Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
150s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
01/01/2024, 07:54
Static task
static1
Behavioral task
behavioral1
Sample
3c4e1f26915c7701ce370f354e9bbb5b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
3c4e1f26915c7701ce370f354e9bbb5b.exe
Resource
win10v2004-20231215-en
General
-
Target
3c4e1f26915c7701ce370f354e9bbb5b.exe
-
Size
184KB
-
MD5
3c4e1f26915c7701ce370f354e9bbb5b
-
SHA1
9e6bb4cc0d54f85819525ca384de821652b80d02
-
SHA256
00e3293df41c42b960053c92be3b6329e0ffa724fc98dbf497c9067412b8595d
-
SHA512
b27f6d33310e2b53d5334227d692c7b2028fde902e07139c0557a04187858b35fd4fcd0ac329440b0fe93dd9c4b8477c207c5e7660a4869a892ae44072841efd
-
SSDEEP
3072:IGvFoJITnTAaSOjgdxUXzz1ce9Y6pfjkLzVx4I2KY7lXvpL5:IGNoKMaSrdaXzzVQ4D7lXvpL
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2772 Unicorn-43135.exe 2320 Unicorn-23774.exe 2848 Unicorn-37156.exe 2768 Unicorn-57186.exe 2748 Unicorn-5032.exe 2608 Unicorn-5354.exe 2556 Unicorn-32444.exe 2900 Unicorn-1779.exe 2884 Unicorn-54125.exe 2304 Unicorn-539.exe 2152 Unicorn-43907.exe 760 Unicorn-7392.exe 2640 Unicorn-20775.exe 1644 Unicorn-6048.exe 616 Unicorn-52867.exe 824 Unicorn-52867.exe 2004 Unicorn-33577.exe 1964 Unicorn-33769.exe 2244 Unicorn-60734.exe 2268 Unicorn-56552.exe 828 Unicorn-28104.exe 1920 Unicorn-41294.exe 1072 Unicorn-10532.exe 920 Unicorn-9032.exe 2276 Unicorn-52738.exe 736 Unicorn-49100.exe 2220 Unicorn-36485.exe 2068 Unicorn-18914.exe 2264 Unicorn-41149.exe 2176 Unicorn-61783.exe 2144 Unicorn-30839.exe 2168 Unicorn-61819.exe 2136 Unicorn-28639.exe 2976 Unicorn-496.exe 2704 Unicorn-59583.exe 2960 Unicorn-7813.exe 2612 Unicorn-27871.exe 2796 Unicorn-19423.exe 2500 Unicorn-50403.exe 2636 Unicorn-43032.exe 2656 Unicorn-43032.exe 2628 Unicorn-43032.exe 1324 Unicorn-23166.exe 1704 Unicorn-23166.exe 2236 Unicorn-63701.exe 2560 Unicorn-63701.exe 2896 Unicorn-43836.exe 2880 Unicorn-63701.exe 2924 Unicorn-59871.exe 1988 Unicorn-64324.exe 2232 Unicorn-44459.exe 796 Unicorn-65170.exe 660 Unicorn-19499.exe 808 Unicorn-13876.exe 876 Unicorn-16270.exe 2424 Unicorn-943.exe 2828 Unicorn-37903.exe 2776 Unicorn-16091.exe 2052 Unicorn-50962.exe 2932 Unicorn-6866.exe 3032 Unicorn-23856.exe 2364 Unicorn-37328.exe 2412 Unicorn-48641.exe 3008 Unicorn-19086.exe -
Loads dropped DLL 64 IoCs
pid Process 2392 3c4e1f26915c7701ce370f354e9bbb5b.exe 2392 3c4e1f26915c7701ce370f354e9bbb5b.exe 2772 Unicorn-43135.exe 2772 Unicorn-43135.exe 2392 3c4e1f26915c7701ce370f354e9bbb5b.exe 2392 3c4e1f26915c7701ce370f354e9bbb5b.exe 2320 Unicorn-23774.exe 2320 Unicorn-23774.exe 2772 Unicorn-43135.exe 2772 Unicorn-43135.exe 2848 Unicorn-37156.exe 2848 Unicorn-37156.exe 2768 Unicorn-57186.exe 2768 Unicorn-57186.exe 2320 Unicorn-23774.exe 2320 Unicorn-23774.exe 2608 Unicorn-5354.exe 2608 Unicorn-5354.exe 2748 Unicorn-5032.exe 2748 Unicorn-5032.exe 2848 Unicorn-37156.exe 2848 Unicorn-37156.exe 2556 Unicorn-32444.exe 2556 Unicorn-32444.exe 2768 Unicorn-57186.exe 2768 Unicorn-57186.exe 2900 Unicorn-1779.exe 2900 Unicorn-1779.exe 2304 Unicorn-539.exe 2884 Unicorn-54125.exe 2884 Unicorn-54125.exe 2304 Unicorn-539.exe 2608 Unicorn-5354.exe 2748 Unicorn-5032.exe 2748 Unicorn-5032.exe 2608 Unicorn-5354.exe 2152 Unicorn-43907.exe 2152 Unicorn-43907.exe 2640 Unicorn-20775.exe 2640 Unicorn-20775.exe 760 Unicorn-7392.exe 760 Unicorn-7392.exe 2556 Unicorn-32444.exe 2556 Unicorn-32444.exe 1644 Unicorn-6048.exe 1644 Unicorn-6048.exe 2900 Unicorn-1779.exe 2900 Unicorn-1779.exe 616 Unicorn-52867.exe 616 Unicorn-52867.exe 2304 Unicorn-539.exe 2304 Unicorn-539.exe 824 Unicorn-52867.exe 824 Unicorn-52867.exe 2884 Unicorn-54125.exe 2884 Unicorn-54125.exe 1964 Unicorn-33769.exe 1964 Unicorn-33769.exe 2004 Unicorn-33577.exe 2004 Unicorn-33577.exe 2244 Unicorn-60734.exe 2244 Unicorn-60734.exe 2152 Unicorn-43907.exe 2152 Unicorn-43907.exe -
Suspicious use of SetWindowsHookEx 63 IoCs
pid Process 2392 3c4e1f26915c7701ce370f354e9bbb5b.exe 2772 Unicorn-43135.exe 2320 Unicorn-23774.exe 2848 Unicorn-37156.exe 2768 Unicorn-57186.exe 2608 Unicorn-5354.exe 2748 Unicorn-5032.exe 2556 Unicorn-32444.exe 2900 Unicorn-1779.exe 2884 Unicorn-54125.exe 2304 Unicorn-539.exe 2152 Unicorn-43907.exe 760 Unicorn-7392.exe 2640 Unicorn-20775.exe 1644 Unicorn-6048.exe 616 Unicorn-52867.exe 824 Unicorn-52867.exe 2004 Unicorn-33577.exe 1964 Unicorn-33769.exe 2244 Unicorn-60734.exe 2268 Unicorn-56552.exe 828 Unicorn-28104.exe 1920 Unicorn-41294.exe 1072 Unicorn-10532.exe 920 Unicorn-9032.exe 2276 Unicorn-52738.exe 2220 Unicorn-36485.exe 736 Unicorn-49100.exe 2068 Unicorn-18914.exe 2264 Unicorn-41149.exe 2176 Unicorn-61783.exe 2168 Unicorn-61819.exe 2144 Unicorn-30839.exe 2136 Unicorn-28639.exe 2704 Unicorn-59583.exe 2976 Unicorn-496.exe 2612 Unicorn-27871.exe 2960 Unicorn-7813.exe 2924 Unicorn-59871.exe 2232 Unicorn-44459.exe 1704 Unicorn-23166.exe 2796 Unicorn-19423.exe 1324 Unicorn-23166.exe 2236 Unicorn-63701.exe 660 Unicorn-19499.exe 2880 Unicorn-63701.exe 2636 Unicorn-43032.exe 2656 Unicorn-43032.exe 2628 Unicorn-43032.exe 1988 Unicorn-64324.exe 2560 Unicorn-63701.exe 2896 Unicorn-43836.exe 2500 Unicorn-50403.exe 796 Unicorn-65170.exe 876 Unicorn-16270.exe 2424 Unicorn-943.exe 808 Unicorn-13876.exe 2828 Unicorn-37903.exe 2776 Unicorn-16091.exe 2052 Unicorn-50962.exe 2412 Unicorn-48641.exe 3008 Unicorn-19086.exe 3032 Unicorn-23856.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2392 wrote to memory of 2772 2392 3c4e1f26915c7701ce370f354e9bbb5b.exe 28 PID 2392 wrote to memory of 2772 2392 3c4e1f26915c7701ce370f354e9bbb5b.exe 28 PID 2392 wrote to memory of 2772 2392 3c4e1f26915c7701ce370f354e9bbb5b.exe 28 PID 2392 wrote to memory of 2772 2392 3c4e1f26915c7701ce370f354e9bbb5b.exe 28 PID 2772 wrote to memory of 2320 2772 Unicorn-43135.exe 29 PID 2772 wrote to memory of 2320 2772 Unicorn-43135.exe 29 PID 2772 wrote to memory of 2320 2772 Unicorn-43135.exe 29 PID 2772 wrote to memory of 2320 2772 Unicorn-43135.exe 29 PID 2392 wrote to memory of 2848 2392 3c4e1f26915c7701ce370f354e9bbb5b.exe 30 PID 2392 wrote to memory of 2848 2392 3c4e1f26915c7701ce370f354e9bbb5b.exe 30 PID 2392 wrote to memory of 2848 2392 3c4e1f26915c7701ce370f354e9bbb5b.exe 30 PID 2392 wrote to memory of 2848 2392 3c4e1f26915c7701ce370f354e9bbb5b.exe 30 PID 2320 wrote to memory of 2768 2320 Unicorn-23774.exe 33 PID 2320 wrote to memory of 2768 2320 Unicorn-23774.exe 33 PID 2320 wrote to memory of 2768 2320 Unicorn-23774.exe 33 PID 2320 wrote to memory of 2768 2320 Unicorn-23774.exe 33 PID 2772 wrote to memory of 2748 2772 Unicorn-43135.exe 32 PID 2772 wrote to memory of 2748 2772 Unicorn-43135.exe 32 PID 2772 wrote to memory of 2748 2772 Unicorn-43135.exe 32 PID 2772 wrote to memory of 2748 2772 Unicorn-43135.exe 32 PID 2848 wrote to memory of 2608 2848 Unicorn-37156.exe 31 PID 2848 wrote to memory of 2608 2848 Unicorn-37156.exe 31 PID 2848 wrote to memory of 2608 2848 Unicorn-37156.exe 31 PID 2848 wrote to memory of 2608 2848 Unicorn-37156.exe 31 PID 2768 wrote to memory of 2556 2768 Unicorn-57186.exe 34 PID 2768 wrote to memory of 2556 2768 Unicorn-57186.exe 34 PID 2768 wrote to memory of 2556 2768 Unicorn-57186.exe 34 PID 2768 wrote to memory of 2556 2768 Unicorn-57186.exe 34 PID 2320 wrote to memory of 2900 2320 Unicorn-23774.exe 38 PID 2320 wrote to memory of 2900 2320 Unicorn-23774.exe 38 PID 2320 wrote to memory of 2900 2320 Unicorn-23774.exe 38 PID 2320 wrote to memory of 2900 2320 Unicorn-23774.exe 38 PID 2608 wrote to memory of 2884 2608 Unicorn-5354.exe 37 PID 2608 wrote to memory of 2884 2608 Unicorn-5354.exe 37 PID 2608 wrote to memory of 2884 2608 Unicorn-5354.exe 37 PID 2608 wrote to memory of 2884 2608 Unicorn-5354.exe 37 PID 2748 wrote to memory of 2304 2748 Unicorn-5032.exe 36 PID 2748 wrote to memory of 2304 2748 Unicorn-5032.exe 36 PID 2748 wrote to memory of 2304 2748 Unicorn-5032.exe 36 PID 2748 wrote to memory of 2304 2748 Unicorn-5032.exe 36 PID 2848 wrote to memory of 2152 2848 Unicorn-37156.exe 35 PID 2848 wrote to memory of 2152 2848 Unicorn-37156.exe 35 PID 2848 wrote to memory of 2152 2848 Unicorn-37156.exe 35 PID 2848 wrote to memory of 2152 2848 Unicorn-37156.exe 35 PID 2556 wrote to memory of 760 2556 Unicorn-32444.exe 39 PID 2556 wrote to memory of 760 2556 Unicorn-32444.exe 39 PID 2556 wrote to memory of 760 2556 Unicorn-32444.exe 39 PID 2556 wrote to memory of 760 2556 Unicorn-32444.exe 39 PID 2768 wrote to memory of 2640 2768 Unicorn-57186.exe 40 PID 2768 wrote to memory of 2640 2768 Unicorn-57186.exe 40 PID 2768 wrote to memory of 2640 2768 Unicorn-57186.exe 40 PID 2768 wrote to memory of 2640 2768 Unicorn-57186.exe 40 PID 2900 wrote to memory of 1644 2900 Unicorn-1779.exe 41 PID 2900 wrote to memory of 1644 2900 Unicorn-1779.exe 41 PID 2900 wrote to memory of 1644 2900 Unicorn-1779.exe 41 PID 2900 wrote to memory of 1644 2900 Unicorn-1779.exe 41 PID 2884 wrote to memory of 824 2884 Unicorn-54125.exe 42 PID 2884 wrote to memory of 824 2884 Unicorn-54125.exe 42 PID 2884 wrote to memory of 824 2884 Unicorn-54125.exe 42 PID 2884 wrote to memory of 824 2884 Unicorn-54125.exe 42 PID 2304 wrote to memory of 616 2304 Unicorn-539.exe 43 PID 2304 wrote to memory of 616 2304 Unicorn-539.exe 43 PID 2304 wrote to memory of 616 2304 Unicorn-539.exe 43 PID 2304 wrote to memory of 616 2304 Unicorn-539.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\3c4e1f26915c7701ce370f354e9bbb5b.exe"C:\Users\Admin\AppData\Local\Temp\3c4e1f26915c7701ce370f354e9bbb5b.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-43135.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43135.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23774.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23774.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-57186.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57186.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-32444.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32444.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-7392.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7392.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:760 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-28104.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28104.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:828 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-59583.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59583.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-19499.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19499.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:660 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37903.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37903.exe10⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2828
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7813.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7813.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2960
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41294.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41294.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27871.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27871.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16091.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16091.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37328.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37328.exe9⤵
- Executes dropped EXE
PID:2364
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20775.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20775.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-56552.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56552.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-28639.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28639.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2136
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-496.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-496.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2976
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1779.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1779.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6048.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6048.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1644 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10532.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10532.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1072 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-19423.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19423.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16270.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16270.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:876 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23856.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23856.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3032
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50403.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50403.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2500
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9032.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9032.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:920
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5032.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5032.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-539.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-539.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2304 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-52867.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52867.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:616 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-52738.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52738.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-43032.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43032.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2628
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23166.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23166.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13256.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13256.exe7⤵PID:2528
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49100.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49100.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:736 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-43032.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43032.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-19086.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19086.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3008
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33577.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33577.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61783.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61783.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-64324.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64324.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1988
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44459.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44459.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2232
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37156.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37156.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5354.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5354.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54125.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54125.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-52867.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52867.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:824 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-36485.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36485.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-43032.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43032.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6866.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6866.exe8⤵
- Executes dropped EXE
PID:2932
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23166.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23166.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1324 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-943.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-943.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48641.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48641.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2412
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41149.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41149.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2264 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-63701.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63701.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2236
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33769.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33769.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18914.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18914.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-63701.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63701.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50962.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50962.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2052
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59871.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59871.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13876.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13876.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:808
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43907.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43907.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60734.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60734.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30839.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30839.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-63701.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63701.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2880
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43836.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43836.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2896
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61819.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61819.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-65170.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65170.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:796 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62241.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62241.exe6⤵PID:2188
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD565978eab12bd4d2a81ff15921ace15cd
SHA15999cb8b32570f100bdd91922a614ff23554335f
SHA2565371dfc80e6d484eda4a1389fc4c684aaea459eaed6fc9d10a6a05f6137d8cf3
SHA5121eb7b82d113fa7e849e34385de7d4db2e1a810ba50d2f4732fe3f4c6a4450b97c58c343ed3323da9d1eefa7eb868976daaddf31fbeb3eb56e32b8f6071148692
-
Filesize
92KB
MD57bac4f5329d86bfa49c835af1e1ed41b
SHA1f61b4ecb94c68849054b1251bf8718de729d8010
SHA2562ea6ad3a5491fca461cb54da136a586a8ce782c9b11f63407eddc17c9d4e5e8a
SHA512e607077e2ed59af926e35dd8cf3c05a795e153a5e64fba0935014947d72349afe4e068cc7c36a236d4985fc31016a2c3d678ec20a1894328b179c65f7552f04c
-
Filesize
184KB
MD5b1ab5d9230f9404624393005552003a5
SHA1d28decdc20b48f7d9503eab97da2d6a4fe8daeb4
SHA256eade32bbf87823e65017cf203c82ddf3b87eb07ea2a1d9928f43bd7ce2d24dbc
SHA512d06876c2aaa70a0c48f844a343be4edec9c5dadfd2a50a0248727aa8a73e751f18cf8ba5e3af0ebb9718a582c5bddf40c7db0e7d577431630d4c6220c91c31e7
-
Filesize
184KB
MD5ca46b0eca618cc859f729769f0c59715
SHA1c71c58a76231542852dc5bd3492ce02bb1142977
SHA256422528d328d331e7472144e5fd5be75aaf37815bba96b6e0430ca298bfac3051
SHA51243a2eb127656573ecebdc12302979d24bfdcb179fc445ef35201e743cb37432a2f19a3c8b5fe257e15774fd223c81b11da3739941ea2aa60e37e144350f4720a
-
Filesize
184KB
MD52097b630530868c117e09f949dc37e68
SHA1b63f29c7742f23fd0b48424230a625af5061f459
SHA256ccfef7860ae7e0dede075b894a301e6d1bab15cdd23e36ff8c8531aa566b2a81
SHA512817772cd298f053c9380e2f2e9cfc18a7a5db68aa6a7fc6792831cf7283a42943e42579901c2a6693a16f34d01ad5c30306c0a0411a37b988be864a5c9285b26
-
Filesize
184KB
MD5ab1785467b48c597d2862bd5c5caa60d
SHA1e6b5009114a09d15ce8a4ba0cc336427d5f2e061
SHA256edd52e1b27f720ecb1c779463ce0724e5108766cacd2afcf161a6f3d73cb8c54
SHA512e7b5293887ec49035dfa0da0ca30a8ae1ac17d3608b11823b3a3130457c5c5eaf9cad0b58fb89ce99c5f9b45b1a303ec33924141b6e8ce79e21dfc7acb3ce945
-
Filesize
184KB
MD5f82543ea117290f078fab92ed4e5b5af
SHA10bb8f3f35a83a9a7ced08cd8641b1718711e0bf8
SHA256505829903d0da362988f7b23ea19ded5c05f7d4d985db98f411faa4334c8af7f
SHA512349820736646e4e596dc74a51d3231902745dde6c80dea2119f6c7fb7afd35b3113163bf7f60bc15b40cb769c1abfc1867efff143aa90e87b3ee4590041eb954
-
Filesize
184KB
MD597beb43120493388771685b8c44724aa
SHA1db12baeef5c31fa6e9408c4f21b55362312995c8
SHA25694cca24361906f9bdf61ddebd78d40519e6b22528182d852b4b3c1a1ba676132
SHA51260468a2223092450a2e214384578aad229fd1dcc4ff79e4851ac96063dc056466bc72cba90d450f17a8c4d74f16da076776ab74af1fcc52d08312c579e308552
-
Filesize
184KB
MD5009a878fb2c1da3a298eeeb80e4c4753
SHA17c4da0f7d13c231fb01c17a12225f36abccdcf12
SHA256c027fc7018dc4762a4efd487b9e8a8c4aea8cc76dd54e8b2d2c22c6e8d9b190b
SHA5120a183dc350b553066d4927fb1782e098bd7ba7adcbc12bae1e941395de8d54696fcea592f92847c02bc640d634d833ff40ef88c7eb17278a53e6895add0a0aac
-
Filesize
184KB
MD54e3d80e4b064d97d7dee3bdeaf73ded9
SHA11ce14b5823398f30ffede83f6c63e97b0c85e938
SHA256327146e0ae8392c310ef67fee27fffb367e89ac3e876187b813265c4957ebdc0
SHA51201d4fa55b587c4b5d7fed5c6c0ec9c4e170b8ca8300aed0cefe0efddef2dd04ba07d868433e873d3e2b50dfef31ca304c7568dbebd1da0779ae86604d3451d7c
-
Filesize
184KB
MD541f75c6a3fcfc81cf263750887d3eb24
SHA1871499e2f3ab9d0d75bad5ade0f26202acee256b
SHA2564dd210d64502b9b065cca7d6fb5fa63b53b1b1171576f8260395e3111dcd256a
SHA512a95306d8223f9176533844cc8ebe4f26a8eda8fc6ef28b5d00d94087980d876e68fd1a91451c63c4d45248df547b970f028f4966635dcb7b05fb4b630963c5b0
-
Filesize
184KB
MD5b3a2c91280e49e696923b19476f6c2f7
SHA172944ad9514ac3e773e8104460d7d1cec1c7b6d8
SHA256530c7d11e0c80d7c4b4e97faa652620fe1d407b91cd2614eb4c8dec8c5abc543
SHA51236b166d43de3579e96a4f8b51ea07a0a98246f174f9c20b242f6844b120c9eae39c6bc131c2ffaa069b58df6bcb4843e13f369f27def263ea92cda76634c9387
-
Filesize
184KB
MD5d3a60a1d7391da5a4e168d7bd75a2efa
SHA1dbebc4728112b1577739eae1ad12a012de127ec8
SHA2564896ad3191c59216586c47588699762224542f0708a5af279e967a34023133d6
SHA512a18fefa42675fcb17ab0810c36f71d85e71c66df9b3adf79a3e761ed24aa6f0bb87592adff03b6a8d40a205c7061cb749b9b8466ca2d306a04bef06544e41dab
-
Filesize
184KB
MD528ebe7cdb0466a090bf02a2aa89ae7e4
SHA16ec4a6b0ff090c687446b4cb84f6b77c114a2472
SHA256ed6aba7cdc1ebe2ab124daa7bada4410a9108078bc65409e57f58e531ac5bce1
SHA51284ee5f13d35b6209f44c940f873f420c13692178ab42355976060ea5de4f5e63d5a64cff684bc6a92f5d581683fe6fe7033e80f65d50149bcc59eb2ecc114a5e
-
Filesize
184KB
MD50e98948c7c64a7a4b0b58f3f59f9b8d2
SHA1c18cd3995eddfa2754f02ea0819232470d097bd6
SHA2567e59d4861daa562d6f4443f88b4fc4542a139d832b614f1f320bf23dc8f0591f
SHA512564c001906bc65983399a75c13721cffb2a2d274e1f8f2496db1958794db0d254ee244c777a8d30711495f61d9416e87d1e88cdd0532bae69d2d874716d90ffe
-
Filesize
95KB
MD5a109818a63849742b67a62197b1b47cf
SHA10194e487fd9352d24b9d161080ddd08c4aa01d8c
SHA2560f307285d38c4e39bd1273be432e438cfcf11dec0733854a0d22f15857eba84d
SHA512c35cdf0c56f1f37ed6246a335ab98a413d5c7d076445b34ed06dc12b67baade2d4328d49c4709b8339dc7b1edf5f3ae9aa38dda423c78aaf2cc4e7f0a9f59e49
-
Filesize
184KB
MD53a013c6d9b5490221bfd7773c65b5586
SHA10f1a5ccdd069df8a97d181b430a83b4f83ed1374
SHA25611c3598fe3b3aa8bdea7c83d3b17ecfced0adf004e5680fb382232e349b755dd
SHA51225f5940f109ea65bb0291148944f41fcdfe38973fdb002774dfacc9e2b50800c8acc6388d5a13b41d6732b5b6a87bae657e31574e98a4458544c06ddb388e8e6
-
Filesize
184KB
MD516c137f496c70b2c05cef66e65ea3402
SHA1d3c49ce36b7d811f19c7d06cee2f701f00efbf27
SHA256e7068a82b028c5b236ed37ed1fed38fee68b2ea0e1321d5cc487a8278226378d
SHA512de84f4424ece8bd93c34a42b67259c2264360621b662e6e0dc3de39a4867632f9736b1367946f21377c089548dc3d435d639db56a4bbc8b8265d407983bc1baf
-
Filesize
184KB
MD54ba408977f5d2a9691c98d8cf2383346
SHA10b9d24e8d53f49597e69ad15c5c2094ba4a375cd
SHA256d0c1526e0df886fa42489166d8d92200ea503d2dcd9dae2e5e46224e25197ef8
SHA512767d641ade00910e61a96392e74c678ad0917cc682dff6eb08748a47f9298a000d29fcc980746b622ad688ac646ca1375ae75b9db201a822990bd4025f76eece