Analysis

  • max time kernel
    27s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    07/01/2024, 01:31

General

  • Target

    47ad782560fad3022e9f990f369a8df2.exe

  • Size

    184KB

  • MD5

    47ad782560fad3022e9f990f369a8df2

  • SHA1

    b6a320df6a68d5f4591943290ac2270dc4e3a398

  • SHA256

    fb522822d22e4a661b05dad2c1dd14eb7f606d8a235165a8618b2f11df6e2745

  • SHA512

    95dc4292c31f91de0b1302aaa0e850b3c8640b05cf51d1a85a7c930609c63e10151be588195a37de1ae7c1265a5af122a47e216ccfc573cc346b0db316efdeae

  • SSDEEP

    3072:Jf1Zob2w9aGVINYOMgvRb8Dzj4vyODXiI8xXVBjENlPvOFB:JfXobVVIvMCRb8CrC0NlPvOF

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 47 IoCs
  • Loads dropped DLL 64 IoCs
  • Program crash 42 IoCs
  • Suspicious use of SetWindowsHookEx 35 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\47ad782560fad3022e9f990f369a8df2.exe
    "C:\Users\Admin\AppData\Local\Temp\47ad782560fad3022e9f990f369a8df2.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1940
    • C:\Users\Admin\AppData\Local\Temp\Unicorn-36603.exe
      C:\Users\Admin\AppData\Local\Temp\Unicorn-36603.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2532
      • C:\Users\Admin\AppData\Local\Temp\Unicorn-29053.exe
        C:\Users\Admin\AppData\Local\Temp\Unicorn-29053.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2696
        • C:\Users\Admin\AppData\Local\Temp\Unicorn-45553.exe
          C:\Users\Admin\AppData\Local\Temp\Unicorn-45553.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2952
          • C:\Users\Admin\AppData\Local\Temp\Unicorn-38683.exe
            C:\Users\Admin\AppData\Local\Temp\Unicorn-38683.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            PID:2924
            • C:\Users\Admin\AppData\Local\Temp\Unicorn-26351.exe
              C:\Users\Admin\AppData\Local\Temp\Unicorn-26351.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:1188
              • C:\Users\Admin\AppData\Local\Temp\Unicorn-59470.exe
                C:\Users\Admin\AppData\Local\Temp\Unicorn-59470.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:1028
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-30034.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-30034.exe
                  8⤵
                  • Executes dropped EXE
                  PID:2896
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 1028 -s 236
                  8⤵
                  • Program crash
                  PID:2364
              • C:\Users\Admin\AppData\Local\Temp\Unicorn-34750.exe
                C:\Users\Admin\AppData\Local\Temp\Unicorn-34750.exe
                7⤵
                • Executes dropped EXE
                PID:2984
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-425.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-425.exe
                  8⤵
                    PID:940
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 1188 -s 240
                  7⤵
                  • Program crash
                  PID:1156
              • C:\Users\Admin\AppData\Local\Temp\Unicorn-30585.exe
                C:\Users\Admin\AppData\Local\Temp\Unicorn-30585.exe
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:2004
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-54616.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-54616.exe
                  7⤵
                  • Executes dropped EXE
                  PID:796
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-58376.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-58376.exe
                    8⤵
                      PID:1736
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-48582.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-48582.exe
                        9⤵
                          PID:2116
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 796 -s 236
                        8⤵
                        • Program crash
                        PID:1548
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 2004 -s 236
                      7⤵
                      • Program crash
                      PID:2672
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 2924 -s 240
                    6⤵
                    • Program crash
                    PID:2160
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-39349.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-39349.exe
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:3012
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2952 -s 240
                  5⤵
                  • Program crash
                  PID:1284
              • C:\Users\Admin\AppData\Local\Temp\Unicorn-33342.exe
                C:\Users\Admin\AppData\Local\Temp\Unicorn-33342.exe
                4⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetWindowsHookEx
                PID:1804
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-42412.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-42412.exe
                  5⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:2468
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-3279.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-3279.exe
                    6⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:2396
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-54616.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-54616.exe
                      7⤵
                      • Executes dropped EXE
                      PID:1564
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 2396 -s 216
                      7⤵
                      • Program crash
                      PID:2080
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-34750.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-34750.exe
                    6⤵
                    • Executes dropped EXE
                    PID:2528
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-64575.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-64575.exe
                      7⤵
                        PID:2884
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 2884 -s 188
                          8⤵
                          • Program crash
                          PID:2692
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 2528 -s 236
                        7⤵
                        • Program crash
                        PID:1820
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 2468 -s 240
                      6⤵
                      • Program crash
                      PID:1860
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-2521.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-2521.exe
                    5⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:1448
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-54860.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-54860.exe
                      6⤵
                      • Executes dropped EXE
                      PID:320
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 1448 -s 236
                      6⤵
                      • Program crash
                      PID:2312
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 1804 -s 240
                    5⤵
                    • Program crash
                    PID:2740
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2696 -s 240
                  4⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:1920
              • C:\Users\Admin\AppData\Local\Temp\Unicorn-41146.exe
                C:\Users\Admin\AppData\Local\Temp\Unicorn-41146.exe
                3⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:2856
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-37915.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-37915.exe
                  4⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:2908
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-54607.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-54607.exe
                    5⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:1528
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-30036.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-30036.exe
                      6⤵
                      • Executes dropped EXE
                      • Suspicious use of SetWindowsHookEx
                      PID:2492
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-51707.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-51707.exe
                        7⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:2776
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-45452.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-45452.exe
                          8⤵
                            PID:2088
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-15587.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-15587.exe
                              9⤵
                                PID:2920
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 2088 -s 236
                                9⤵
                                • Program crash
                                PID:2472
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 2776 -s 236
                              8⤵
                              • Program crash
                              PID:1784
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-25586.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-25586.exe
                            7⤵
                              PID:2660
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 2492 -s 240
                              7⤵
                              • Program crash
                              PID:2996
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-47327.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-47327.exe
                            6⤵
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            PID:2724
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 1528 -s 240
                            6⤵
                            • Program crash
                            PID:1572
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-46107.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-46107.exe
                          5⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:1780
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-1655.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-1655.exe
                            6⤵
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            PID:2744
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 2744 -s 240
                              7⤵
                              • Program crash
                              PID:2136
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 1780 -s 236
                            6⤵
                            • Program crash
                            PID:2304
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 2908 -s 240
                          5⤵
                          • Program crash
                          PID:2228
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-25888.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-25888.exe
                        4⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:2344
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-18417.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-18417.exe
                          5⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:1744
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-39489.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-39489.exe
                            6⤵
                            • Executes dropped EXE
                            PID:2632
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-46534.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-46534.exe
                              7⤵
                                PID:1600
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 2632 -s 236
                                7⤵
                                • Program crash
                                PID:2216
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 1744 -s 236
                              6⤵
                              • Program crash
                              PID:3020
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-3178.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-3178.exe
                            5⤵
                            • Executes dropped EXE
                            PID:2640
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 2344 -s 240
                            5⤵
                            • Program crash
                            PID:2944
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 2856 -s 240
                          4⤵
                          • Program crash
                          PID:2340
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 2532 -s 240
                        3⤵
                        • Loads dropped DLL
                        • Program crash
                        PID:2576
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-26976.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-26976.exe
                      2⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Suspicious use of SetWindowsHookEx
                      • Suspicious use of WriteProcessMemory
                      PID:2816
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-28340.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-28340.exe
                        3⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Suspicious use of SetWindowsHookEx
                        • Suspicious use of WriteProcessMemory
                        PID:2612
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-5652.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-5652.exe
                          4⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Suspicious use of SetWindowsHookEx
                          PID:1604
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-26927.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-26927.exe
                            5⤵
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            PID:2904
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-17457.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-17457.exe
                              6⤵
                              • Executes dropped EXE
                              • Suspicious use of SetWindowsHookEx
                              PID:1836
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-4486.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-4486.exe
                                7⤵
                                • Executes dropped EXE
                                PID:2596
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 1836 -s 236
                                7⤵
                                • Program crash
                                PID:3024
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-54190.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-54190.exe
                              6⤵
                              • Executes dropped EXE
                              PID:2580
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-15269.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-15269.exe
                                7⤵
                                  PID:2072
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -u -p 2580 -s 236
                                  7⤵
                                  • Program crash
                                  PID:1360
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 2904 -s 240
                                6⤵
                                • Program crash
                                PID:1728
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-32889.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-32889.exe
                              5⤵
                              • Executes dropped EXE
                              • Suspicious use of SetWindowsHookEx
                              PID:2408
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-19022.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-19022.exe
                                6⤵
                                  PID:1316
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-62578.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-62578.exe
                                    7⤵
                                      PID:2012
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -u -p 1316 -s 236
                                      7⤵
                                      • Program crash
                                      PID:2668
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -u -p 2408 -s 236
                                    6⤵
                                    • Program crash
                                    PID:2656
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -u -p 1604 -s 240
                                  5⤵
                                  • Program crash
                                  PID:2392
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-4757.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-4757.exe
                                4⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                PID:1088
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-3279.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-3279.exe
                                  5⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetWindowsHookEx
                                  PID:1752
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-19022.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-19022.exe
                                    6⤵
                                      PID:1764
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -u -p 1752 -s 236
                                      6⤵
                                      • Program crash
                                      PID:948
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-64237.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-64237.exe
                                    5⤵
                                    • Executes dropped EXE
                                    PID:748
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -u -p 1088 -s 240
                                    5⤵
                                    • Program crash
                                    PID:1876
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -u -p 2612 -s 240
                                  4⤵
                                  • Program crash
                                  PID:2356
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-34302.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-34302.exe
                                3⤵
                                • Executes dropped EXE
                                • Loads dropped DLL
                                • Suspicious use of SetWindowsHookEx
                                PID:2164
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-9739.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-9739.exe
                                  4⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetWindowsHookEx
                                  PID:2000
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-51027.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-51027.exe
                                    5⤵
                                    • Executes dropped EXE
                                    • Suspicious use of SetWindowsHookEx
                                    PID:2176
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -u -p 2176 -s 240
                                      6⤵
                                      • Program crash
                                      PID:2948
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-34750.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-34750.exe
                                    5⤵
                                    • Executes dropped EXE
                                    PID:2504
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -u -p 2000 -s 240
                                    5⤵
                                    • Program crash
                                    PID:1732
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-64410.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-64410.exe
                                  4⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetWindowsHookEx
                                  PID:548
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-18758.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-18758.exe
                                    5⤵
                                    • Executes dropped EXE
                                    PID:2248
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-55357.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-55357.exe
                                      6⤵
                                        PID:2900
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-18404.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-18404.exe
                                          7⤵
                                            PID:2260
                                          • C:\Windows\SysWOW64\WerFault.exe
                                            C:\Windows\SysWOW64\WerFault.exe -u -p 2900 -s 236
                                            7⤵
                                            • Program crash
                                            PID:1508
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -u -p 2248 -s 236
                                          6⤵
                                          • Program crash
                                          PID:2208
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -u -p 548 -s 236
                                        5⤵
                                        • Program crash
                                        PID:1488
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -u -p 2164 -s 240
                                      4⤵
                                      • Program crash
                                      PID:3052
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -u -p 2816 -s 240
                                    3⤵
                                    • Loads dropped DLL
                                    • Program crash
                                    PID:772
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -u -p 1940 -s 240
                                  2⤵
                                  • Program crash
                                  PID:2320

                              Network

                                    MITRE ATT&CK Matrix

                                    Replay Monitor

                                    Loading Replay Monitor...

                                    Downloads

                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-38683.exe

                                      Filesize

                                      184KB

                                      MD5

                                      25be3dc1955beb554dc5cb73ae90a71a

                                      SHA1

                                      3b5104539337eba7fff0fbb9810fad52a341885e

                                      SHA256

                                      ba098a650fb3254f6f40a2aa947fc478dd92bceb35be02a67e14d176e7bc46a8

                                      SHA512

                                      2075c40c82b576c9c44e0cf178fa9aa239fd940bf998e14192ea2b4ae86f0f118723280499d118f5dc88d299959479f8bef10d8f6c27221dd87436c6fbc9b56b

                                    • \Users\Admin\AppData\Local\Temp\Unicorn-26976.exe

                                      Filesize

                                      181KB

                                      MD5

                                      ed516615d58b183e6cfc3f4dd339a6aa

                                      SHA1

                                      60ca3e01c6d046521fd0f11d282fc5aa0d0bd96e

                                      SHA256

                                      e589a9c1ffb95740a4950aa1de5ab4ba8fe5652a5ecaf515aeaddb713331a79a

                                      SHA512

                                      1827bdaac484e3bf98c869c1fecc88611117c329b42f10261fb84c49df08a1e3e617a42d4bc9bc8ea7c8966b8a9df66d09cedd8f376786033e61c35202e02d46

                                    • \Users\Admin\AppData\Local\Temp\Unicorn-26976.exe

                                      Filesize

                                      120KB

                                      MD5

                                      c4928c3ba6affa7fb915c05fdb0d9c22

                                      SHA1

                                      75f87badb5848ba43c1a98965061f41d3f7a0549

                                      SHA256

                                      a257bc5ad90a8c1fb6c1f15e6823c324499f96cf0db16950ab45119ca1c055aa

                                      SHA512

                                      c163858853d73c1de082e5a6e27fd2adcec16374229f00be3ca3533291721909bf0c43a2569b2d8258e12a264c09ecd78d529ab326b87d34f70c5e4eb830605c

                                    • \Users\Admin\AppData\Local\Temp\Unicorn-26976.exe

                                      Filesize

                                      112KB

                                      MD5

                                      92c58c20f0cd1d5305a58527c2efb13b

                                      SHA1

                                      6e81cfad2bd804e328896c95c2528c15142f2134

                                      SHA256

                                      b8d9bf6f30eab81a18a91069e7c62235fba8f40f34560d998235c7d2c45165a3

                                      SHA512

                                      dc88f5a78fd01925620e409c419e4d3e686d7ca3a3cd8cf55949a502c7e44e3ee134f4918fd4137b96f25c4e91176b8e2ad30edb6a35b043d342f00cb2674301

                                    • \Users\Admin\AppData\Local\Temp\Unicorn-26976.exe

                                      Filesize

                                      102KB

                                      MD5

                                      cf1ee135259023411d5e1bc9968b705a

                                      SHA1

                                      22bfd83ddf953d40fefe76ca984e2cf6c750b898

                                      SHA256

                                      b5d6330a14ef4cdba7386f94531acc19fb97d7b0d9399cac85c322baa2b0753b

                                      SHA512

                                      c38a4beff18e681f5bff97bbfab037afabc9d9d35521598eb8e0456767e546567a38cc9003efc3429b3119aa9f3cb33b12ba7de95acb42f7ee7c25b93f18c20c

                                    • \Users\Admin\AppData\Local\Temp\Unicorn-26976.exe

                                      Filesize

                                      99KB

                                      MD5

                                      6bf31c845d3aeefc02c1c1047c173fb4

                                      SHA1

                                      cf0da4f6d2f88aaa0d83fb9e17b4ddbf2c67431d

                                      SHA256

                                      4a513e39da404afc7a3719428a9969751fbe6b20a3a73c5abf2d975efd08be59

                                      SHA512

                                      9b7fa95d38365746f71fb7de1c37382f5e2006d0de11861121f3f6cc604f3c9626881dc9510e92468ba5718b68f6a3896dfdd9285513c14566dff4720b24f842

                                    • \Users\Admin\AppData\Local\Temp\Unicorn-26976.exe

                                      Filesize

                                      142KB

                                      MD5

                                      32715bcfe463079aa761c480d4fd93a8

                                      SHA1

                                      0d755d0da0f3e1483332dd21f50ac9924cbf7fed

                                      SHA256

                                      64df056ba611d25b1bc927ab0f5aea7205311809fe69edef5521907aae44e918

                                      SHA512

                                      f443a2783bb318f378e9468604955fd14949e85871c70911bcbce59acb001f86db2fbb9b8c070a0ada6b2a33936e962501a07e94b51f5bc5533619c8fcc10f58

                                    • \Users\Admin\AppData\Local\Temp\Unicorn-26976.exe

                                      Filesize

                                      105KB

                                      MD5

                                      491325aafe86277548164e03f266bf4f

                                      SHA1

                                      a95c12fa710518fc8d8b026edd68a6e227c7976d

                                      SHA256

                                      bd804806976d7e35d36084fc732edb70e18749e02cfe8dea3de93b3ae869cf60

                                      SHA512

                                      fefd43aa7a8ccf1e587c9a8591b72411c658521bead76b5efcb0911e818451df3924065b3b9ab4aa034b1b3b16ce666f2e1a4ae63a508c0aeb3c71c1173123d0

                                    • \Users\Admin\AppData\Local\Temp\Unicorn-26976.exe

                                      Filesize

                                      184KB

                                      MD5

                                      c49c3183234a2cfffe7da682d7fa6b34

                                      SHA1

                                      b94411cf6412065d6b8ec66f810363d402d57225

                                      SHA256

                                      81b150a13b9c54a04ccf658c7935955b4378411db2307f785d7000ae46803d5d

                                      SHA512

                                      5f348d9265cc0ab0260f4979d1c49dec8967c903190ba2431b4d3cea7a34eb8a82217fe454666f2471ee7d73a3dc59904c5aef7f7db9da68a8525e7826a3235a

                                    • \Users\Admin\AppData\Local\Temp\Unicorn-28340.exe

                                      Filesize

                                      184KB

                                      MD5

                                      1e114cf2c5a5044ee59c607973d51b3f

                                      SHA1

                                      7562a367e6cec51d03ca7fe216025af229473a7f

                                      SHA256

                                      1e9398cb33949cf30f7da2350623afbf3b836c1ae63f452d253530fedb6065f0

                                      SHA512

                                      53f0b6ce8ea41d9a92149a4b93b47087de98e5ff5f1f4c7da05d8c52b40c2ea51271cb712220aba0a35d7d13e23fd232fe47e919605179291834f1615615ca51

                                    • \Users\Admin\AppData\Local\Temp\Unicorn-29053.exe

                                      Filesize

                                      184KB

                                      MD5

                                      50e03d1ed80c0896b4a1245abd334683

                                      SHA1

                                      79d5c7b5fbe72da00888c3b713a78a0bfa373795

                                      SHA256

                                      8d6d857e50d8e94f847059d8b6d69dd4e03c0c6b8421648454178f36b75f093a

                                      SHA512

                                      dc4edc59c93ac6e1e2eeee013896215144a5266b62943379b35b6adb01d0794396fb9392b07ad9705f8395da984ccccdde741963d862465efcb1d2164efd8de3

                                    • \Users\Admin\AppData\Local\Temp\Unicorn-29053.exe

                                      Filesize

                                      155KB

                                      MD5

                                      18ebccf0316e657704f7ad9100507315

                                      SHA1

                                      2e89785e73b3a47b5eb68c1b690320c1ca35beb4

                                      SHA256

                                      a9cf386f9a032ce1c7bc16aebec4c046fc67d6c7c2ddbe42e1ed79dafa87f90a

                                      SHA512

                                      4ba245d0bd6a20ceb36cfbae9b7ef83d107c3376da2237d55d0bfe1ebd5c2ebaca2c9b9b322665f318b8060efdfee7bfacef329b511bd8d2a8b6721e1c0200f0

                                    • \Users\Admin\AppData\Local\Temp\Unicorn-33342.exe

                                      Filesize

                                      184KB

                                      MD5

                                      c29cdab7d83a0f40b07cf556a99dee05

                                      SHA1

                                      a5a48dae6be8c821f2977ef8e0a5189431d6acb3

                                      SHA256

                                      16090956ca1554fb9e0aab6fac6913b69b77bc04e9f88b2798a246eb44977bd5

                                      SHA512

                                      da18eea42d2b34fd4c20d767360dbd7c451a3c995a31e925c1cf1fd9fc880f04efb8fe966d07c06c9b1ef9779d6d22b6397b567ac1d039bdbba88e57ffd10cbc

                                    • \Users\Admin\AppData\Local\Temp\Unicorn-34302.exe

                                      Filesize

                                      184KB

                                      MD5

                                      7b952f6b4b4b5b09bfd6e6a7945ba435

                                      SHA1

                                      9d48bfff56e4fd054ce376e4ac82aa1712762465

                                      SHA256

                                      553e46112909b6b8cd01e1d7a415ea1e5e7f6d41e2bf7a3ee5168edc0b796beb

                                      SHA512

                                      3849498d2d7b63be090a08999ec015bf4bb07275ae296706b02819ccd48e4cc06d7bc67c8708de900faa3bb15c48872a5e9815e5284bf935d0534ea6498d4c4f

                                    • \Users\Admin\AppData\Local\Temp\Unicorn-36603.exe

                                      Filesize

                                      184KB

                                      MD5

                                      67a560ff4ba061a1b835f42c4aa30216

                                      SHA1

                                      a0dca5a7513cf76fe262a26d9ef680d4de8a186d

                                      SHA256

                                      8662e41d77787b6560c64b75d5e3e8897f7b36aa27c4baf8573a49f6e07379bc

                                      SHA512

                                      0e01f77e62f344212e56aea959ecfd12c2454341201500dd05f566dcd512c82f3b03053dc30244e564bba2644685ce15df747951769446c86f475f047e2dcc13

                                    • \Users\Admin\AppData\Local\Temp\Unicorn-37915.exe

                                      Filesize

                                      184KB

                                      MD5

                                      b5f3caf5b412b6c2976f27f553f14676

                                      SHA1

                                      27346e00bdf15cbbedbad1ee810e9155d68cf7e5

                                      SHA256

                                      33784659b728ceb86aa2824cddef2ba13c56614d852a0e93b97346fe7d86c3ce

                                      SHA512

                                      ff06e1d914f10c8a9a880b20303b0041baa739357cb4a0f9b85d2c4007e834ed5e7be4b7f4d5c9423c75f92e5dd2d2e518a34fda81d6b1e3f9955158932c560a

                                    • \Users\Admin\AppData\Local\Temp\Unicorn-41146.exe

                                      Filesize

                                      184KB

                                      MD5

                                      8a4faeccd3ed3075f85f4a3423553903

                                      SHA1

                                      b9f19e79da554410661fbf515818a35e2c9d19c7

                                      SHA256

                                      50bc8d876ad2c2b72827105ef6ce6ad5e0212f96452a6f62b80c47769e22a682

                                      SHA512

                                      a23b313c4e0740c6b12a9822e1904bc220c4ec675e00b522cbf082180a8efdf3fe22b21890d276a1f29c5b8234fdbd6a23a800031deceb4227be22b1b53f395d

                                    • \Users\Admin\AppData\Local\Temp\Unicorn-45553.exe

                                      Filesize

                                      184KB

                                      MD5

                                      fe744f44ccabb258d31971d431a3f748

                                      SHA1

                                      c1eb8cbb095b73c22d70b06be98d5b8bbe08974d

                                      SHA256

                                      5e07c014575fbb349f877e9565d661516893938dbfef8a8cb1074e53ac48f733

                                      SHA512

                                      22b3769a615935dc0f8e3bc123b74f821c84576cd840456891077e49f72948896da7d871c13b9510ec86f00a912e34ab6db0279a13635dc56e81355056fb1a0c

                                    • \Users\Admin\AppData\Local\Temp\Unicorn-5652.exe

                                      Filesize

                                      184KB

                                      MD5

                                      5fd7c318cb27c7baec21eddaea15981a

                                      SHA1

                                      a04fff03022ee493349d8d2b09a44972f3316c64

                                      SHA256

                                      099972b520d821a350830c9fd5c843392bb7983d45fc3e51878a03ff7a8f87e8

                                      SHA512

                                      9a8a774cb79ef800b3ee7930cf9f8dd057d5ac71a01e3cea1bd28376afd1e1a53851d4292b30f54a120850b8282e9e2b4b6ffa67610a3061900be6ad182e9aca