 Unicorn-52388.exe 536 Unicorn-44843.exe 2556 Unicorn-17977.exe 2860 Unicorn-2264.exe 2384 Unicorn-44182.exe 1820 Unicorn-15989.exe 2340 Unicorn-52615.exe 560 Unicorn-14055.exe 2020 Unicorn-44538.exe 2464 Unicorn-2935.exe 1668 Unicorn-64876.exe 1796 Unicorn-64876.exe 1304 Unicorn-49251.exe 2416 Unicorn-7598.exe 2240 Unicorn-14319.exe 1756 Unicorn-16868.exe 1732 Unicorn-48326.exe 2772 Unicorn-16395.exe -
Loads dropped DLL 64 IoCs
pid Process 1736 3b8f0c52e61db9389506323003634b77.exe 1736 3b8f0c52e61db9389506323003634b77.exe 2660 Unicorn-46313.exe 2660 Unicorn-46313.exe 1736 3b8f0c52e61db9389506323003634b77.exe 1736 3b8f0c52e61db9389506323003634b77.exe 2780 Unicorn-25365.exe 2780 Unicorn-25365.exe 2660 Unicorn-46313.exe 2660 Unicorn-46313.exe 2696 Unicorn-57248.exe 2696 Unicorn-57248.exe 2740 Unicorn-44053.exe 2740 Unicorn-44053.exe 2620 Unicorn-63939.exe 2620 Unicorn-63939.exe 2592 Unicorn-63394.exe 2696 Unicorn-57248.exe 2592 Unicorn-63394.exe 2696 Unicorn-57248.exe 2780 Unicorn-25365.exe 2780 Unicorn-25365.exe 1672 Unicorn-65025.exe 1672 Unicorn-65025.exe 2740 Unicorn-44053.exe 2740 Unicorn-44053.exe 2656 Unicorn-18674.exe 2656 Unicorn-18674.exe 1368 Unicorn-4060.exe 2620 Unicorn-63939.exe 1368 Unicorn-4060.exe 2620 Unicorn-63939.exe 2592 Unicorn-63394.exe 2592 Unicorn-63394.exe 1612 Unicorn-49732.exe 1556 Unicorn-60972.exe 1612 Unicorn-49732.exe 1556 Unicorn-60972.exe 532 Unicorn-56983.exe 532 Unicorn-56983.exe 1672 Unicorn-65025.exe 1672 Unicorn-65025.exe 1484 Unicorn-62603.exe 1484 Unicorn-62603.exe 2656 Unicorn-18674.exe 2656 Unicorn-18674.exe 2848 Unicorn-3734.exe 2848 Unicorn-3734.exe 1376 Unicorn-11835.exe 1376 Unicorn-11835.exe 1368 Unicorn-4060.exe 1368 Unicorn-4060.exe 1744 Unicorn-3369.exe 1744 Unicorn-3369.exe 1128 WerFault.exe 1128 WerFault.exe 1128 WerFault.exe 1128 WerFault.exe 1556 Unicorn-60972.exe 1556 Unicorn-60972.exe 2276 Unicorn-42806.exe 2276 Unicorn-42806.exe 2180 Unicorn-22940.exe 2180 Unicorn-22940.exe -
Program crash 5 IoCs
pid pid_target Process procid_target 1128 1352 WerFault.exe 42 1628 2180 WerFault.exe 45 1728 2504 WerFault.exe 104 2832 2944 WerFault.exe 97 2576 1820 WerFault.exe 82 -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1736 3b8f0c52e61db9389506323003634b77.exe 2660 Unicorn-46313.exe 2780 Unicorn-25365.exe 2696 Unicorn-57248.exe 2740 Unicorn-44053.exe 2620 Unicorn-63939.exe 2592 Unicorn-63394.exe 1672 Unicorn-65025.exe 2656 Unicorn-18674.exe 1368 Unicorn-4060.exe 1556 Unicorn-60972.exe 1612 Unicorn-49732.exe 532 Unicorn-56983.exe 2848 Unicorn-3734.exe 1484 Unicorn-62603.exe 1376 Unicorn-11835.exe 2276 Unicorn-42806.exe 1744 Unicorn-3369.exe 1352 Unicorn-2027.exe 2180 Unicorn-22940.exe 2468 Unicorn-53160.exe 1388 Unicorn-27150.exe 960 Unicorn-50615.exe 1088 Unicorn-55576.exe 1080 Unicorn-44471.exe 2520 Unicorn-63153.exe 3064 Unicorn-53672.exe 3036 Unicorn-8000.exe 2652 Unicorn-9889.exe 2156 Unicorn-22337.exe 3024 Unicorn-61999.exe 2484 Unicorn-61864.exe 1972 Unicorn-2910.exe 1696 Unicorn-22776.exe 2804 Unicorn-22776.exe 2304 Unicorn-16645.exe 2252 Unicorn-22776.exe 2008 Unicorn-7638.exe 2756 Unicorn-53310.exe 2612 Unicorn-12599.exe 2640 Unicorn-61935.exe 2884 Unicorn-42364.exe 2172 Unicorn-37076.exe 1768 Unicorn-7237.exe 1876 Unicorn-4689.exe 3032 Unicorn-34455.exe 2152 Unicorn-27980.exe 536 Unicorn-44843.exe 524 Unicorn-52388.exe 2556 Unicorn-17977.exe 2860 Unicorn-2264.exe 2384 Unicorn-44182.exe 1820 Unicorn-15989.exe 2020 Unicorn-44538.exe 1796 Unicorn-64876.exe 1668 Unicorn-64876.exe 2464 Unicorn-2935.exe 560 Unicorn-14055.exe 1304 Unicorn-49251.exe 1756 Unicorn-16868.exe 2416 Unicorn-7598.exe 2240 Unicorn-14319.exe 1732 Unicorn-48326.exe 2788 Unicorn-60981.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1736 wrote to memory of 2660 1736 3b8f0c52e61db9389506323003634b77.exe 28 PID 1736 wrote to memory of 2660 1736 3b8f0c52e61db9389506323003634b77.exe 28 PID 1736 wrote to memory of 2660 1736 3b8f0c52e61db9389506323003634b77.exe 28 PID 1736 wrote to memory of 2660 1736 3b8f0c52e61db9389506323003634b77.exe 28 PID 2660 wrote to memory of 2780 2660 Unicorn-46313.exe 29 PID 2660 wrote to memory of 2780 2660 Unicorn-46313.exe 29 PID 2660 wrote to memory of 2780 2660 Unicorn-46313.exe 29 PID 2660 wrote to memory of 2780 2660 Unicorn-46313.exe 29 PID 1736 wrote to memory of 2696 1736 3b8f0c52e61db9389506323003634b77.exe 30 PID 1736 wrote to memory of 2696 1736 3b8f0c52e61db9389506323003634b77.exe 30 PID 1736 wrote to memory of 2696 1736 3b8f0c52e61db9389506323003634b77.exe 30 PID 1736 wrote to memory of 2696 1736 3b8f0c52e61db9389506323003634b77.exe 30 PID 2780 wrote to memory of 2592 2780 Unicorn-25365.exe 31 PID 2780 wrote to memory of 2592 2780 Unicorn-25365.exe 31 PID 2780 wrote to memory of 2592 2780 Unicorn-25365.exe 31 PID 2780 wrote to memory of 2592 2780 Unicorn-25365.exe 31 PID 2660 wrote to memory of 2740 2660 Unicorn-46313.exe 32 PID 2660 wrote to memory of 2740 2660 Unicorn-46313.exe 32 PID 2660 wrote to memory of 2740 2660 Unicorn-46313.exe 32 PID 2660 wrote to memory of 2740 2660 Unicorn-46313.exe 32 PID 2696 wrote to memory of 2620 2696 Unicorn-57248.exe 33 PID 2696 wrote to memory of 2620 2696 Unicorn-57248.exe 33 PID 2696 wrote to memory of 2620 2696 Unicorn-57248.exe 33 PID 2696 wrote to memory of 2620 2696 Unicorn-57248.exe 33 PID 2740 wrote to memory of 1672 2740 Unicorn-44053.exe 34 PID 2740 wrote to memory of 1672 2740 Unicorn-44053.exe 34 PID 2740 wrote to memory of 1672 2740 Unicorn-44053.exe 34 PID 2740 wrote to memory of 1672 2740 Unicorn-44053.exe 34 PID 2620 wrote to memory of 2656 2620 Unicorn-63939.exe 35 PID 2620 wrote to memory of 2656 2620 Unicorn-63939.exe 35 PID 2620 wrote to memory of 2656 2620 Unicorn-63939.exe 35 PID 2620 wrote to memory of 2656 2620 Unicorn-63939.exe 35 PID 2592 wrote to memory of 1368 2592 Unicorn-63394.exe 38 PID 2592 wrote to memory of 1368 2592 Unicorn-63394.exe 38 PID 2592 wrote to memory of 1368 2592 Unicorn-63394.exe 38 PID 2592 wrote to memory of 1368 2592 Unicorn-63394.exe 38 PID 2696 wrote to memory of 1612 2696 Unicorn-57248.exe 36 PID 2696 wrote to memory of 1612 2696 Unicorn-57248.exe 36 PID 2696 wrote to memory of 1612 2696 Unicorn-57248.exe 36 PID 2696 wrote to memory of 1612 2696 Unicorn-57248.exe 36 PID 2780 wrote to memory of 1556 2780 Unicorn-25365.exe 37 PID 2780 wrote to memory of 1556 2780 Unicorn-25365.exe 37 PID 2780 wrote to memory of 1556 2780 Unicorn-25365.exe 37 PID 2780 wrote to memory of 1556 2780 Unicorn-25365.exe 37 PID 1672 wrote to memory of 532 1672 Unicorn-65025.exe 39 PID 1672 wrote to memory of 532 1672 Unicorn-65025.exe 39 PID 1672 wrote to memory of 532 1672 Unicorn-65025.exe 39 PID 1672 wrote to memory of 532 1672 Unicorn-65025.exe 39 PID 2740 wrote to memory of 2848 2740 Unicorn-44053.exe 40 PID 2740 wrote to memory of 2848 2740 Unicorn-44053.exe 40 PID 2740 wrote to memory of 2848 2740 Unicorn-44053.exe 40 PID 2740 wrote to memory of 2848 2740 Unicorn-44053.exe 40 PID 2656 wrote to memory of 1484 2656 Unicorn-18674.exe 41 PID 2656 wrote to memory of 1484 2656 Unicorn-18674.exe 41 PID 2656 wrote to memory of 1484 2656 Unicorn-18674.exe 41 PID 2656 wrote to memory of 1484 2656 Unicorn-18674.exe 41 PID 1368 wrote to memory of 1376 1368 Unicorn-4060.exe 46 PID 1368 wrote to memory of 1376 1368 Unicorn-4060.exe 46 PID 1368 wrote to memory of 1376 1368 Unicorn-4060.exe 46 PID 1368 wrote to memory of 1376 1368 Unicorn-4060.exe 46 PID 2620 wrote to memory of 1352 2620 Unicorn-63939.exe 42 PID 2620 wrote to memory of 1352 2620 Unicorn-63939.exe 42 PID 2620 wrote to memory of 1352 2620 Unicorn-63939.exe 42 PID 2620 wrote to memory of 1352 2620 Unicorn-63939.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\3b8f0c52e61db9389506323003634b77.exe"C:\Users\Admin\AppData\Local\Temp\3b8f0c52e61db9389506323003634b77.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46313.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46313.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-25365.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25365.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-63394.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63394.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-4060.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4060.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1368 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11835.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11835.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1376 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-63153.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63153.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-4689.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4689.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1876 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60981.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60981.exe9⤵PID:2600
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31368.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31368.exe10⤵PID:2368
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32490.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32490.exe11⤵PID:2496
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34455.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34455.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3032 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16868.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16868.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1756
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53672.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53672.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37076.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37076.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58433.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58433.exe8⤵PID:2944
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2944 -s 2409⤵
- Program crash
PID:2832
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22940.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22940.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22337.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22337.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-7237.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7237.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-4753.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4753.exe8⤵PID:2880
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46869.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46869.exe9⤵PID:2320
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41175.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41175.exe10⤵PID:688
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46734.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46734.exe8⤵PID:1084
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2180 -s 2366⤵
- Program crash
PID:1628
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60972.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60972.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3369.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3369.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-8000.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8000.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3036 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27980.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27980.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-83.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-83.exe8⤵PID:1680
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52388.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52388.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:524 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-32783.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32783.exe7⤵PID:1492
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9889.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9889.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-42364.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42364.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49939.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49939.exe7⤵PID:2504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2504 -s 2408⤵
- Program crash
PID:1728
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45755.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45755.exe7⤵PID:2348
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44053.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44053.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-65025.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65025.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-56983.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56983.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:532 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-53160.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53160.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22776.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22776.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15989.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15989.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1820 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1820 -s 2409⤵
- Program crash
PID:2576
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44538.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44538.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2020 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10776.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10776.exe8⤵PID:1660
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38774.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38774.exe9⤵PID:1088
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2910.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2910.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44182.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44182.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-57519.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57519.exe8⤵PID:532
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27150.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27150.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22776.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22776.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58433.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58433.exe7⤵PID:2784
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55639.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55639.exe8⤵PID:2612
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16645.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16645.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2304 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60981.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60981.exe6⤵
- Suspicious use of SetWindowsHookEx
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30879.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30879.exe7⤵PID:2216
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3734.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3734.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44471.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44471.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1080 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61935.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61935.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-52615.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52615.exe7⤵
- Executes dropped EXE
PID:2340
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14055.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14055.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:560
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12599.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12599.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-63529.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63529.exe6⤵PID:3044
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14850.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14850.exe7⤵PID:1008
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57248.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57248.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-63939.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63939.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18674.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18674.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62603.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62603.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1484 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50615.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50615.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:960 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22776.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22776.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-64876.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64876.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1796 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-25944.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25944.exe9⤵PID:2284
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1391.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1391.exe10⤵PID:2724
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7598.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7598.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2416
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53310.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53310.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-2935.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2935.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2464 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49825.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49825.exe8⤵PID:320
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55576.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55576.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1088 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-7638.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7638.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-64876.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64876.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51375.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51375.exe8⤵PID:2068
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49251.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49251.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1304 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3610.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3610.exe7⤵PID:2056
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2027.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2027.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1352 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1352 -s 2405⤵
- Loads dropped DLL
- Program crash
PID:1128
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49732.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49732.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-42806.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42806.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61999.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61999.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44843.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44843.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:536 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-20638.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20638.exe7⤵PID:2872
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17977.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17977.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14319.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14319.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17607.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17607.exe7⤵PID:1888
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62512.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62512.exe8⤵PID:2868
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37653.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37653.exe6⤵PID:628
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61864.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61864.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-2264.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2264.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48326.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48326.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23091.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23091.exe7⤵PID:2452
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14155.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14155.exe8⤵PID:268
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16395.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16395.exe5⤵
- Executes dropped EXE
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-2775.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2775.exe6⤵PID:2800
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3784.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3784.exe7⤵PID:2172
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD5aed23ffb4f341f1751bd2d14cb412578
SHA1dc7cd308092aa3e6af632766ca3ea8e7d6fa2864
SHA2564d6a23f4914865ab92e40fbc94d8a2471dcb5ddb01d28ac8c83448307c6ebe47
SHA512a650e56eaf48320b6b2b7be1ffe9bca8fe4b11c67e7b0e9c5d275ab15cbbc1b90fd3179d752519beabad9bb0e4b90a2402240bd30554f5ba553938438f9ae92b
-
Filesize
184KB
MD5e2ecdc2a171e9516c9adb7509e182eb1
SHA14ec9614fd04274d11386856d0f5b78513ada60c6
SHA2569914132fc3fcfafd84bbfc3de9b26817ce669fdaeeb20a5d634ce02b646d43d3
SHA5124eef97f45fe9f9c74686c973602d9d2816c13bdcec76485122ac6b91a120f6b9faa7749baebc2f1fbf8b650459e76a66bbbf54555e9ea706caa79e6145c78f18
-
Filesize
184KB
MD5d50946d8c8ec07dd3fe82c25799fcd92
SHA1bcf20de568f557a935e20f2c04558c17af98a125
SHA2564c8a4306e203db83d1ccf398223dd2ed9b568ff6b342760ec2ece3ccbd7d7a8c
SHA5128d78ac70f284f7ee0ba62d5153d93f1fe82232ff03135f3807e8eb8995f3b891d781588f9067e872ebe5bd3f363d5ee539460cb685a2cc77c8e1b8d9b69db540
-
Filesize
184KB
MD5bf78e2bccdee1c897ef66d78b9e1271e
SHA17e63a2e8c6e87b58b5ff120b200e67c3fe9d6da3
SHA25624d33864b41b08055041985d678b87591336038cc4ef5a2fc0396793c499221f
SHA512f093ffc941faae705177bd6daafc72e1ec82ecddd8f34fdad3c44984c91988a664ecfb346fb99fe8890327db74139711b9e692af7f3c6591031afdc9f8aa664a
-
Filesize
184KB
MD5fd9a6a7ab54cd6c79afda7099dd2dada
SHA1ee4ede33c6318608e1f5ea820a26311bc43d1338
SHA2566b273278255f6427c7a85235fb0c84a47144cbaddcffd50313d30a202a9e47ff
SHA512dcc361a44ae58c8d330ab56a538ebfe13e87698d2b3e67cd18d7cbbef71c856b88b395a68c3609b475e2d514e858d8681150031d29722b20ea670f1f6a2e818e
-
Filesize
184KB
MD5ae06fb1a1aead7c9d75b0514926b9831
SHA16cf667e3a6c0044027cbbe9927c403bffaeb98fb
SHA25641872902369662b6fd736a66dd3ec332d6e05e97d8fef90548d7dd6e16aa2556
SHA51219ec203d344971e67145b4bb4c472bb31b5932e90a51b6704e658735eca40580fba485c319842e75a84cf1c65804e21a613f04dcd2532444992449cb4e5f3e64
-
Filesize
184KB
MD5bf1680f24075175d262775efc046aeb0
SHA1ffd6e2c3d6058d8d477430cca0e94119a005afd0
SHA256ce293440c63458cdb85b673a04df62c28e8683ea4fe6ac5d8a219c79d2f265d8
SHA51298ed501d2b9301424107c048ce43c3719f4705cb8ba6e4465e07bdc453cd87121ee61d63d42309ca4608e9f1b28fbc24666c27379c862fc0d6d85af996e34ca6
-
Filesize
184KB
MD558f9125195de2ac254e22b1a6e1d781f
SHA1f26cbfafa5220bcc2fc598c711e9a860fb196a34
SHA256e746c0e0427276239679fc9c1dc8ae584d6d8dd708e9bdb8f469c1c16fb7d4d8
SHA512480e1002a34390032cec9c2219a00c1bc683a90edbea9e548e4ee478624d894d7b167caac2d44802096c0493f8a3c28bce8b9881962e3dfaec9a1d083179a541
-
Filesize
184KB
MD5c1e71561448a577e5beeb7a99882da02
SHA1e2c60c5ab860c9a2a913ff37cd49b084534e2541
SHA2564eff1e494a9b2c42083e27ba57612ed473c4a53ab9d833ead7597e9973e4ba13
SHA5124cf7e6ac0b4af1f71a780c00b8351281a2f5c890655c0af2d9ac090009c7afdf3793e1cd008a6f9a007357bb7a4ade7ef66e7a7075acca6cb4d1b2cfda0037f8
-
Filesize
184KB
MD53129e1660e0a57e9cef09b90d6135911
SHA116462d79ecd5a18f714bfcbad9a76a1f6b7aedbb
SHA2560b6d821e67619dc3096027c321c88f32b55c2f5d6af991ae42ff4bac769572c2
SHA51217bef1c0b58897fbb617d3bfa83939313f81790aee024d7754831d15a615dbc5720fb17cfc67d661d77f556655e2944b79b7c8fd9ab401b1c10e8ce3618b1223
-
Filesize
184KB
MD59450a5d761fc47e812c57820329b7c31
SHA1c3d7647e36a2d82ff7ee823f851afd0f02fdb135
SHA25678d767a0e00e89b2ed5ac80d6ac33e2cb2949be316080bd2c1426a6d1d8471dd
SHA512331c494ec2de510ac4a4e497248de80c607c91013c9dc1b88d0b9c2d095b0a82859ec93c33b9b247fa91564b4d2aca01b2e599780256e0356bee6fa024db9c8f
-
Filesize
184KB
MD5d84a4d12cdfd459cddcc7730267cab0b
SHA19084e00725d7d9389cf5bb7d2aa26c0e27162c54
SHA2564b3cbcfab5e5a1eca5c42a1ccf243b9f1d42a3d180308d6698fe2274fac85926
SHA51287b7e6d5e0ca9cf333a6924c7b977f4bd02f526b0812a199aed8eb05b7acb2d6e8d63835a68f590ef6e792a267f74ea543534dc18997413a838586114f7ba361
-
Filesize
184KB
MD5614254b40aa09932df98963d761b8662
SHA146aa605e9a284abd08caccdcc06069399b8ee6e3
SHA256234c375c72075ba04213d711f42b053d42898d4e663246829fdd3abc03a14e09
SHA5120ff9c74c2fea9938d86546642b7f6630538978de7fe48fa8430aa7a305dbdab759ba57e53be779a0d1f9ea2a536e183b2cd9da192eb1ed3175660648d157f56c
-
Filesize
184KB
MD5502668e52d40a09c1355f98fb96554d1
SHA17437c2ddf836002ec6ec0d74277ae435731079d5
SHA2564ee53c38dbf586880c59492387fbdeb50e745f94f4861e2bff156151768cd2be
SHA512dee5a458320278943bffe4d6dda9827c2c0c0d6f6d0548719ff73c8c41ffb5d304887f697f1bbb8cf6499ba90c92eebfa4a2f37bdca1ec3c02a044e988ba45d6
-
Filesize
184KB
MD5d1dc030a5a5eb4ee64a99f5f383b6a83
SHA17daf87ed219e6c086791b9e8dabf673fbf1f1afd
SHA256eaa38e0377ccf2406a86a6aea50a3bf29b42fdcd9b886f045d5262325f890aca
SHA512137940c383d17161d7a0746900685480104fd533346cdf2f9121910afd47d27f964bd07d508d2b7912c9b673d23cdc9206965990ecaf0dea0129ad14fa9a2b6f
-
Filesize
184KB
MD53270ba65a6c824ce4acdd7307c64fbbd
SHA11209956f8cc9ae686458f037f359b1bac43da56b
SHA256cafb07bc4eb3f1436fc64c234b0f43a76b1c96cc3b67a5d066e6a6cc44012e7a
SHA51211f555cd714576139c5bca159d6039521acfd37ca6dd43f5b714c4bfe5252cb0068a1836b432938fdbe0ff0978ad52422a781b33cd797bb121704186637a8754
-
Filesize
184KB
MD54387a8a618fdb5927d46d6905cb1bcf5
SHA13d4fa5d02195ef587cfe64718df707b5c10a3a54
SHA25642a9cd235f25c4cf772abf9a7100924697e68ecdf6843c0df8fb8dad3c07ce77
SHA512e662581456c9c12c43ab49224b1681ded6ccd8540c9ce83ec7a3ee92e3f878d09be06d66c89b4107aa47894731a31902accea69e22a2e78dbb5879dca7616d87
-
Filesize
184KB
MD5f2c92768b514f43c07376a44a6a9291c
SHA130f7c84faa2959b70f4f379225a377aa55e41ea5
SHA256c070ac4b5206bc76cc2932600c05a7b2e24642f923f4025deb369ef3f8ef54b0
SHA5121b24ecb9d90841ca3e55587150a394873415d2bfe835d8f3e0ccd1e835d041696e15cfe6628a3fa7f5b3560ecf0d50f7a21af4497603b6d9ffd9d67647253543
-
Filesize
184KB
MD510adfc52c039387e84ae7e6381618c19
SHA13da2db48d133899b88f7295f11f2907cdf0510df
SHA256aed0c2299f45e9a52238e1510a9633a07a56eaa1ec9599659dd0561f96764ceb
SHA5128f17539b985c93df00a4883bb35481707e36930baa3da03f3daa4344ea19aa3f026d98d94afef5382ab1fd8f79fd1af770dbdcb0b71b3f202c5c257b84b82ec0