Analysis

  • max time kernel
    215s
  • max time network
    283s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    04-01-2024 19:30

General

  • Target

    41b8acacf5c2e6468a746dc7c1ca5a4c.exe

  • Size

    184KB

  • MD5

    41b8acacf5c2e6468a746dc7c1ca5a4c

  • SHA1

    fb27e8ebf31110a836c5cf3b28c7dcebbf460cb5

  • SHA256

    bb9a394665b34d50802fd8790fa649fc5f86bd21248347ed2e3c5a02bc2096bc

  • SHA512

    2b65fbcc48a27b869c5bf867b315c0334c80c6749df123f9d6bc214373b12a6ca611f910132de21bcf6463b9bf73f903c373f60cf2db0f670b6ad94c1029ebdb

  • SSDEEP

    3072:n65+oz/PfYA01OjfdTCTI8FyKGg6OnfIZDEx8QPPQNlPvpF+:n6Uoj501gdmTI8FQd5NlPvpF

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 64 IoCs
  • Loads dropped DLL 64 IoCs
  • Program crash 2 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\41b8acacf5c2e6468a746dc7c1ca5a4c.exe
    "C:\Users\Admin\AppData\Local\Temp\41b8acacf5c2e6468a746dc7c1ca5a4c.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1316
    • C:\Users\Admin\AppData\Local\Temp\Unicorn-38726.exe
      C:\Users\Admin\AppData\Local\Temp\Unicorn-38726.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2456
      • C:\Users\Admin\AppData\Local\Temp\Unicorn-8850.exe
        C:\Users\Admin\AppData\Local\Temp\Unicorn-8850.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2624
        • C:\Users\Admin\AppData\Local\Temp\Unicorn-55537.exe
          C:\Users\Admin\AppData\Local\Temp\Unicorn-55537.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1984
          • C:\Users\Admin\AppData\Local\Temp\Unicorn-22538.exe
            C:\Users\Admin\AppData\Local\Temp\Unicorn-22538.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2768
            • C:\Users\Admin\AppData\Local\Temp\Unicorn-20530.exe
              C:\Users\Admin\AppData\Local\Temp\Unicorn-20530.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:1928
              • C:\Users\Admin\AppData\Local\Temp\Unicorn-34593.exe
                C:\Users\Admin\AppData\Local\Temp\Unicorn-34593.exe
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:1860
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-30592.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-30592.exe
                  8⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:692
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-25953.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-25953.exe
                    9⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of SetWindowsHookEx
                    PID:2688
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-6191.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-6191.exe
                      10⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Suspicious use of SetWindowsHookEx
                      PID:2552
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-14463.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-14463.exe
                        11⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:2896
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-45273.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-45273.exe
                          12⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:948
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-5771.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-5771.exe
                            13⤵
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            PID:1316
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-9611.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-9611.exe
                              14⤵
                                PID:1860
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-36057.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-36057.exe
                                  15⤵
                                    PID:828
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-19185.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-19185.exe
                            11⤵
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            PID:1596
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-44282.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-44282.exe
                              12⤵
                              • Executes dropped EXE
                              PID:1812
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-12351.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-12351.exe
                                13⤵
                                  PID:2376
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-49508.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-49508.exe
                                    14⤵
                                      PID:656
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-6746.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-6746.exe
                            9⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Suspicious use of SetWindowsHookEx
                            PID:2940
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-20494.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-20494.exe
                              10⤵
                              • Executes dropped EXE
                              • Suspicious use of SetWindowsHookEx
                              PID:552
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-20577.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-20577.exe
                                11⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                PID:776
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-17640.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-17640.exe
                                  12⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetWindowsHookEx
                                  PID:2856
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-3005.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-3005.exe
                                    13⤵
                                      PID:932
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-27353.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-27353.exe
                                10⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                PID:2432
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-41132.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-41132.exe
                                  11⤵
                                    PID:2600
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-31146.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-31146.exe
                            7⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Suspicious use of SetWindowsHookEx
                            PID:2212
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-13700.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-13700.exe
                              8⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • Suspicious use of SetWindowsHookEx
                              PID:2848
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-3342.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-3342.exe
                                9⤵
                                • Executes dropped EXE
                                • Loads dropped DLL
                                • Suspicious use of SetWindowsHookEx
                                PID:1872
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-8817.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-8817.exe
                                  10⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetWindowsHookEx
                                  PID:1112
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-13176.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-13176.exe
                                    11⤵
                                    • Executes dropped EXE
                                    • Suspicious use of SetWindowsHookEx
                                    PID:2656
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-9663.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-9663.exe
                                      12⤵
                                      • Executes dropped EXE
                                      • Suspicious use of SetWindowsHookEx
                                      PID:2788
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-7603.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-7603.exe
                                        13⤵
                                          PID:2824
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-27972.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-27972.exe
                                            14⤵
                                              PID:1704
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-13731.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-13731.exe
                                      10⤵
                                      • Executes dropped EXE
                                      • Suspicious use of SetWindowsHookEx
                                      PID:2364
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-40582.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-40582.exe
                                        11⤵
                                        • Suspicious use of SetWindowsHookEx
                                        PID:2776
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-1251.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-1251.exe
                                          12⤵
                                            PID:920
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-11510.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-11510.exe
                                      9⤵
                                      • Executes dropped EXE
                                      • Suspicious use of SetWindowsHookEx
                                      PID:1148
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-14930.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-14930.exe
                                        10⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetWindowsHookEx
                                        PID:560
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-1687.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-1687.exe
                                          11⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetWindowsHookEx
                                          PID:1468
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-23426.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-23426.exe
                                            12⤵
                                              PID:2112
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-9405.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-9405.exe
                          2⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Suspicious use of SetWindowsHookEx
                          • Suspicious use of WriteProcessMemory
                          PID:2640
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-51453.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-51453.exe
                            3⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Suspicious use of SetWindowsHookEx
                            • Suspicious use of WriteProcessMemory
                            PID:2168
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-22668.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-22668.exe
                              4⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • Suspicious use of SetWindowsHookEx
                              • Suspicious use of WriteProcessMemory
                              PID:2652
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-53067.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-53067.exe
                                5⤵
                                • Executes dropped EXE
                                • Loads dropped DLL
                                • Suspicious use of SetWindowsHookEx
                                • Suspicious use of WriteProcessMemory
                                PID:1184
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-44982.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-44982.exe
                                  6⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Suspicious use of SetWindowsHookEx
                                  PID:2504
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-60763.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-60763.exe
                                    7⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • Suspicious use of SetWindowsHookEx
                                    PID:308
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-19679.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-19679.exe
                                      8⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Suspicious use of SetWindowsHookEx
                                      PID:2760
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-31376.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-31376.exe
                                        9⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetWindowsHookEx
                                        PID:620
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-31843.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-31843.exe
                                          10⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetWindowsHookEx
                                          PID:628
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-29892.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-29892.exe
                                            11⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetWindowsHookEx
                                            PID:1584
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-38392.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-38392.exe
                                              12⤵
                                                PID:2704
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-24229.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-24229.exe
                                          9⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetWindowsHookEx
                                          PID:872
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-13747.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-13747.exe
                                            10⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetWindowsHookEx
                                            PID:1744
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-32170.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-32170.exe
                                              11⤵
                                                PID:2580
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-1204.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-1204.exe
                                          8⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetWindowsHookEx
                                          PID:2016
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-5008.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-5008.exe
                                            9⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetWindowsHookEx
                                            PID:2012
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-65086.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-65086.exe
                                              10⤵
                                              • Executes dropped EXE
                                              • Suspicious use of SetWindowsHookEx
                                              PID:2160
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -u -p 2160 -s 240
                                                11⤵
                                                • Program crash
                                                PID:1720
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-29200.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-29200.exe
                                    5⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • Suspicious use of SetWindowsHookEx
                                    • Suspicious use of WriteProcessMemory
                                    PID:2472
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-15839.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-15839.exe
                                      6⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Suspicious use of SetWindowsHookEx
                                      PID:1900
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-30696.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-30696.exe
                                        7⤵
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        • Suspicious use of SetWindowsHookEx
                                        PID:2892
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-5563.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-5563.exe
                                          8⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          • Suspicious use of SetWindowsHookEx
                                          PID:2228
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-45574.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-45574.exe
                                            9⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetWindowsHookEx
                                            PID:2252
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-64515.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-64515.exe
                                              10⤵
                                              • Executes dropped EXE
                                              • Suspicious use of SetWindowsHookEx
                                              PID:1556
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -u -p 1556 -s 200
                                                11⤵
                                                • Program crash
                                                PID:1512
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-56902.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-56902.exe
                                            9⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetWindowsHookEx
                                            PID:1436
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-32222.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-32222.exe
                                              10⤵
                                              • Executes dropped EXE
                                              • Suspicious use of SetWindowsHookEx
                                              PID:2624
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-15449.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-15449.exe
                                                11⤵
                                                  PID:1516
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-19486.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-19486.exe
                                            8⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetWindowsHookEx
                                            PID:2100
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-58869.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-58869.exe
                                              9⤵
                                              • Executes dropped EXE
                                              • Suspicious use of SetWindowsHookEx
                                              PID:1904
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-33976.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-33976.exe
                                                10⤵
                                                • Executes dropped EXE
                                                • Suspicious use of SetWindowsHookEx
                                                PID:1656
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-48636.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-48636.exe
                                                  11⤵
                                                    PID:1628
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-33388.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-33388.exe
                                          6⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          • Suspicious use of SetWindowsHookEx
                                          PID:1476
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-3425.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-3425.exe
                                            7⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetWindowsHookEx
                                            PID:1508
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-31184.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-31184.exe
                                              8⤵
                                              • Executes dropped EXE
                                              • Suspicious use of SetWindowsHookEx
                                              PID:456
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-46041.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-46041.exe
                                                9⤵
                                                • Executes dropped EXE
                                                • Suspicious use of SetWindowsHookEx
                                                PID:1900
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-7701.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-7701.exe
                                              8⤵
                                              • Executes dropped EXE
                                              • Suspicious use of SetWindowsHookEx
                                              PID:1700
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-3249.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-3249.exe
                                                9⤵
                                                • Executes dropped EXE
                                                PID:1100
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-13119.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-13119.exe
                                                  10⤵
                                                    PID:2480
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-35822.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-35822.exe
                                              7⤵
                                              • Executes dropped EXE
                                              • Suspicious use of SetWindowsHookEx
                                              PID:3024
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-13368.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-13368.exe
                                                8⤵
                                                • Executes dropped EXE
                                                • Suspicious use of SetWindowsHookEx
                                                PID:2056
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-30468.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-30468.exe
                                                  9⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:2468
                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-19534.exe
                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-19534.exe
                                                    10⤵
                                                      PID:2228

                                  Network

                                  MITRE ATT&CK Matrix

                                  Replay Monitor

                                  Loading Replay Monitor...

                                  Downloads

                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-15839.exe

                                    Filesize

                                    184KB

                                    MD5

                                    ddf4d41e08a64912da941f14de61155e

                                    SHA1

                                    e6e4ee35657798b5b3c20e610ba8402c809a9f1d

                                    SHA256

                                    e77a9457269777c0569e4d35134df0af0ebf36a8db02552fa36db3ed44f4c283

                                    SHA512

                                    1e9848c90a6a1f6b10a7e21fccd99feb956c2cc720df7f8d3f7c7fa8b851c61ab60de9be9f172d5f0046d737e5ddcb659209b875fdcbc945f0bb9d4eadbad169

                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-22538.exe

                                    Filesize

                                    184KB

                                    MD5

                                    7a44272dbd6c5c5a5ce1594618b7d97c

                                    SHA1

                                    f46b0145513885675936b472044c014331b03f18

                                    SHA256

                                    ff2a4d0563a72bb4f429c57781b32ea66d2e01be2544048e18ea1a25ea684b1c

                                    SHA512

                                    d9fb40ef41e359713daa746ec3b1d59ecfd5efc433af0c3ebc6febf9759da9433a08d6900d876de687c08ea91df3214f67d60771e1b7825545ce2151605e1885

                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-22668.exe

                                    Filesize

                                    8KB

                                    MD5

                                    69f16188d6d40775128d5bb7c4078f7d

                                    SHA1

                                    37f6b74391422734ef8d6ae0fca21ebecef3693f

                                    SHA256

                                    c01bc1d23c163c85b5633682e3c7696bf60befc07f5257aee6b50c642f312d93

                                    SHA512

                                    b0a256547fea75e60fa9a207bdbb67da48698ede1918bacd9bccb3dfd84bcafadaf493924fd3978fd15e02ef038b453de9909f457204701dee5a0975423e5380

                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-5563.exe

                                    Filesize

                                    184KB

                                    MD5

                                    b8c7bb1ac2232212ed28881d1fcf3011

                                    SHA1

                                    e6f1c1700e568654a8b4799412da1473b96e9152

                                    SHA256

                                    d0a248365704c69955f16d749f9303b6abf5d749da73d40f52f61ae5db30d5e9

                                    SHA512

                                    13f2ccbbc88d32dd91a9a5a60619bbb391f325a02b75ed59f1edd3e5e504d1c5b36dfd424f9f4273c968ecc071f998a3848ea73d7712bf23370d41fb9c79069d

                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-5771.exe

                                    Filesize

                                    184KB

                                    MD5

                                    c69a1f5476e03b68dc12a5b21b60f7b2

                                    SHA1

                                    773432211e61d81b834ff1238a75e9f7a266d341

                                    SHA256

                                    984fbcf4e43523b4140416c550788842f1a37c5035aaedaebebbc1505beadc28

                                    SHA512

                                    03462dfecf9438f8683cf92875d87bbd34a40abe574a9a5dbd0d6b0f2a1058f4d4472d74cee32cb01c456448b94063eeb67d3f2ab2e87a7913d0724f3bc404f5

                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-6191.exe

                                    Filesize

                                    184KB

                                    MD5

                                    530740320be1330dcf89f48d7892eb38

                                    SHA1

                                    c03f2699e905b63e98add0f29d3624831ddcc6da

                                    SHA256

                                    1d1fda2bccc30fdb7ad29e3a0adea59ac5b104181a64603cebed0049caa221fb

                                    SHA512

                                    887b985ace504834f78fd470899351741ed2cb7f1fd443d17b78cbba4341db63a01a7de22fe1811bffb71ca808465d25e929751ff01c9f163c1d79d4613cfc15

                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-8850.exe

                                    Filesize

                                    184KB

                                    MD5

                                    9ab0aaa28917051ca343e005a2eb3517

                                    SHA1

                                    1b5fd0805b614e9b9b7c5dfa3d9782540ba9dfdf

                                    SHA256

                                    63994ec3003ab719f53e694e3e4bd7e12aa7411e46894a7de3d59e6eecb8a63b

                                    SHA512

                                    f42b1877606557e2ff9c13a0258db76c023c7aeafc00d6efa9e7e21efbb9dcaf95eb54e3fb8e2063481ac7e0290c5c731fa39986e86c7f3d3b6b0a5a04544320

                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-9405.exe

                                    Filesize

                                    184KB

                                    MD5

                                    a026a7137105a39d321ead1fa64881e4

                                    SHA1

                                    caad76e372b5cf1c4aebfee56fcbc455ecf6ae06

                                    SHA256

                                    afa79bc116f4df78f835c140929eebffb686af87418360e3f159a2bc83bb6f05

                                    SHA512

                                    022386c0e9b12d4554cf2295f20ce7047abc2e0bae8dc60680ade227005c3055dfed6ce633e611f7b7bdf5cf9df913f32e7b979eeb25231a57750fc6eb8e0c97

                                  • \Users\Admin\AppData\Local\Temp\Unicorn-20530.exe

                                    Filesize

                                    184KB

                                    MD5

                                    56fa31d55af5c538be308373ba044cba

                                    SHA1

                                    824226f5e75a655a400cb5e4dee804220fdc167d

                                    SHA256

                                    eac49f04d2cf904363aae12b903d42b4a6357ee1b9d1a52abc2d541677d69388

                                    SHA512

                                    39526b2501b63c98e8c8eb8b3bd0bb02fa4bc9eeec6ac655ef0e9e093dc046461e245b567f78908ce5e353b22a9be0865284bc42c05b8c9446a2c5150e4363ee

                                  • \Users\Admin\AppData\Local\Temp\Unicorn-20530.exe

                                    Filesize

                                    19KB

                                    MD5

                                    e0008a2fdb753a0a26ae2eea8a32b060

                                    SHA1

                                    930e79f90e327927a4ec08282ceb8c5cab29ba95

                                    SHA256

                                    919b04bcc5aa9054dabcc2c2bb06b4a00ea5e631789f9507ee168825c449462f

                                    SHA512

                                    adce14047e52fe95c7410b0a73f52627f47e6585496fcc5fb77cc031f0baf29dff542dc76da4f0b9413c3f000b06ceb8f84b0df07419c287b1eb49158204dfc5

                                  • \Users\Admin\AppData\Local\Temp\Unicorn-22668.exe

                                    Filesize

                                    184KB

                                    MD5

                                    9e390f0c6d2f50905775d5a9f3b014f1

                                    SHA1

                                    d89ae14de8df64156c58b9fca2f6c21fa858dbfd

                                    SHA256

                                    f74073d7485dc3c4135d2a45e02873787f2a75a7a0d590d8683e3ff8a3fe228e

                                    SHA512

                                    5ffa3a14b0722a66104b3b51f1e1c1e067c77d8802e40f0246cbde4b1487afc8b14b9af67cb4934ebe8e792a468da8661ed995951c26c41e3ba43b6946d227bd

                                  • \Users\Admin\AppData\Local\Temp\Unicorn-25953.exe

                                    Filesize

                                    184KB

                                    MD5

                                    2f62a158fd38e8a3abca54900d3d672b

                                    SHA1

                                    2da0f30b431b1a829a741bf6dfe972c0ed1f35c0

                                    SHA256

                                    4fce4113aa3721485077fe43f4a775b214bc74b1eb6dde4fbf1dcdac7180d4f7

                                    SHA512

                                    61492771cb41689260c9700ea68cef9fd013a57d3b7137bbda1f3cc94057ff82298b0652c0baeebbc6deaab58824915cdd4fef42246efc7d9dfc24c8a97d8a6d

                                  • \Users\Admin\AppData\Local\Temp\Unicorn-29200.exe

                                    Filesize

                                    184KB

                                    MD5

                                    42800819d262212f81c8393f4ed31a29

                                    SHA1

                                    d9e28c0d1a63e55018c38a9b985201acf44a0e63

                                    SHA256

                                    e0d43b59edaef9b694ab53bf828d8dcc76428aa509be60fb52f4f8e3ad089e27

                                    SHA512

                                    f3d5d02f58f990fa9eb6d1ab0a564c5456ba3c70252b4f9f5832cfed234acd920ef565373fa013d17a734abb23cabbe95013a3b0c51bdc0b46556230c1bb3e13

                                  • \Users\Admin\AppData\Local\Temp\Unicorn-30592.exe

                                    Filesize

                                    184KB

                                    MD5

                                    a9da98d930be28e1b896bf5b638e6cf2

                                    SHA1

                                    3480b583995bd564ff524f333d1af1a59a9f31cc

                                    SHA256

                                    c17c5365c9c26b1a49bf5c557367adae3319c0787ad308fec9432f2c3c3fbbe9

                                    SHA512

                                    3daffb0a76aba52db58e14b324eb149a57f6485b7cf3e1e739d71f793b1df0263813edcb59ebdc9089ee96e46c50d271567888d0a05da53fd3c7ec9b16c0a572

                                  • \Users\Admin\AppData\Local\Temp\Unicorn-31146.exe

                                    Filesize

                                    184KB

                                    MD5

                                    9e31abb609a5394fd6793eed498f6c6c

                                    SHA1

                                    c460a869d9e8a119f97415ddb857af4fbb651b0e

                                    SHA256

                                    0a8aa1b76f145a8b9d636d6d4b9771c206c8a12097ae0e215d4ea6afd3a051bd

                                    SHA512

                                    6d2c126049452a620f336eb796ffceb9f97ecb2d0601dc3fb901a2ec10cd05c3c805acb01345b1fe9de467c69f173e700443d558b40c703680363c4ba8350aa4

                                  • \Users\Admin\AppData\Local\Temp\Unicorn-34593.exe

                                    Filesize

                                    184KB

                                    MD5

                                    f9627b11e1f75d120d3a1d03dd6542a5

                                    SHA1

                                    78d53834d0bcf15687419c3cfa56f05a67de7c1b

                                    SHA256

                                    5f3a47600f268341d917782d994c91020f583aa000ccaf891c953857740cb399

                                    SHA512

                                    dbfa3907d2d17d8cc955998e82385d3e6c390a04bb4f411390d13ab019ddf4c1d3e047a7d0f6126d5e5b74077fd60c2fcc7080c4e514b144baf21e46e989bf76

                                  • \Users\Admin\AppData\Local\Temp\Unicorn-38726.exe

                                    Filesize

                                    184KB

                                    MD5

                                    d92c4a09e022d36891348bf10fddff2a

                                    SHA1

                                    2bdfa3bc57935364b245bba8c871a614b69a2b98

                                    SHA256

                                    8edf2e2b4cf81d6461d5b8b2dfe62621b97d7c3f1454a80073c4261f2b6eb5de

                                    SHA512

                                    db87483911f2bb3a429bfca338dc884f6874e75b4edce032b3cb431349c73cb1a461cce4b8b70875b3498701c5290671f8cc326cc0400f317a2198ce2db98cfc

                                  • \Users\Admin\AppData\Local\Temp\Unicorn-44982.exe

                                    Filesize

                                    184KB

                                    MD5

                                    fe599543eeae626be7398a9ef8971a9b

                                    SHA1

                                    a831bf0b85c40c2fe31f259d2a827dd76dcd6193

                                    SHA256

                                    2ee54d8a4185ae2820687889317dba2887db4f78a26759f2b499df4ff6f463c7

                                    SHA512

                                    50e8130f1eb73adeba7bb13237b09a9cd80aa77dd96ac3b88501eaf07f5e7b0bbed4f9ee6d3528f0f7ca49f0d8805f7f9ed4226416b6e48e6d34e55d5e1ade52

                                  • \Users\Admin\AppData\Local\Temp\Unicorn-51453.exe

                                    Filesize

                                    184KB

                                    MD5

                                    561eb98bdbb661e1896baa80d8a4dc24

                                    SHA1

                                    451bb8ffdb2e64c772e37ace2e9553aaf7dbbb78

                                    SHA256

                                    c9344c397cdae827aeb97bc33377c52db77d08b5f4d200dcea57f6f2b48cede6

                                    SHA512

                                    43fc965d600ec47168fcac7ef04fb17d99ef11683a2da094268b20d26f8c3786dfc00231d61a213adbaba48266b0ab4ef0cd92693b76975f27542816f866653b

                                  • \Users\Admin\AppData\Local\Temp\Unicorn-53067.exe

                                    Filesize

                                    184KB

                                    MD5

                                    c1bbfae9d9b9948ed5a84b9312887343

                                    SHA1

                                    98307179d854002178a3c93af96b330d52b72d5b

                                    SHA256

                                    8a75045fda587ef5d1eac86b0b18b02ac0fbbf755715059c044d3ebec79887d1

                                    SHA512

                                    126dfba205587a64bb4bc106d5fa376d7b5d84bf712e0aea0ecb4832170019994823ca78158095dcf7ffe0822f3136300a490e84ac2c4650b27b72b61de71e78

                                  • \Users\Admin\AppData\Local\Temp\Unicorn-55537.exe

                                    Filesize

                                    184KB

                                    MD5

                                    da9906678dccb8a171ec9d99139877dc

                                    SHA1

                                    22f2a4bd73fd7254137a42ca6962033b5e8a3208

                                    SHA256

                                    6d9dcefb32d4eca33a2db5559011e1c1d68122728d4ec643460c54d613167f4e

                                    SHA512

                                    6b08606b2ed3c605bea48af1221387b1d29818995f9f69fa682e8a68d83607a5450afc83e131711c224473ddb3200297b40a10425d596a88a958de328cab27d5