Analysis
-
max time kernel
150s -
max time network
126s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
05/01/2024, 08:11
Static task
static1
Behavioral task
behavioral1
Sample
4330bf1ca8b637650b8cda55a3414b89.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
4330bf1ca8b637650b8cda55a3414b89.exe
Resource
win10v2004-20231222-en
General
-
Target
4330bf1ca8b637650b8cda55a3414b89.exe
-
Size
184KB
-
MD5
4330bf1ca8b637650b8cda55a3414b89
-
SHA1
be6523e0e77397d3218a1550b89b09eab5b3a3cb
-
SHA256
a78af26aac88819bc8d9acc9d8e55a20e824cd0e705ce45ba433547342c7dc66
-
SHA512
23a62b1314e18e67652495e16a360b00a193b8b695827c640f836fefc6af054c3acd1fe3b31e9186b7289faeedca853769bbdc57e9fa863346424f9d99d45fb1
-
SSDEEP
3072:M2IjoznZfyAd1OjDd6sWA8vbjhI6YDfIfSExgHPawNlPvpFM:M2AoNXd1AdHWA8mQyzNlPvpF
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2664 Unicorn-20363.exe 2820 Unicorn-33077.exe 2728 Unicorn-37907.exe 2840 Unicorn-22574.exe 2580 Unicorn-60269.exe 2860 Unicorn-31126.exe 1868 Unicorn-56912.exe 588 Unicorn-4374.exe 572 Unicorn-58147.exe 2920 Unicorn-22137.exe 2848 Unicorn-50171.exe 1612 Unicorn-40152.exe 1036 Unicorn-10625.exe 1964 Unicorn-60018.exe 1504 Unicorn-55031.exe 1204 Unicorn-58518.exe 2064 Unicorn-21207.exe 3000 Unicorn-37735.exe 2440 Unicorn-50926.exe 1100 Unicorn-16433.exe 1828 Unicorn-56505.exe 2776 Unicorn-46261.exe 1608 Unicorn-11061.exe 2248 Unicorn-52094.exe 2448 Unicorn-55389.exe 1800 Unicorn-34414.exe 908 Unicorn-63749.exe 2084 Unicorn-26246.exe 884 Unicorn-12021.exe 2232 Unicorn-47797.exe 1816 Unicorn-44886.exe 2196 Unicorn-42617.exe 544 Unicorn-55768.exe 2816 Unicorn-52431.exe 2792 Unicorn-6951.exe 2720 Unicorn-19950.exe 2708 Unicorn-5135.exe 3056 Unicorn-61544.exe 3052 Unicorn-17558.exe 2664 Unicorn-55981.exe 1876 Unicorn-60812.exe 1000 Unicorn-56365.exe 2928 Unicorn-43402.exe 2824 Unicorn-43402.exe 2168 Unicorn-63417.exe 2504 Unicorn-26106.exe 1572 Unicorn-65529.exe 1348 Unicorn-4782.exe 1624 Unicorn-13142.exe 1824 Unicorn-24989.exe 1512 Unicorn-61575.exe 2312 Unicorn-60636.exe 1732 Unicorn-60636.exe 1720 Unicorn-26812.exe 2352 Unicorn-2499.exe 2452 Unicorn-2499.exe 2996 Unicorn-58643.exe 2860 Unicorn-47865.exe 1644 Unicorn-9629.exe 2080 Unicorn-24451.exe 1676 Unicorn-31851.exe 1704 Unicorn-27632.exe 2072 Unicorn-14668.exe 2700 Unicorn-46573.exe -
Loads dropped DLL 64 IoCs
pid Process 1932 4330bf1ca8b637650b8cda55a3414b89.exe 1932 4330bf1ca8b637650b8cda55a3414b89.exe 2664 Unicorn-20363.exe 2664 Unicorn-20363.exe 1932 4330bf1ca8b637650b8cda55a3414b89.exe 1932 4330bf1ca8b637650b8cda55a3414b89.exe 2820 Unicorn-33077.exe 2820 Unicorn-33077.exe 2728 Unicorn-37907.exe 2664 Unicorn-20363.exe 2728 Unicorn-37907.exe 2664 Unicorn-20363.exe 2840 Unicorn-22574.exe 2840 Unicorn-22574.exe 2820 Unicorn-33077.exe 2820 Unicorn-33077.exe 2860 Unicorn-31126.exe 2860 Unicorn-31126.exe 2580 Unicorn-60269.exe 2728 Unicorn-37907.exe 2728 Unicorn-37907.exe 2580 Unicorn-60269.exe 1868 Unicorn-56912.exe 588 Unicorn-4374.exe 588 Unicorn-4374.exe 2840 Unicorn-22574.exe 2840 Unicorn-22574.exe 1868 Unicorn-56912.exe 572 Unicorn-58147.exe 572 Unicorn-58147.exe 2860 Unicorn-31126.exe 2860 Unicorn-31126.exe 2920 Unicorn-22137.exe 2848 Unicorn-50171.exe 2920 Unicorn-22137.exe 2848 Unicorn-50171.exe 2580 Unicorn-60269.exe 2580 Unicorn-60269.exe 1612 Unicorn-40152.exe 1612 Unicorn-40152.exe 1036 Unicorn-10625.exe 1036 Unicorn-10625.exe 1868 Unicorn-56912.exe 1868 Unicorn-56912.exe 1964 Unicorn-60018.exe 1964 Unicorn-60018.exe 3000 Unicorn-37735.exe 3000 Unicorn-37735.exe 2848 Unicorn-50171.exe 588 Unicorn-4374.exe 1204 Unicorn-58518.exe 2064 Unicorn-21207.exe 2848 Unicorn-50171.exe 588 Unicorn-4374.exe 1204 Unicorn-58518.exe 2064 Unicorn-21207.exe 2920 Unicorn-22137.exe 2920 Unicorn-22137.exe 1504 Unicorn-55031.exe 1504 Unicorn-55031.exe 2440 Unicorn-50926.exe 2440 Unicorn-50926.exe 572 Unicorn-58147.exe 572 Unicorn-58147.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1932 4330bf1ca8b637650b8cda55a3414b89.exe 2664 Unicorn-20363.exe 2820 Unicorn-33077.exe 2728 Unicorn-37907.exe 2840 Unicorn-22574.exe 2860 Unicorn-31126.exe 2580 Unicorn-60269.exe 1868 Unicorn-56912.exe 588 Unicorn-4374.exe 572 Unicorn-58147.exe 2920 Unicorn-22137.exe 2848 Unicorn-50171.exe 1612 Unicorn-40152.exe 1964 Unicorn-60018.exe 1036 Unicorn-10625.exe 1504 Unicorn-55031.exe 1204 Unicorn-58518.exe 2064 Unicorn-21207.exe 3000 Unicorn-37735.exe 2440 Unicorn-50926.exe 1100 Unicorn-16433.exe 1828 Unicorn-56505.exe 2776 Unicorn-46261.exe 1608 Unicorn-11061.exe 2248 Unicorn-52094.exe 908 Unicorn-63749.exe 2448 Unicorn-55389.exe 1816 Unicorn-44886.exe 1800 Unicorn-34414.exe 884 Unicorn-12021.exe 2232 Unicorn-47797.exe 2084 Unicorn-26246.exe 2196 Unicorn-42617.exe 2816 Unicorn-52431.exe 2720 Unicorn-19950.exe 2792 Unicorn-6951.exe 544 Unicorn-55768.exe 2708 Unicorn-5135.exe 3056 Unicorn-61544.exe 3052 Unicorn-17558.exe 2664 Unicorn-55981.exe 1000 Unicorn-56365.exe 1876 Unicorn-60812.exe 2168 Unicorn-63417.exe 1572 Unicorn-65529.exe 2824 Unicorn-43402.exe 1348 Unicorn-4782.exe 1512 Unicorn-61575.exe 1624 Unicorn-13142.exe 1732 Unicorn-60636.exe 2504 Unicorn-26106.exe 2312 Unicorn-60636.exe 1824 Unicorn-24989.exe 1720 Unicorn-26812.exe 2996 Unicorn-58643.exe 2352 Unicorn-2499.exe 1644 Unicorn-9629.exe 2452 Unicorn-2499.exe 2860 Unicorn-47865.exe 1676 Unicorn-31851.exe 2080 Unicorn-24451.exe 1704 Unicorn-27632.exe 2072 Unicorn-14668.exe 2700 Unicorn-46573.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1932 wrote to memory of 2664 1932 4330bf1ca8b637650b8cda55a3414b89.exe 28 PID 1932 wrote to memory of 2664 1932 4330bf1ca8b637650b8cda55a3414b89.exe 28 PID 1932 wrote to memory of 2664 1932 4330bf1ca8b637650b8cda55a3414b89.exe 28 PID 1932 wrote to memory of 2664 1932 4330bf1ca8b637650b8cda55a3414b89.exe 28 PID 2664 wrote to memory of 2820 2664 Unicorn-20363.exe 29 PID 2664 wrote to memory of 2820 2664 Unicorn-20363.exe 29 PID 2664 wrote to memory of 2820 2664 Unicorn-20363.exe 29 PID 2664 wrote to memory of 2820 2664 Unicorn-20363.exe 29 PID 1932 wrote to memory of 2728 1932 4330bf1ca8b637650b8cda55a3414b89.exe 30 PID 1932 wrote to memory of 2728 1932 4330bf1ca8b637650b8cda55a3414b89.exe 30 PID 1932 wrote to memory of 2728 1932 4330bf1ca8b637650b8cda55a3414b89.exe 30 PID 1932 wrote to memory of 2728 1932 4330bf1ca8b637650b8cda55a3414b89.exe 30 PID 2820 wrote to memory of 2840 2820 Unicorn-33077.exe 31 PID 2820 wrote to memory of 2840 2820 Unicorn-33077.exe 31 PID 2820 wrote to memory of 2840 2820 Unicorn-33077.exe 31 PID 2820 wrote to memory of 2840 2820 Unicorn-33077.exe 31 PID 2728 wrote to memory of 2860 2728 Unicorn-37907.exe 32 PID 2728 wrote to memory of 2860 2728 Unicorn-37907.exe 32 PID 2728 wrote to memory of 2860 2728 Unicorn-37907.exe 32 PID 2728 wrote to memory of 2860 2728 Unicorn-37907.exe 32 PID 2664 wrote to memory of 2580 2664 Unicorn-20363.exe 33 PID 2664 wrote to memory of 2580 2664 Unicorn-20363.exe 33 PID 2664 wrote to memory of 2580 2664 Unicorn-20363.exe 33 PID 2664 wrote to memory of 2580 2664 Unicorn-20363.exe 33 PID 2840 wrote to memory of 1868 2840 Unicorn-22574.exe 34 PID 2840 wrote to memory of 1868 2840 Unicorn-22574.exe 34 PID 2840 wrote to memory of 1868 2840 Unicorn-22574.exe 34 PID 2840 wrote to memory of 1868 2840 Unicorn-22574.exe 34 PID 2820 wrote to memory of 588 2820 Unicorn-33077.exe 35 PID 2820 wrote to memory of 588 2820 Unicorn-33077.exe 35 PID 2820 wrote to memory of 588 2820 Unicorn-33077.exe 35 PID 2820 wrote to memory of 588 2820 Unicorn-33077.exe 35 PID 2860 wrote to memory of 572 2860 Unicorn-31126.exe 36 PID 2860 wrote to memory of 572 2860 Unicorn-31126.exe 36 PID 2860 wrote to memory of 572 2860 Unicorn-31126.exe 36 PID 2860 wrote to memory of 572 2860 Unicorn-31126.exe 36 PID 2728 wrote to memory of 2920 2728 Unicorn-37907.exe 37 PID 2728 wrote to memory of 2920 2728 Unicorn-37907.exe 37 PID 2728 wrote to memory of 2920 2728 Unicorn-37907.exe 37 PID 2728 wrote to memory of 2920 2728 Unicorn-37907.exe 37 PID 2580 wrote to memory of 2848 2580 Unicorn-60269.exe 38 PID 2580 wrote to memory of 2848 2580 Unicorn-60269.exe 38 PID 2580 wrote to memory of 2848 2580 Unicorn-60269.exe 38 PID 2580 wrote to memory of 2848 2580 Unicorn-60269.exe 38 PID 588 wrote to memory of 1964 588 Unicorn-4374.exe 40 PID 588 wrote to memory of 1964 588 Unicorn-4374.exe 40 PID 588 wrote to memory of 1964 588 Unicorn-4374.exe 40 PID 588 wrote to memory of 1964 588 Unicorn-4374.exe 40 PID 2840 wrote to memory of 1612 2840 Unicorn-22574.exe 41 PID 2840 wrote to memory of 1612 2840 Unicorn-22574.exe 41 PID 2840 wrote to memory of 1612 2840 Unicorn-22574.exe 41 PID 2840 wrote to memory of 1612 2840 Unicorn-22574.exe 41 PID 1868 wrote to memory of 1036 1868 Unicorn-56912.exe 39 PID 1868 wrote to memory of 1036 1868 Unicorn-56912.exe 39 PID 1868 wrote to memory of 1036 1868 Unicorn-56912.exe 39 PID 1868 wrote to memory of 1036 1868 Unicorn-56912.exe 39 PID 572 wrote to memory of 1504 572 Unicorn-58147.exe 42 PID 572 wrote to memory of 1504 572 Unicorn-58147.exe 42 PID 572 wrote to memory of 1504 572 Unicorn-58147.exe 42 PID 572 wrote to memory of 1504 572 Unicorn-58147.exe 42 PID 2860 wrote to memory of 1204 2860 Unicorn-31126.exe 43 PID 2860 wrote to memory of 1204 2860 Unicorn-31126.exe 43 PID 2860 wrote to memory of 1204 2860 Unicorn-31126.exe 43 PID 2860 wrote to memory of 1204 2860 Unicorn-31126.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\4330bf1ca8b637650b8cda55a3414b89.exe"C:\Users\Admin\AppData\Local\Temp\4330bf1ca8b637650b8cda55a3414b89.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-20363.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20363.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-33077.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33077.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22574.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22574.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-56912.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56912.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10625.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10625.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1036 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-56505.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56505.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1828 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6951.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6951.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47865.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47865.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14990.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14990.exe10⤵PID:2032
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19950.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19950.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60636.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60636.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2312 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47500.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47500.exe9⤵PID:828
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36647.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36647.exe10⤵PID:2648
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46261.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46261.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5135.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5135.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9629.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9629.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1644 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40050.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40050.exe9⤵PID:2624
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15255.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15255.exe10⤵PID:2052
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17792.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17792.exe8⤵PID:2008
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29057.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29057.exe9⤵PID:2124
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40152.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40152.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16433.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16433.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1100 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-55768.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55768.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:544 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-2499.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2499.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2452 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50460.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50460.exe9⤵PID:2276
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33792.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33792.exe10⤵PID:2804
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20771.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20771.exe9⤵PID:2264
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56737.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56737.exe10⤵PID:2244
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58643.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58643.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-29874.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29874.exe8⤵PID:3060
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45110.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45110.exe9⤵PID:2320
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4129.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4129.exe10⤵PID:2432
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22480.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22480.exe11⤵PID:1800
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41824.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41824.exe9⤵PID:328
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52431.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52431.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60636.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60636.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27632.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27632.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1704 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54132.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54132.exe9⤵PID:2620
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4374.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4374.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:588 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60018.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60018.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11061.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11061.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1608 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61544.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61544.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18556.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18556.exe8⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41021.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41021.exe9⤵PID:2772
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43411.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43411.exe10⤵PID:1612
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17558.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17558.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-2499.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2499.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2352 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46573.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46573.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2700
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55389.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55389.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2448 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-56365.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56365.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1000 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5016.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5016.exe7⤵PID:2020
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26138.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26138.exe8⤵PID:2724
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60269.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60269.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50171.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50171.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37735.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37735.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:3000 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-52094.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52094.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-43402.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43402.exe7⤵
- Executes dropped EXE
PID:2928
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63417.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63417.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2168 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-24451.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24451.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5016.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5016.exe8⤵PID:2060
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63749.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63749.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:908 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-4782.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4782.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1348 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47767.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47767.exe7⤵PID:3020
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50926.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50926.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44886.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44886.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1816 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13142.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13142.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14668.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14668.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-25785.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25785.exe8⤵PID:752
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2017.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2017.exe9⤵PID:2740
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33080.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33080.exe8⤵PID:2500
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33604.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33604.exe7⤵PID:2152
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24989.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24989.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1824 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-36911.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36911.exe6⤵PID:932
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35697.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35697.exe7⤵PID:1468
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37907.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37907.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-31126.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31126.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2860 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58147.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58147.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:572 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-55031.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55031.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12021.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12021.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:884 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61575.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61575.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22042.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22042.exe8⤵PID:1484
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42617.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42617.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26812.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26812.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1720 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-8406.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8406.exe7⤵PID:2820
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58518.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58518.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26246.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26246.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2084 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26106.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26106.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2504
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65529.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65529.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1572 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-29874.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29874.exe6⤵PID:2644
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22137.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22137.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21207.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21207.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34414.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34414.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-55981.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55981.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5016.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5016.exe7⤵PID:1964
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50228.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50228.exe8⤵PID:1132
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60812.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60812.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1876 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21706.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21706.exe6⤵PID:2604
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1503.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1503.exe7⤵PID:2760
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3977.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3977.exe8⤵PID:2812
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47797.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47797.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-43402.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43402.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-31851.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31851.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-64767.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64767.exe7⤵PID:3064
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61799.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61799.exe8⤵PID:2552
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20589.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20589.exe6⤵PID:1568
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18224.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18224.exe7⤵PID:3068
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15897.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15897.exe8⤵PID:2464
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38752.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38752.exe9⤵PID:488
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28127.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28127.exe7⤵PID:2240
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD5929615e65c8249e29d0e8b3504251f2a
SHA151f7bf229b76bec173949a9399c4d948b22fda04
SHA25616a176b499edb041add32be05c5180a25edc91277c360cb34c8b692faad1d4a2
SHA512e86a63d941d6856666c91f235b26de55f7057bca0fd34b935022652f3a2f2f9933d5123465fc900b132a6ba1b1fe3aeda03053d621762b9e465822bfe68ef8f9
-
Filesize
184KB
MD5b72ed220d536e4307455a7276d88e817
SHA18ac0caa9f2c5c19560190b15ffdf5a59a4f65fe5
SHA2563423ed094a2168be13db8c8482d510bf5e08a2ae9fe2f0f588ad74e71445161c
SHA512090f45b3f59e42401a7a03657f538cb202355e78725fe67fcfb85389aa5b28febb9f6d0e930fa266a9c2be7c7438f200bcaf018cf43eb08d793d142b60e6bc0f
-
Filesize
184KB
MD5e05dc31562de70ad3785381fc4c78582
SHA10e7a871a2a87f8f0046dc23848c92af0028a1212
SHA2569d864e05b8cb36d73e51c2950e9e898997e9871c24c098d35fbb041e9b1b124e
SHA51253e8b3ac09fa6511df1c4aada1bb5198d943caf50d67ce7ffa75ce82f613588cc50338193233e69528dea4d4c9ab2865a894d7d86f18036bf0b3ca1c3948e12b
-
Filesize
184KB
MD53366df1dd3235867519b6e4dc8a3ecd6
SHA1ff5e71752262f6adba0a2d9a65bd57dab6882e06
SHA256d2f834692d837185065cce5471c1855b364b8e363df8f64d757ab424b6a959f2
SHA5123703198465a84bbf7dee55e7f78527d86eb4609615d985a66be35973713f53a29085fb4130c099421f00b199bf3ff3754361f23407ab8d6ab353bb48b54e1d1e
-
Filesize
184KB
MD5a910dbe8824a5008d50d6be1521db9e4
SHA12da0550becd65690e34210a0dfae38cdcfd8a8c1
SHA2566eb04f0af8664bf28c56e2ae3b9b5c0e040add1591347f72b33429814965fe91
SHA5121b6f5931d66b09350adbc415a062d16eb09a7ee6b00981111c86b539a510ee77b890a117a52a5f88f0663faee955bc463b362962b0394c2e243a2df3c14a9f22
-
Filesize
184KB
MD5e2d9cb92ad49c70630bda9fbe902c62b
SHA1b2f68daee69652d5506ebd95add52a3d56b45ab8
SHA256231a6d8b9109feaedeb06b80006121cc8a9d2251ab1ca150bdbabf83c8e47e5d
SHA512adb60e64bca95cf1f07cbb00099aec460e2df225478b954c7cb41984b9eab53fb254ecc2a5d7911df20da7d41268cd4a5c90f9bbd1f470c37b65031a335644dd
-
Filesize
184KB
MD5ef7d812612971c8dbfe7ecfecd5acbca
SHA1826d36560efb338e014cfe59db31c9ee5d44ce51
SHA256b91e1a039bc43f950e5389bb35b451f1b22953dd02fc9934b38196a7aa062e6d
SHA512f877bfef95441b3ccb819ef1d9dae0857803f232ac070b2ede8882db6cf16446c08e69c33672089e90e22191551113fbe7ef33b5901e85d63afc374ccec12a79
-
Filesize
184KB
MD5ace3cc136327093a1f30c4b7af966af8
SHA191385966215cd465dfb85fd2bb02bf923267807d
SHA256ad934c21051417e8b2ce3cb1398c0b018bba81f314106efd3e44f5fd1c1f064a
SHA512cef09cadb819638e82c2afa37ecc315a05877cf4c33affed7436cc017e713f6325e749008a31ac0bdd2fc675499bc4ee2d0d7556352682786955e7dddb517312
-
Filesize
184KB
MD51bc4f50ab42028919a199ebcd5f3693c
SHA12110fc45cf8186646285319a7727187e6780ab51
SHA2567acb8fd27a601d3dcfb17d37021b8001ba08b51d36d5eba131f21a6f205443cf
SHA5125a1bd2717b1049c331a77d1c20be7382034cff61b4fb28a2b2fa2de957f6592b1737d0a30a136cc22eda9e99694535d11de620897ba608bc601b0984777a805c
-
Filesize
184KB
MD530c9937ac8de14635a1fba571661ba2b
SHA194931f9661fc7bf1eadf4dfd96db9e1f761c9f65
SHA256f50c54eff4e31f243cbab015b9be5d65c5674e3b00b226f24ba04f738263d594
SHA512355c6332df7ebf62a00caa5e5629117a01993760b614908a5160b4ad35527b3e9816b16cdf839ee8650748b24f692caf2da9beb7006d855c1c8535812f724665
-
Filesize
184KB
MD5caba1b36fea8456d267885e1ca794c17
SHA1d49a2223a4bd0a57778ff28fd575c56c5b5c998d
SHA256f1d8b1c024dc89a7e3105faeb4455a1cb771fc1ea5fe67208dcb6a1fba714413
SHA512222f390a30a925e38de91424ccdb15285a281cc800fbd88caa18500e105e33d1899c4388da3419bc96d61f4a961700632559b439d532b60c9254e9a6d829e7a7
-
Filesize
184KB
MD556a0ee920b247e778035e64460748b92
SHA15c82f6ccf5318474a42e8342c072dcd1cb86ed72
SHA256b5eec5ebb78c1423ee3ad491fae81bc046c1a62609006b3c67018545344a4c2a
SHA5123e0dffee953866ec416aa8fcfb64b10da60c708988359c13c64e4743227e17a1aa810abaf43c7930c5113e162bd7d5241fd010d4513e7a4c099edeb79d531b4d
-
Filesize
184KB
MD5bfae4265ce63519e1b5bd315ac5bf976
SHA11e882f9aa468cc6fafd50ba916e9a3e47e420349
SHA256c3c24ecca6d1404d459ff2926fb8a30a75dc4ea3f9c3168d8e97ec4c85a8f57b
SHA512a229e290c6c6ef64618c21ae2c537495545da237bcd803b4fbde05638d4b5ce0eb1308c7702fc0aea7568538eb84ded6529d120ee1293a75f4d7c9770a796ed8
-
Filesize
184KB
MD5f6def89b602ebed9082d62a28b1616b4
SHA12d1d58b46814ae176c4c5bffb415a0179a1f839c
SHA25647ce5293b22f29ff7fe38c66deef84f3f60f5d72aef3abb32544e4bcf0d842b2
SHA512a996da8a175bd6bab3f7ec2e83cdacdd76b0e8127e0583e4b05f36dbb65e6b85603618172c7291512b494e8dff44158b72507adb0a72b422ea252d5f4fe9ef4b
-
Filesize
184KB
MD5a61a71d25388d0fc9cbf1fbf651c70ec
SHA1944a88a05e5a1d7b7e37a8e47efae4d3d183ba96
SHA256e32ca632e69aa3cba7731d7bf09e0bcd743482795a332a06657909107ba2e3be
SHA5122e5170126b4301f6b6236b8c707e1a43d480622126ad45fcaa71e62911985d802ae437d37c2fdf27b29cce2eda47725f910e6e09887b12154c6629b635fc8546
-
Filesize
184KB
MD5e94d0c71a9fcfaae1349baac94560961
SHA182c6db48a18b172caf1709f06d1605f27b66fe20
SHA256a81d33b5d69766e981fbccd8e2ceaa03123ba5c8db5706a02f93bd1b8947b9e7
SHA51254a7f59af037393fa932870edeb31443ded29385f698a87919c46d6ee8fafc8612783c1be13fb1541a7d9168d519ad3f44041529ba95cb6b306a066f6971b69e
-
Filesize
184KB
MD537bcf1eed0ff2e4e804b22bcce6608b3
SHA1a84cd54d46b7daeb633f8dec52a1892d47da4e2b
SHA256e829c709cd364b9d00cae0cf754835678dd8621a41b2377ae4a0a11793c3f7ff
SHA5126314b18aa03189ac83fca1772c96f882c80587b19eaa67e859fa7049fde740c0bdd4522c17083810f0b416981e7c8c987d4b67597448fdf569f48a992450fcca
-
Filesize
184KB
MD566a24386f2599875dec84b3ba835639a
SHA1aeccef54548b9712db61933238e13c839837774b
SHA256abf3461c5905fbfe0526b52f4a9d52ada949de0ac925321ac66725f8c6e0d267
SHA51222978870bb0194b86ead358d63c8bcba3fb88ba0f24c03e4eb3c21423af4245aeb431ba634d972f2522179eae31335030d13843ecb775cdf2a08e91f4e3f7510