Analysis
-
max time kernel
215s -
max time network
283s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
04-01-2024 19:30
Static task
static1
Behavioral task
behavioral1
Sample
41b8acacf5c2e6468a746dc7c1ca5a4c.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
41b8acacf5c2e6468a746dc7c1ca5a4c.exe
Resource
win10v2004-20231215-en
General
-
Target
41b8acacf5c2e6468a746dc7c1ca5a4c.exe
-
Size
184KB
-
MD5
41b8acacf5c2e6468a746dc7c1ca5a4c
-
SHA1
fb27e8ebf31110a836c5cf3b28c7dcebbf460cb5
-
SHA256
bb9a394665b34d50802fd8790fa649fc5f86bd21248347ed2e3c5a02bc2096bc
-
SHA512
2b65fbcc48a27b869c5bf867b315c0334c80c6749df123f9d6bc214373b12a6ca611f910132de21bcf6463b9bf73f903c373f60cf2db0f670b6ad94c1029ebdb
-
SSDEEP
3072:n65+oz/PfYA01OjfdTCTI8FyKGg6OnfIZDEx8QPPQNlPvpF+:n6Uoj501gdmTI8FQd5NlPvpF
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2456 Unicorn-38726.exe 2624 Unicorn-8850.exe 2640 Unicorn-9405.exe 1984 Unicorn-55537.exe 2168 Unicorn-51453.exe 2768 Unicorn-22538.exe 1928 Unicorn-20530.exe 2652 Unicorn-22668.exe 1184 Unicorn-53067.exe 1860 Unicorn-34593.exe 2504 Unicorn-44982.exe 2212 Unicorn-31146.exe 2472 Unicorn-29200.exe 692 Unicorn-30592.exe 1900 Unicorn-15839.exe 2688 Unicorn-25953.exe 2848 Unicorn-13700.exe 308 Unicorn-60763.exe 2892 Unicorn-30696.exe 1476 Unicorn-33388.exe 2552 Unicorn-6191.exe 1872 Unicorn-3342.exe 2940 Unicorn-6746.exe 2760 Unicorn-19679.exe 2228 Unicorn-5563.exe 1508 Unicorn-3425.exe 2896 Unicorn-14463.exe 552 Unicorn-20494.exe 1112 Unicorn-8817.exe 1148 Unicorn-11510.exe 620 Unicorn-31376.exe 2252 Unicorn-45574.exe 2016 Unicorn-1204.exe 2100 Unicorn-19486.exe 456 Unicorn-31184.exe 3024 Unicorn-35822.exe 776 Unicorn-20577.exe 1596 Unicorn-19185.exe 628 Unicorn-31843.exe 948 Unicorn-45273.exe 2656 Unicorn-13176.exe 1700 Unicorn-7701.exe 560 Unicorn-14930.exe 872 Unicorn-24229.exe 1904 Unicorn-58869.exe 2012 Unicorn-5008.exe 1436 Unicorn-56902.exe 2364 Unicorn-13731.exe 2056 Unicorn-13368.exe 2432 Unicorn-27353.exe 1556 Unicorn-64515.exe 1900 Unicorn-46041.exe 1812 Unicorn-44282.exe 2856 Unicorn-17640.exe 1656 Unicorn-33976.exe 1584 Unicorn-29892.exe 2468 Unicorn-30468.exe 1468 Unicorn-1687.exe 2788 Unicorn-9663.exe 1100 Unicorn-3249.exe 1316 Unicorn-5771.exe 1744 Unicorn-13747.exe 2160 Unicorn-65086.exe 2624 Unicorn-32222.exe -
Loads dropped DLL 64 IoCs
pid Process 1316 41b8acacf5c2e6468a746dc7c1ca5a4c.exe 1316 41b8acacf5c2e6468a746dc7c1ca5a4c.exe 1316 41b8acacf5c2e6468a746dc7c1ca5a4c.exe 2456 Unicorn-38726.exe 1316 41b8acacf5c2e6468a746dc7c1ca5a4c.exe 2456 Unicorn-38726.exe 2624 Unicorn-8850.exe 2624 Unicorn-8850.exe 2640 Unicorn-9405.exe 1984 Unicorn-55537.exe 2640 Unicorn-9405.exe 1984 Unicorn-55537.exe 2768 Unicorn-22538.exe 2168 Unicorn-51453.exe 2768 Unicorn-22538.exe 2168 Unicorn-51453.exe 2652 Unicorn-22668.exe 2652 Unicorn-22668.exe 1928 Unicorn-20530.exe 1928 Unicorn-20530.exe 1184 Unicorn-53067.exe 1928 Unicorn-20530.exe 1928 Unicorn-20530.exe 1184 Unicorn-53067.exe 2652 Unicorn-22668.exe 2652 Unicorn-22668.exe 1860 Unicorn-34593.exe 1860 Unicorn-34593.exe 2472 Unicorn-29200.exe 692 Unicorn-30592.exe 2472 Unicorn-29200.exe 692 Unicorn-30592.exe 2504 Unicorn-44982.exe 2212 Unicorn-31146.exe 2504 Unicorn-44982.exe 2212 Unicorn-31146.exe 1900 Unicorn-15839.exe 1900 Unicorn-15839.exe 2472 Unicorn-29200.exe 2472 Unicorn-29200.exe 2688 Unicorn-25953.exe 2688 Unicorn-25953.exe 692 Unicorn-30592.exe 2848 Unicorn-13700.exe 2848 Unicorn-13700.exe 692 Unicorn-30592.exe 308 Unicorn-60763.exe 308 Unicorn-60763.exe 2892 Unicorn-30696.exe 2892 Unicorn-30696.exe 1476 Unicorn-33388.exe 1476 Unicorn-33388.exe 2552 Unicorn-6191.exe 2552 Unicorn-6191.exe 2940 Unicorn-6746.exe 2940 Unicorn-6746.exe 1872 Unicorn-3342.exe 2848 Unicorn-13700.exe 2760 Unicorn-19679.exe 1872 Unicorn-3342.exe 2760 Unicorn-19679.exe 2848 Unicorn-13700.exe 2228 Unicorn-5563.exe 2228 Unicorn-5563.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 1512 1556 WerFault.exe 77 1720 2160 WerFault.exe 92 -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1316 41b8acacf5c2e6468a746dc7c1ca5a4c.exe 2456 Unicorn-38726.exe 2624 Unicorn-8850.exe 2640 Unicorn-9405.exe 1984 Unicorn-55537.exe 2168 Unicorn-51453.exe 2768 Unicorn-22538.exe 2652 Unicorn-22668.exe 1928 Unicorn-20530.exe 1184 Unicorn-53067.exe 1860 Unicorn-34593.exe 2472 Unicorn-29200.exe 692 Unicorn-30592.exe 2504 Unicorn-44982.exe 2212 Unicorn-31146.exe 2688 Unicorn-25953.exe 1900 Unicorn-15839.exe 2848 Unicorn-13700.exe 308 Unicorn-60763.exe 2892 Unicorn-30696.exe 1476 Unicorn-33388.exe 2552 Unicorn-6191.exe 2940 Unicorn-6746.exe 2760 Unicorn-19679.exe 1872 Unicorn-3342.exe 2228 Unicorn-5563.exe 1508 Unicorn-3425.exe 2896 Unicorn-14463.exe 552 Unicorn-20494.exe 1148 Unicorn-11510.exe 620 Unicorn-31376.exe 1112 Unicorn-8817.exe 2252 Unicorn-45574.exe 2016 Unicorn-1204.exe 3024 Unicorn-35822.exe 2100 Unicorn-19486.exe 456 Unicorn-31184.exe 776 Unicorn-20577.exe 1596 Unicorn-19185.exe 948 Unicorn-45273.exe 628 Unicorn-31843.exe 1904 Unicorn-58869.exe 1700 Unicorn-7701.exe 560 Unicorn-14930.exe 872 Unicorn-24229.exe 2656 Unicorn-13176.exe 1436 Unicorn-56902.exe 2364 Unicorn-13731.exe 2012 Unicorn-5008.exe 2056 Unicorn-13368.exe 2432 Unicorn-27353.exe 1900 Unicorn-46041.exe 1556 Unicorn-64515.exe 2788 Unicorn-9663.exe 2856 Unicorn-17640.exe 1316 Unicorn-5771.exe 1584 Unicorn-29892.exe 2160 Unicorn-65086.exe 2468 Unicorn-30468.exe 1656 Unicorn-33976.exe 1468 Unicorn-1687.exe 2624 Unicorn-32222.exe 1744 Unicorn-13747.exe 2776 Unicorn-40582.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1316 wrote to memory of 2456 1316 41b8acacf5c2e6468a746dc7c1ca5a4c.exe 28 PID 1316 wrote to memory of 2456 1316 41b8acacf5c2e6468a746dc7c1ca5a4c.exe 28 PID 1316 wrote to memory of 2456 1316 41b8acacf5c2e6468a746dc7c1ca5a4c.exe 28 PID 1316 wrote to memory of 2456 1316 41b8acacf5c2e6468a746dc7c1ca5a4c.exe 28 PID 1316 wrote to memory of 2640 1316 41b8acacf5c2e6468a746dc7c1ca5a4c.exe 29 PID 1316 wrote to memory of 2640 1316 41b8acacf5c2e6468a746dc7c1ca5a4c.exe 29 PID 1316 wrote to memory of 2640 1316 41b8acacf5c2e6468a746dc7c1ca5a4c.exe 29 PID 1316 wrote to memory of 2640 1316 41b8acacf5c2e6468a746dc7c1ca5a4c.exe 29 PID 2456 wrote to memory of 2624 2456 Unicorn-38726.exe 30 PID 2456 wrote to memory of 2624 2456 Unicorn-38726.exe 30 PID 2456 wrote to memory of 2624 2456 Unicorn-38726.exe 30 PID 2456 wrote to memory of 2624 2456 Unicorn-38726.exe 30 PID 2624 wrote to memory of 1984 2624 Unicorn-8850.exe 31 PID 2624 wrote to memory of 1984 2624 Unicorn-8850.exe 31 PID 2624 wrote to memory of 1984 2624 Unicorn-8850.exe 31 PID 2624 wrote to memory of 1984 2624 Unicorn-8850.exe 31 PID 2640 wrote to memory of 2168 2640 Unicorn-9405.exe 32 PID 2640 wrote to memory of 2168 2640 Unicorn-9405.exe 32 PID 2640 wrote to memory of 2168 2640 Unicorn-9405.exe 32 PID 2640 wrote to memory of 2168 2640 Unicorn-9405.exe 32 PID 1984 wrote to memory of 2768 1984 Unicorn-55537.exe 33 PID 1984 wrote to memory of 2768 1984 Unicorn-55537.exe 33 PID 1984 wrote to memory of 2768 1984 Unicorn-55537.exe 33 PID 1984 wrote to memory of 2768 1984 Unicorn-55537.exe 33 PID 2768 wrote to memory of 1928 2768 Unicorn-22538.exe 34 PID 2768 wrote to memory of 1928 2768 Unicorn-22538.exe 34 PID 2768 wrote to memory of 1928 2768 Unicorn-22538.exe 34 PID 2768 wrote to memory of 1928 2768 Unicorn-22538.exe 34 PID 2168 wrote to memory of 2652 2168 Unicorn-51453.exe 35 PID 2168 wrote to memory of 2652 2168 Unicorn-51453.exe 35 PID 2168 wrote to memory of 2652 2168 Unicorn-51453.exe 35 PID 2168 wrote to memory of 2652 2168 Unicorn-51453.exe 35 PID 2652 wrote to memory of 1184 2652 Unicorn-22668.exe 36 PID 2652 wrote to memory of 1184 2652 Unicorn-22668.exe 36 PID 2652 wrote to memory of 1184 2652 Unicorn-22668.exe 36 PID 2652 wrote to memory of 1184 2652 Unicorn-22668.exe 36 PID 1928 wrote to memory of 1860 1928 Unicorn-20530.exe 37 PID 1928 wrote to memory of 1860 1928 Unicorn-20530.exe 37 PID 1928 wrote to memory of 1860 1928 Unicorn-20530.exe 37 PID 1928 wrote to memory of 1860 1928 Unicorn-20530.exe 37 PID 1928 wrote to memory of 2212 1928 Unicorn-20530.exe 39 PID 1928 wrote to memory of 2212 1928 Unicorn-20530.exe 39 PID 1928 wrote to memory of 2212 1928 Unicorn-20530.exe 39 PID 1928 wrote to memory of 2212 1928 Unicorn-20530.exe 39 PID 1184 wrote to memory of 2504 1184 Unicorn-53067.exe 38 PID 1184 wrote to memory of 2504 1184 Unicorn-53067.exe 38 PID 1184 wrote to memory of 2504 1184 Unicorn-53067.exe 38 PID 1184 wrote to memory of 2504 1184 Unicorn-53067.exe 38 PID 2652 wrote to memory of 2472 2652 Unicorn-22668.exe 40 PID 2652 wrote to memory of 2472 2652 Unicorn-22668.exe 40 PID 2652 wrote to memory of 2472 2652 Unicorn-22668.exe 40 PID 2652 wrote to memory of 2472 2652 Unicorn-22668.exe 40 PID 1860 wrote to memory of 692 1860 Unicorn-34593.exe 41 PID 1860 wrote to memory of 692 1860 Unicorn-34593.exe 41 PID 1860 wrote to memory of 692 1860 Unicorn-34593.exe 41 PID 1860 wrote to memory of 692 1860 Unicorn-34593.exe 41 PID 2472 wrote to memory of 1900 2472 Unicorn-29200.exe 43 PID 2472 wrote to memory of 1900 2472 Unicorn-29200.exe 43 PID 2472 wrote to memory of 1900 2472 Unicorn-29200.exe 43 PID 2472 wrote to memory of 1900 2472 Unicorn-29200.exe 43 PID 692 wrote to memory of 2688 692 Unicorn-30592.exe 42 PID 692 wrote to memory of 2688 692 Unicorn-30592.exe 42 PID 692 wrote to memory of 2688 692 Unicorn-30592.exe 42 PID 692 wrote to memory of 2688 692 Unicorn-30592.exe 42
Processes
-
C:\Users\Admin\AppData\Local\Temp\41b8acacf5c2e6468a746dc7c1ca5a4c.exe"C:\Users\Admin\AppData\Local\Temp\41b8acacf5c2e6468a746dc7c1ca5a4c.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1316 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38726.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38726.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-8850.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8850.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2624 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-55537.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55537.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1984 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22538.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22538.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-20530.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20530.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1928 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34593.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34593.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30592.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30592.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-25953.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25953.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6191.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6191.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14463.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14463.exe11⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45273.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45273.exe12⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:948 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5771.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5771.exe13⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1316 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9611.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9611.exe14⤵PID:1860
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36057.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36057.exe15⤵PID:828
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19185.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19185.exe11⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44282.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44282.exe12⤵
- Executes dropped EXE
PID:1812 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12351.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12351.exe13⤵PID:2376
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49508.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49508.exe14⤵PID:656
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6746.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6746.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-20494.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20494.exe10⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:552 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-20577.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20577.exe11⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:776 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17640.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17640.exe12⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3005.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3005.exe13⤵PID:932
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27353.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27353.exe10⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-41132.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41132.exe11⤵PID:2600
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31146.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31146.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13700.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13700.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3342.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3342.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1872 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-8817.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8817.exe10⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1112 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13176.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13176.exe11⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9663.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9663.exe12⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-7603.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7603.exe13⤵PID:2824
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27972.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27972.exe14⤵PID:1704
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13731.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13731.exe10⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40582.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40582.exe11⤵
- Suspicious use of SetWindowsHookEx
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-1251.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1251.exe12⤵PID:920
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11510.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11510.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14930.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14930.exe10⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:560 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-1687.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1687.exe11⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1468 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23426.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23426.exe12⤵PID:2112
-
-
-
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9405.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9405.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51453.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51453.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22668.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22668.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-53067.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53067.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1184 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44982.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44982.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60763.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60763.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:308 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-19679.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19679.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-31376.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31376.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:620 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-31843.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31843.exe10⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:628 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-29892.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29892.exe11⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1584 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38392.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38392.exe12⤵PID:2704
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24229.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24229.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:872 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13747.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13747.exe10⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-32170.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32170.exe11⤵PID:2580
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1204.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1204.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2016 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5008.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5008.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-65086.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65086.exe10⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2160 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2160 -s 24011⤵
- Program crash
PID:1720
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29200.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29200.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2472 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15839.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15839.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30696.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30696.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5563.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5563.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45574.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45574.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-64515.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64515.exe10⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1556 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1556 -s 20011⤵
- Program crash
PID:1512
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56902.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56902.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1436 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-32222.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32222.exe10⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2624 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15449.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15449.exe11⤵PID:1516
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19486.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19486.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58869.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58869.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1904 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-33976.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33976.exe10⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48636.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48636.exe11⤵PID:1628
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33388.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33388.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1476 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3425.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3425.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1508 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-31184.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31184.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:456 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46041.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46041.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1900
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7701.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7701.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3249.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3249.exe9⤵
- Executes dropped EXE
PID:1100 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13119.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13119.exe10⤵PID:2480
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35822.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35822.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13368.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13368.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30468.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30468.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-19534.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19534.exe10⤵PID:2228
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD5ddf4d41e08a64912da941f14de61155e
SHA1e6e4ee35657798b5b3c20e610ba8402c809a9f1d
SHA256e77a9457269777c0569e4d35134df0af0ebf36a8db02552fa36db3ed44f4c283
SHA5121e9848c90a6a1f6b10a7e21fccd99feb956c2cc720df7f8d3f7c7fa8b851c61ab60de9be9f172d5f0046d737e5ddcb659209b875fdcbc945f0bb9d4eadbad169
-
Filesize
184KB
MD57a44272dbd6c5c5a5ce1594618b7d97c
SHA1f46b0145513885675936b472044c014331b03f18
SHA256ff2a4d0563a72bb4f429c57781b32ea66d2e01be2544048e18ea1a25ea684b1c
SHA512d9fb40ef41e359713daa746ec3b1d59ecfd5efc433af0c3ebc6febf9759da9433a08d6900d876de687c08ea91df3214f67d60771e1b7825545ce2151605e1885
-
Filesize
8KB
MD569f16188d6d40775128d5bb7c4078f7d
SHA137f6b74391422734ef8d6ae0fca21ebecef3693f
SHA256c01bc1d23c163c85b5633682e3c7696bf60befc07f5257aee6b50c642f312d93
SHA512b0a256547fea75e60fa9a207bdbb67da48698ede1918bacd9bccb3dfd84bcafadaf493924fd3978fd15e02ef038b453de9909f457204701dee5a0975423e5380
-
Filesize
184KB
MD5b8c7bb1ac2232212ed28881d1fcf3011
SHA1e6f1c1700e568654a8b4799412da1473b96e9152
SHA256d0a248365704c69955f16d749f9303b6abf5d749da73d40f52f61ae5db30d5e9
SHA51213f2ccbbc88d32dd91a9a5a60619bbb391f325a02b75ed59f1edd3e5e504d1c5b36dfd424f9f4273c968ecc071f998a3848ea73d7712bf23370d41fb9c79069d
-
Filesize
184KB
MD5c69a1f5476e03b68dc12a5b21b60f7b2
SHA1773432211e61d81b834ff1238a75e9f7a266d341
SHA256984fbcf4e43523b4140416c550788842f1a37c5035aaedaebebbc1505beadc28
SHA51203462dfecf9438f8683cf92875d87bbd34a40abe574a9a5dbd0d6b0f2a1058f4d4472d74cee32cb01c456448b94063eeb67d3f2ab2e87a7913d0724f3bc404f5
-
Filesize
184KB
MD5530740320be1330dcf89f48d7892eb38
SHA1c03f2699e905b63e98add0f29d3624831ddcc6da
SHA2561d1fda2bccc30fdb7ad29e3a0adea59ac5b104181a64603cebed0049caa221fb
SHA512887b985ace504834f78fd470899351741ed2cb7f1fd443d17b78cbba4341db63a01a7de22fe1811bffb71ca808465d25e929751ff01c9f163c1d79d4613cfc15
-
Filesize
184KB
MD59ab0aaa28917051ca343e005a2eb3517
SHA11b5fd0805b614e9b9b7c5dfa3d9782540ba9dfdf
SHA25663994ec3003ab719f53e694e3e4bd7e12aa7411e46894a7de3d59e6eecb8a63b
SHA512f42b1877606557e2ff9c13a0258db76c023c7aeafc00d6efa9e7e21efbb9dcaf95eb54e3fb8e2063481ac7e0290c5c731fa39986e86c7f3d3b6b0a5a04544320
-
Filesize
184KB
MD5a026a7137105a39d321ead1fa64881e4
SHA1caad76e372b5cf1c4aebfee56fcbc455ecf6ae06
SHA256afa79bc116f4df78f835c140929eebffb686af87418360e3f159a2bc83bb6f05
SHA512022386c0e9b12d4554cf2295f20ce7047abc2e0bae8dc60680ade227005c3055dfed6ce633e611f7b7bdf5cf9df913f32e7b979eeb25231a57750fc6eb8e0c97
-
Filesize
184KB
MD556fa31d55af5c538be308373ba044cba
SHA1824226f5e75a655a400cb5e4dee804220fdc167d
SHA256eac49f04d2cf904363aae12b903d42b4a6357ee1b9d1a52abc2d541677d69388
SHA51239526b2501b63c98e8c8eb8b3bd0bb02fa4bc9eeec6ac655ef0e9e093dc046461e245b567f78908ce5e353b22a9be0865284bc42c05b8c9446a2c5150e4363ee
-
Filesize
19KB
MD5e0008a2fdb753a0a26ae2eea8a32b060
SHA1930e79f90e327927a4ec08282ceb8c5cab29ba95
SHA256919b04bcc5aa9054dabcc2c2bb06b4a00ea5e631789f9507ee168825c449462f
SHA512adce14047e52fe95c7410b0a73f52627f47e6585496fcc5fb77cc031f0baf29dff542dc76da4f0b9413c3f000b06ceb8f84b0df07419c287b1eb49158204dfc5
-
Filesize
184KB
MD59e390f0c6d2f50905775d5a9f3b014f1
SHA1d89ae14de8df64156c58b9fca2f6c21fa858dbfd
SHA256f74073d7485dc3c4135d2a45e02873787f2a75a7a0d590d8683e3ff8a3fe228e
SHA5125ffa3a14b0722a66104b3b51f1e1c1e067c77d8802e40f0246cbde4b1487afc8b14b9af67cb4934ebe8e792a468da8661ed995951c26c41e3ba43b6946d227bd
-
Filesize
184KB
MD52f62a158fd38e8a3abca54900d3d672b
SHA12da0f30b431b1a829a741bf6dfe972c0ed1f35c0
SHA2564fce4113aa3721485077fe43f4a775b214bc74b1eb6dde4fbf1dcdac7180d4f7
SHA51261492771cb41689260c9700ea68cef9fd013a57d3b7137bbda1f3cc94057ff82298b0652c0baeebbc6deaab58824915cdd4fef42246efc7d9dfc24c8a97d8a6d
-
Filesize
184KB
MD542800819d262212f81c8393f4ed31a29
SHA1d9e28c0d1a63e55018c38a9b985201acf44a0e63
SHA256e0d43b59edaef9b694ab53bf828d8dcc76428aa509be60fb52f4f8e3ad089e27
SHA512f3d5d02f58f990fa9eb6d1ab0a564c5456ba3c70252b4f9f5832cfed234acd920ef565373fa013d17a734abb23cabbe95013a3b0c51bdc0b46556230c1bb3e13
-
Filesize
184KB
MD5a9da98d930be28e1b896bf5b638e6cf2
SHA13480b583995bd564ff524f333d1af1a59a9f31cc
SHA256c17c5365c9c26b1a49bf5c557367adae3319c0787ad308fec9432f2c3c3fbbe9
SHA5123daffb0a76aba52db58e14b324eb149a57f6485b7cf3e1e739d71f793b1df0263813edcb59ebdc9089ee96e46c50d271567888d0a05da53fd3c7ec9b16c0a572
-
Filesize
184KB
MD59e31abb609a5394fd6793eed498f6c6c
SHA1c460a869d9e8a119f97415ddb857af4fbb651b0e
SHA2560a8aa1b76f145a8b9d636d6d4b9771c206c8a12097ae0e215d4ea6afd3a051bd
SHA5126d2c126049452a620f336eb796ffceb9f97ecb2d0601dc3fb901a2ec10cd05c3c805acb01345b1fe9de467c69f173e700443d558b40c703680363c4ba8350aa4
-
Filesize
184KB
MD5f9627b11e1f75d120d3a1d03dd6542a5
SHA178d53834d0bcf15687419c3cfa56f05a67de7c1b
SHA2565f3a47600f268341d917782d994c91020f583aa000ccaf891c953857740cb399
SHA512dbfa3907d2d17d8cc955998e82385d3e6c390a04bb4f411390d13ab019ddf4c1d3e047a7d0f6126d5e5b74077fd60c2fcc7080c4e514b144baf21e46e989bf76
-
Filesize
184KB
MD5d92c4a09e022d36891348bf10fddff2a
SHA12bdfa3bc57935364b245bba8c871a614b69a2b98
SHA2568edf2e2b4cf81d6461d5b8b2dfe62621b97d7c3f1454a80073c4261f2b6eb5de
SHA512db87483911f2bb3a429bfca338dc884f6874e75b4edce032b3cb431349c73cb1a461cce4b8b70875b3498701c5290671f8cc326cc0400f317a2198ce2db98cfc
-
Filesize
184KB
MD5fe599543eeae626be7398a9ef8971a9b
SHA1a831bf0b85c40c2fe31f259d2a827dd76dcd6193
SHA2562ee54d8a4185ae2820687889317dba2887db4f78a26759f2b499df4ff6f463c7
SHA51250e8130f1eb73adeba7bb13237b09a9cd80aa77dd96ac3b88501eaf07f5e7b0bbed4f9ee6d3528f0f7ca49f0d8805f7f9ed4226416b6e48e6d34e55d5e1ade52
-
Filesize
184KB
MD5561eb98bdbb661e1896baa80d8a4dc24
SHA1451bb8ffdb2e64c772e37ace2e9553aaf7dbbb78
SHA256c9344c397cdae827aeb97bc33377c52db77d08b5f4d200dcea57f6f2b48cede6
SHA51243fc965d600ec47168fcac7ef04fb17d99ef11683a2da094268b20d26f8c3786dfc00231d61a213adbaba48266b0ab4ef0cd92693b76975f27542816f866653b
-
Filesize
184KB
MD5c1bbfae9d9b9948ed5a84b9312887343
SHA198307179d854002178a3c93af96b330d52b72d5b
SHA2568a75045fda587ef5d1eac86b0b18b02ac0fbbf755715059c044d3ebec79887d1
SHA512126dfba205587a64bb4bc106d5fa376d7b5d84bf712e0aea0ecb4832170019994823ca78158095dcf7ffe0822f3136300a490e84ac2c4650b27b72b61de71e78
-
Filesize
184KB
MD5da9906678dccb8a171ec9d99139877dc
SHA122f2a4bd73fd7254137a42ca6962033b5e8a3208
SHA2566d9dcefb32d4eca33a2db5559011e1c1d68122728d4ec643460c54d613167f4e
SHA5126b08606b2ed3c605bea48af1221387b1d29818995f9f69fa682e8a68d83607a5450afc83e131711c224473ddb3200297b40a10425d596a88a958de328cab27d5