Analysis

  • max time kernel
    40s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    04-01-2024 10:16

General

  • Target

    4097f828b39f93aafbf9f033273be74b.exe

  • Size

    184KB

  • MD5

    4097f828b39f93aafbf9f033273be74b

  • SHA1

    e2aac8d113f5aaa788a6b113105e8cf02351fbe6

  • SHA256

    6fe6b1bdc638dd9d35e58b83d1f2f766feaeb943104c9e6b1fbae45488979fc1

  • SHA512

    bb1a0e0df0fa3f602a933df6e20c09cd9923be6aed90a08a2a73665d9bf0da388a0611b0ea07360a76df4236bfe610b895b91ff784bf7702f63c516b94ec17a3

  • SSDEEP

    3072:WZGSoz/5zhApryjodjisAZF035A64OfF+8Ex8HuybNlPvpFW:WZLoROprXdWsAZ+NBRNlPvpF

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 19 IoCs
  • Loads dropped DLL 64 IoCs
  • Program crash 18 IoCs
  • Suspicious use of SetWindowsHookEx 17 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\4097f828b39f93aafbf9f033273be74b.exe
    "C:\Users\Admin\AppData\Local\Temp\4097f828b39f93aafbf9f033273be74b.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2060
    • C:\Users\Admin\AppData\Local\Temp\Unicorn-33223.exe
      C:\Users\Admin\AppData\Local\Temp\Unicorn-33223.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2148
      • C:\Users\Admin\AppData\Local\Temp\Unicorn-5677.exe
        C:\Users\Admin\AppData\Local\Temp\Unicorn-5677.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1728
        • C:\Users\Admin\AppData\Local\Temp\Unicorn-63176.exe
          C:\Users\Admin\AppData\Local\Temp\Unicorn-63176.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:2276
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 1728 -s 380
          4⤵
          • Program crash
          PID:2108
      • C:\Users\Admin\AppData\Local\Temp\Unicorn-36211.exe
        C:\Users\Admin\AppData\Local\Temp\Unicorn-36211.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2820
        • C:\Users\Admin\AppData\Local\Temp\Unicorn-60327.exe
          C:\Users\Admin\AppData\Local\Temp\Unicorn-60327.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2684
          • C:\Users\Admin\AppData\Local\Temp\Unicorn-8241.exe
            C:\Users\Admin\AppData\Local\Temp\Unicorn-8241.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            PID:1640
            • C:\Users\Admin\AppData\Local\Temp\Unicorn-30364.exe
              C:\Users\Admin\AppData\Local\Temp\Unicorn-30364.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:1352
              • C:\Users\Admin\AppData\Local\Temp\Unicorn-29460.exe
                C:\Users\Admin\AppData\Local\Temp\Unicorn-29460.exe
                7⤵
                  PID:1644
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-13533.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-13533.exe
                    8⤵
                      PID:2732
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 1644 -s 380
                      8⤵
                      • Program crash
                      PID:860
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 1352 -s 372
                    7⤵
                    • Program crash
                    PID:292
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 1640 -s 380
                  6⤵
                  • Program crash
                  PID:2880
              • C:\Users\Admin\AppData\Local\Temp\Unicorn-10498.exe
                C:\Users\Admin\AppData\Local\Temp\Unicorn-10498.exe
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:716
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 716 -s 380
                  6⤵
                  • Program crash
                  PID:2796
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2684 -s 372
                5⤵
                • Program crash
                PID:2920
            • C:\Users\Admin\AppData\Local\Temp\Unicorn-1972.exe
              C:\Users\Admin\AppData\Local\Temp\Unicorn-1972.exe
              4⤵
              • Executes dropped EXE
              PID:1048
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2820 -s 384
              4⤵
              • Program crash
              PID:2376
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2148 -s 368
            3⤵
            • Loads dropped DLL
            • Program crash
            PID:2956
        • C:\Users\Admin\AppData\Local\Temp\Unicorn-26844.exe
          C:\Users\Admin\AppData\Local\Temp\Unicorn-26844.exe
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2540
          • C:\Users\Admin\AppData\Local\Temp\Unicorn-42756.exe
            C:\Users\Admin\AppData\Local\Temp\Unicorn-42756.exe
            3⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2500
            • C:\Users\Admin\AppData\Local\Temp\Unicorn-27463.exe
              C:\Users\Admin\AppData\Local\Temp\Unicorn-27463.exe
              4⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:1276
              • C:\Users\Admin\AppData\Local\Temp\Unicorn-62870.exe
                C:\Users\Admin\AppData\Local\Temp\Unicorn-62870.exe
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:2840
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-53960.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-53960.exe
                  6⤵
                  • Executes dropped EXE
                  PID:820
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-48458.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-48458.exe
                    7⤵
                      PID:2316
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 820 -s 372
                      7⤵
                      • Program crash
                      PID:2536
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 2840 -s 380
                    6⤵
                    • Program crash
                    PID:1616
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 1276 -s 380
                  5⤵
                  • Program crash
                  PID:1972
              • C:\Users\Admin\AppData\Local\Temp\Unicorn-51173.exe
                C:\Users\Admin\AppData\Local\Temp\Unicorn-51173.exe
                4⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetWindowsHookEx
                PID:2404
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-26939.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-26939.exe
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:1700
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-56659.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-56659.exe
                    6⤵
                      PID:3044
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 1700 -s 372
                      6⤵
                      • Program crash
                      PID:2788
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 2404 -s 380
                    5⤵
                    • Program crash
                    PID:2496
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2500 -s 380
                  4⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:2660
              • C:\Users\Admin\AppData\Local\Temp\Unicorn-52522.exe
                C:\Users\Admin\AppData\Local\Temp\Unicorn-52522.exe
                3⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetWindowsHookEx
                PID:2756
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-38174.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-38174.exe
                  4⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of SetWindowsHookEx
                  PID:2028
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-64785.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-64785.exe
                    5⤵
                    • Executes dropped EXE
                    PID:1544
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 2028 -s 380
                    5⤵
                    • Program crash
                    PID:1576
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2756 -s 376
                  4⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:2080
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2540 -s 368
                3⤵
                • Loads dropped DLL
                • Program crash
                PID:1068
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2060 -s 372
              2⤵
              • Program crash
              PID:2600

          Network

          MITRE ATT&CK Matrix

          Replay Monitor

          Loading Replay Monitor...

          Downloads

          • C:\Users\Admin\AppData\Local\Temp\Unicorn-1972.exe

            Filesize

            184KB

            MD5

            833f106b99196e84e80d44299de3e3fb

            SHA1

            2d7d9addfc9660b42b24ad45fccd6f75fa953b55

            SHA256

            c142328710d5f6be8e21339e7e0ebcfe4e8d5a3b614b458c41d76daa6549804b

            SHA512

            f778084a594ceb4f912a3602740f719ffc164fe3d26431bb4e312e1f3f6c4ec2dc93f66676038b05e9b35a14e445f5aa5be95cf3f536f1130668d96a6e535bf0

          • C:\Users\Admin\AppData\Local\Temp\Unicorn-26844.exe

            Filesize

            184KB

            MD5

            09fb7e2ae72364c297d010dd8252aff4

            SHA1

            822886380ca7c687179a715e462764927f0d3bdd

            SHA256

            0d407e31c876bbb79e88b6983722d8c3b8b29357f88e05d0f83cff9d5c8fde42

            SHA512

            d69a8acc143c359c1fe7b2c7183252c2ee783641ff80ed998599d5cf15aafc458a8154ecebe5e86c353c535514cd2fc0ff1e0760a6629377f3f5aeb205772a28

          • C:\Users\Admin\AppData\Local\Temp\Unicorn-42756.exe

            Filesize

            184KB

            MD5

            506994cec89b2c589bcf7e315faca264

            SHA1

            a0f04fd26c97dd4fbb4eb229f876f2cbde09e9aa

            SHA256

            37a506f327b3ce7fac57868bd2705bd76f52cdfb5579b01e87022d592620352c

            SHA512

            5fd1b19407614a933841721b9bdb2d67e9a8f5ef7f3ac50c8c2ffc0b0f88b3860fa737d5ebc326e657263a39f6a7e7fcb2648e1098ad426436af12621fa61e03

          • C:\Users\Admin\AppData\Local\Temp\Unicorn-62870.exe

            Filesize

            184KB

            MD5

            051c2610c712b08269d4c5271c9b8cc5

            SHA1

            22ddfe0c3d8780607955b1e3b932d0aec0ec01fa

            SHA256

            b97700d717ed66a7a60fb4028e6f6120904d05951e76062a38f96b4059a29863

            SHA512

            b7d6a826834a070fbe90c8a67637f3c21a3dee62a963c9bfcc4c3f111990056b96e8abd217c3d7b09ab65ba14b6f90f0fccbec783beee73725e9bde2d2ea2bba

          • \Users\Admin\AppData\Local\Temp\Unicorn-26844.exe

            Filesize

            64KB

            MD5

            87a475e5f6d66f27f95d083b8b43b01e

            SHA1

            cedfc19d57955481abfe0a66010a827c516b0b3d

            SHA256

            5b6fdb5c46431243661769665bd9fa913b15fe60dbcaaec77147ee90a47935e7

            SHA512

            c7fc9df97018100309856a5f850081fd0468e476dc4bee620c323a57f3ae77adde25c7f05328c66fe57de8a478985da5e30a2129c14a8b24093f77501579c1a3

          • \Users\Admin\AppData\Local\Temp\Unicorn-27463.exe

            Filesize

            184KB

            MD5

            ada22eaae3d29c9920a670a7424834f6

            SHA1

            5b97911cfaead0667054a64d0e222d37f5b708c5

            SHA256

            c10f6c465c8bea7b173799e31a98770cd6c1f58ec46244136d13490f03f494b0

            SHA512

            338dc02363f2134294bd2ff8e521f6fdeda675311d0838b2ae5675b34c800e511d46f4453b096db207cd1292559a0751310151f503e4f5fb60aa141b7b0183bc

          • \Users\Admin\AppData\Local\Temp\Unicorn-33223.exe

            Filesize

            184KB

            MD5

            d7a017c525f8e0c94b8294879cd81094

            SHA1

            899aab829d66fb4e776acab5fba50c5e1ea1923f

            SHA256

            745b87b07ec327ad8157f7d3ff201d74df20f909b1362ad961ec6cd1daeffe1c

            SHA512

            72a81a3d86bcc8c319208048ab4b2c50b9f4eaa678f01b86d4fc1cc27e63d01d9a02e06f74bdfacbab08e625203319abfc29c478ce7c001d93e20fd9a3be1ca7

          • \Users\Admin\AppData\Local\Temp\Unicorn-36211.exe

            Filesize

            184KB

            MD5

            473e4f4246f970fd8a2723096635052f

            SHA1

            cd81414f5c2052b092993649c7264ca1b2ce37f0

            SHA256

            021af175945a042be5f282c45eabff53439acb966edf460e29844887df3b75a7

            SHA512

            545d5c7713c5d315e5e245e6f5c18e79f9b0517e6abeb9f119569d9c069e308f7219eb5f17f453ff5b0880be021ee2fffc901b14799a90ce0f92e151c08d5e97

          • \Users\Admin\AppData\Local\Temp\Unicorn-51173.exe

            Filesize

            184KB

            MD5

            e3847288b9f9a2429825f615b5aeb4cd

            SHA1

            fc9becf6625a79772cc5a7dfe892c6365d122b48

            SHA256

            882db4d730c1536ce35acb9426599b7174b48831f466a7e40628784a253ab0bf

            SHA512

            f11b958365c09d04935201c3bcd3f9dc45115edb2757181156e80095dd4c6478524745aa08be1d87149ba7801e31020edf8611809c458dd519148dd550e0b033

          • \Users\Admin\AppData\Local\Temp\Unicorn-51173.exe

            Filesize

            92KB

            MD5

            a13b1f15675a88cf6abaa459f22e3951

            SHA1

            89396844dc3426a15c121914769be7062aa58712

            SHA256

            3d52947694e864f04bf8511645ae8e1782c8d79ac91139a2d2e6a4adfcb21ca6

            SHA512

            0eb1774f62c823886953a71d8d3f242c61c4959209915a98de0ba2cb59ed2882224686b06bc6a3f8c8d6e4ca82dad2ea812b76208c6ff82d26e36994ba601573

          • \Users\Admin\AppData\Local\Temp\Unicorn-52522.exe

            Filesize

            184KB

            MD5

            c04f7eb84ec5401b1094b4a8244ead27

            SHA1

            89a6f508953fa4a15b247cae31353e2272196754

            SHA256

            d88763ad3400f308688b5ae601eb2eb12821a0d0551523d94301c4de751aff91

            SHA512

            d800bd10f81e8f443c085be9904fd60aa6744b0068d0eda4fb13f9ef5c0ce9700d83da14622e42dc1c81cf216a44f3c1340e1bbe1c94bff98019cde7f5636949

          • \Users\Admin\AppData\Local\Temp\Unicorn-5677.exe

            Filesize

            184KB

            MD5

            2bab0c07da3112d6fc198e2450f0292f

            SHA1

            eb839c9c1e769408777e99e0a652ea33ef175245

            SHA256

            27f941df564c69308f1e61b9cc393428e90530b4ad57272d357a35b10947e3c3

            SHA512

            59303a061b6d25f9d2e75a9bcebe6e90e9b00a0b1639159d6e2ff2a4ccf4c789d03d8b56908847b9dd339d81d62c9674d2b5d79a3c8fe5bde9753cc1124fe53e

          • \Users\Admin\AppData\Local\Temp\Unicorn-60327.exe

            Filesize

            184KB

            MD5

            bfab4fdfe8afeccb541311561d8ae667

            SHA1

            a6c25f09d5672bc278a1a555452b42190d77235b

            SHA256

            a062fca80b0073cc6ed71fdc9556332fc355518605817c58044a1c282aab285e

            SHA512

            32bfa8a3e9092a01f1cfaa89e3d34a446761bc909ceaf2f847d6163943179013a96033ad8dfebea2f2e1183f7bf01fe9840d2f5b6f41bf7cd9df545ac8417aa5

          • \Users\Admin\AppData\Local\Temp\Unicorn-63176.exe

            Filesize

            184KB

            MD5

            7cb7ffa724724f51faf2fe1c88eb4a48

            SHA1

            3431aba41a1078f681e69069646545546814871c

            SHA256

            fb99827e313cb750044ab3d70eeb8cb2849d95d2ad0fa8b884a1ee724cb5396b

            SHA512

            3337289322e7c21cf632a3bf9b72b1b6c704507afb3a2bb2cfdec73d5a57b23ad58772de06152143e4598c2708861301c1d4990acba24c03b72223a9f0bf3195

          • \Users\Admin\AppData\Local\Temp\Unicorn-8241.exe

            Filesize

            184KB

            MD5

            dc459dfcdb00b54032b951f496af249a

            SHA1

            d84afcbfa2ea8ae72cda0f69c01c88ec95b0c318

            SHA256

            5fbd207c4e95627c2915f6514e2a8b482a85f19f2451f1fe69f9d38c5d855533

            SHA512

            f835364f8befb299fb34246b73bda9c0e4fdd4db6c2492cbfacd000fef370e039fc267dc54bbd5f89753bea9cb77f2a2860d4b44fd983c47d22fedab0571f108