Analysis
-
max time kernel
27s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
07/01/2024, 01:31
Static task
static1
Behavioral task
behavioral1
Sample
47ad782560fad3022e9f990f369a8df2.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
47ad782560fad3022e9f990f369a8df2.exe
Resource
win10v2004-20231215-en
General
-
Target
47ad782560fad3022e9f990f369a8df2.exe
-
Size
184KB
-
MD5
47ad782560fad3022e9f990f369a8df2
-
SHA1
b6a320df6a68d5f4591943290ac2270dc4e3a398
-
SHA256
fb522822d22e4a661b05dad2c1dd14eb7f606d8a235165a8618b2f11df6e2745
-
SHA512
95dc4292c31f91de0b1302aaa0e850b3c8640b05cf51d1a85a7c930609c63e10151be588195a37de1ae7c1265a5af122a47e216ccfc573cc346b0db316efdeae
-
SSDEEP
3072:Jf1Zob2w9aGVINYOMgvRb8Dzj4vyODXiI8xXVBjENlPvOFB:JfXobVVIvMCRb8CrC0NlPvOF
Malware Config
Signatures
-
Executes dropped EXE 47 IoCs
pid Process 2532 Unicorn-36603.exe 2696 Unicorn-29053.exe 2816 Unicorn-26976.exe 2856 Unicorn-41146.exe 2952 Unicorn-45553.exe 2612 Unicorn-28340.exe 2908 Unicorn-37915.exe 2924 Unicorn-38683.exe 1804 Unicorn-33342.exe 1604 Unicorn-5652.exe 2164 Unicorn-34302.exe 1528 Unicorn-54607.exe 2344 Unicorn-25888.exe 1188 Unicorn-26351.exe 3012 Unicorn-39349.exe 2904 Unicorn-26927.exe 2000 Unicorn-9739.exe 2468 Unicorn-42412.exe 1088 Unicorn-4757.exe 2492 Unicorn-30036.exe 1780 Unicorn-46107.exe 1744 Unicorn-18417.exe 1836 Unicorn-17457.exe 1028 Unicorn-59470.exe 2408 Unicorn-32889.exe 2004 Unicorn-30585.exe 548 Unicorn-64410.exe 2176 Unicorn-51027.exe 2396 Unicorn-3279.exe 1752 Unicorn-3279.exe 1448 Unicorn-2521.exe 2776 Unicorn-51707.exe 2724 Unicorn-47327.exe 2744 Unicorn-1655.exe 2640 Unicorn-3178.exe 2632 Unicorn-39489.exe 2596 Unicorn-4486.exe 2896 Unicorn-30034.exe 2580 Unicorn-54190.exe 748 Unicorn-64237.exe 796 Unicorn-54616.exe 2528 Unicorn-34750.exe 2248 Unicorn-18758.exe 2504 Unicorn-34750.exe 2984 Unicorn-34750.exe 1564 Unicorn-54616.exe 320 Unicorn-54860.exe -
Loads dropped DLL 64 IoCs
pid Process 1940 47ad782560fad3022e9f990f369a8df2.exe 1940 47ad782560fad3022e9f990f369a8df2.exe 2532 Unicorn-36603.exe 2532 Unicorn-36603.exe 1940 47ad782560fad3022e9f990f369a8df2.exe 1940 47ad782560fad3022e9f990f369a8df2.exe 2532 Unicorn-36603.exe 2532 Unicorn-36603.exe 2696 Unicorn-29053.exe 2696 Unicorn-29053.exe 2816 Unicorn-26976.exe 2816 Unicorn-26976.exe 2576 WerFault.exe 2576 WerFault.exe 2576 WerFault.exe 2576 WerFault.exe 2576 WerFault.exe 2576 WerFault.exe 2576 WerFault.exe 2576 WerFault.exe 2576 WerFault.exe 2856 Unicorn-41146.exe 2856 Unicorn-41146.exe 2952 Unicorn-45553.exe 2952 Unicorn-45553.exe 2696 Unicorn-29053.exe 2696 Unicorn-29053.exe 2612 Unicorn-28340.exe 2612 Unicorn-28340.exe 2816 Unicorn-26976.exe 2816 Unicorn-26976.exe 1920 WerFault.exe 1920 WerFault.exe 1920 WerFault.exe 1920 WerFault.exe 1920 WerFault.exe 1920 WerFault.exe 1920 WerFault.exe 1920 WerFault.exe 772 WerFault.exe 772 WerFault.exe 772 WerFault.exe 772 WerFault.exe 772 WerFault.exe 772 WerFault.exe 1920 WerFault.exe 772 WerFault.exe 772 WerFault.exe 772 WerFault.exe 2908 Unicorn-37915.exe 2908 Unicorn-37915.exe 2856 Unicorn-41146.exe 2856 Unicorn-41146.exe 2924 Unicorn-38683.exe 2924 Unicorn-38683.exe 2952 Unicorn-45553.exe 2952 Unicorn-45553.exe 1604 Unicorn-5652.exe 1604 Unicorn-5652.exe 2164 Unicorn-34302.exe 2164 Unicorn-34302.exe 2612 Unicorn-28340.exe 2612 Unicorn-28340.exe 1804 Unicorn-33342.exe -
Program crash 42 IoCs
pid pid_target Process procid_target 2320 1940 WerFault.exe 27 2576 2532 WerFault.exe 28 1920 2696 WerFault.exe 29 772 2816 WerFault.exe 30 2340 2856 WerFault.exe 32 2356 2612 WerFault.exe 34 2228 2908 WerFault.exe 36 2160 2924 WerFault.exe 37 3052 2164 WerFault.exe 40 2392 1604 WerFault.exe 39 2740 1804 WerFault.exe 38 2948 2176 WerFault.exe 61 2944 2344 WerFault.exe 44 3024 1836 WerFault.exe 56 3020 1744 WerFault.exe 55 1572 1528 WerFault.exe 43 2304 1780 WerFault.exe 54 1728 2904 WerFault.exe 47 2364 1028 WerFault.exe 57 1876 1088 WerFault.exe 50 1488 548 WerFault.exe 60 1784 2776 WerFault.exe 67 1732 2000 WerFault.exe 48 1860 2468 WerFault.exe 49 948 1752 WerFault.exe 62 1284 2952 WerFault.exe 33 2672 2004 WerFault.exe 59 1156 1188 WerFault.exe 45 2080 2396 WerFault.exe 63 2312 1448 WerFault.exe 64 2996 2492 WerFault.exe 53 2656 2408 WerFault.exe 58 2692 2884 WerFault.exe 113 1820 2528 WerFault.exe 83 2472 2088 WerFault.exe 88 2136 2744 WerFault.exe 72 2208 2248 WerFault.exe 86 2216 2632 WerFault.exe 74 2668 1316 WerFault.exe 90 1548 796 WerFault.exe 78 1508 2900 WerFault.exe 115 1360 2580 WerFault.exe 77 -
Suspicious use of SetWindowsHookEx 35 IoCs
pid Process 1940 47ad782560fad3022e9f990f369a8df2.exe 2532 Unicorn-36603.exe 2696 Unicorn-29053.exe 2816 Unicorn-26976.exe 2856 Unicorn-41146.exe 2952 Unicorn-45553.exe 2612 Unicorn-28340.exe 2908 Unicorn-37915.exe 2924 Unicorn-38683.exe 2164 Unicorn-34302.exe 1804 Unicorn-33342.exe 1604 Unicorn-5652.exe 1528 Unicorn-54607.exe 2344 Unicorn-25888.exe 1188 Unicorn-26351.exe 2904 Unicorn-26927.exe 3012 Unicorn-39349.exe 2000 Unicorn-9739.exe 2468 Unicorn-42412.exe 1088 Unicorn-4757.exe 2492 Unicorn-30036.exe 1780 Unicorn-46107.exe 1744 Unicorn-18417.exe 1836 Unicorn-17457.exe 1028 Unicorn-59470.exe 2004 Unicorn-30585.exe 2176 Unicorn-51027.exe 1448 Unicorn-2521.exe 2396 Unicorn-3279.exe 548 Unicorn-64410.exe 2408 Unicorn-32889.exe 1752 Unicorn-3279.exe 2776 Unicorn-51707.exe 2744 Unicorn-1655.exe 2724 Unicorn-47327.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1940 wrote to memory of 2532 1940 47ad782560fad3022e9f990f369a8df2.exe 28 PID 1940 wrote to memory of 2532 1940 47ad782560fad3022e9f990f369a8df2.exe 28 PID 1940 wrote to memory of 2532 1940 47ad782560fad3022e9f990f369a8df2.exe 28 PID 1940 wrote to memory of 2532 1940 47ad782560fad3022e9f990f369a8df2.exe 28 PID 2532 wrote to memory of 2696 2532 Unicorn-36603.exe 29 PID 2532 wrote to memory of 2696 2532 Unicorn-36603.exe 29 PID 2532 wrote to memory of 2696 2532 Unicorn-36603.exe 29 PID 2532 wrote to memory of 2696 2532 Unicorn-36603.exe 29 PID 1940 wrote to memory of 2816 1940 47ad782560fad3022e9f990f369a8df2.exe 30 PID 1940 wrote to memory of 2816 1940 47ad782560fad3022e9f990f369a8df2.exe 30 PID 1940 wrote to memory of 2816 1940 47ad782560fad3022e9f990f369a8df2.exe 30 PID 1940 wrote to memory of 2816 1940 47ad782560fad3022e9f990f369a8df2.exe 30 PID 1940 wrote to memory of 2320 1940 47ad782560fad3022e9f990f369a8df2.exe 31 PID 1940 wrote to memory of 2320 1940 47ad782560fad3022e9f990f369a8df2.exe 31 PID 1940 wrote to memory of 2320 1940 47ad782560fad3022e9f990f369a8df2.exe 31 PID 1940 wrote to memory of 2320 1940 47ad782560fad3022e9f990f369a8df2.exe 31 PID 2532 wrote to memory of 2856 2532 Unicorn-36603.exe 32 PID 2532 wrote to memory of 2856 2532 Unicorn-36603.exe 32 PID 2532 wrote to memory of 2856 2532 Unicorn-36603.exe 32 PID 2532 wrote to memory of 2856 2532 Unicorn-36603.exe 32 PID 2696 wrote to memory of 2952 2696 Unicorn-29053.exe 33 PID 2696 wrote to memory of 2952 2696 Unicorn-29053.exe 33 PID 2696 wrote to memory of 2952 2696 Unicorn-29053.exe 33 PID 2696 wrote to memory of 2952 2696 Unicorn-29053.exe 33 PID 2816 wrote to memory of 2612 2816 Unicorn-26976.exe 34 PID 2816 wrote to memory of 2612 2816 Unicorn-26976.exe 34 PID 2816 wrote to memory of 2612 2816 Unicorn-26976.exe 34 PID 2816 wrote to memory of 2612 2816 Unicorn-26976.exe 34 PID 2532 wrote to memory of 2576 2532 Unicorn-36603.exe 35 PID 2532 wrote to memory of 2576 2532 Unicorn-36603.exe 35 PID 2532 wrote to memory of 2576 2532 Unicorn-36603.exe 35 PID 2532 wrote to memory of 2576 2532 Unicorn-36603.exe 35 PID 2856 wrote to memory of 2908 2856 Unicorn-41146.exe 36 PID 2856 wrote to memory of 2908 2856 Unicorn-41146.exe 36 PID 2856 wrote to memory of 2908 2856 Unicorn-41146.exe 36 PID 2856 wrote to memory of 2908 2856 Unicorn-41146.exe 36 PID 2952 wrote to memory of 2924 2952 Unicorn-45553.exe 37 PID 2952 wrote to memory of 2924 2952 Unicorn-45553.exe 37 PID 2952 wrote to memory of 2924 2952 Unicorn-45553.exe 37 PID 2952 wrote to memory of 2924 2952 Unicorn-45553.exe 37 PID 2696 wrote to memory of 1804 2696 Unicorn-29053.exe 38 PID 2696 wrote to memory of 1804 2696 Unicorn-29053.exe 38 PID 2696 wrote to memory of 1804 2696 Unicorn-29053.exe 38 PID 2696 wrote to memory of 1804 2696 Unicorn-29053.exe 38 PID 2612 wrote to memory of 1604 2612 Unicorn-28340.exe 39 PID 2612 wrote to memory of 1604 2612 Unicorn-28340.exe 39 PID 2612 wrote to memory of 1604 2612 Unicorn-28340.exe 39 PID 2612 wrote to memory of 1604 2612 Unicorn-28340.exe 39 PID 2816 wrote to memory of 2164 2816 Unicorn-26976.exe 40 PID 2816 wrote to memory of 2164 2816 Unicorn-26976.exe 40 PID 2816 wrote to memory of 2164 2816 Unicorn-26976.exe 40 PID 2816 wrote to memory of 2164 2816 Unicorn-26976.exe 40 PID 2696 wrote to memory of 1920 2696 Unicorn-29053.exe 41 PID 2696 wrote to memory of 1920 2696 Unicorn-29053.exe 41 PID 2696 wrote to memory of 1920 2696 Unicorn-29053.exe 41 PID 2696 wrote to memory of 1920 2696 Unicorn-29053.exe 41 PID 2816 wrote to memory of 772 2816 Unicorn-26976.exe 42 PID 2816 wrote to memory of 772 2816 Unicorn-26976.exe 42 PID 2816 wrote to memory of 772 2816 Unicorn-26976.exe 42 PID 2816 wrote to memory of 772 2816 Unicorn-26976.exe 42 PID 2908 wrote to memory of 1528 2908 Unicorn-37915.exe 43 PID 2908 wrote to memory of 1528 2908 Unicorn-37915.exe 43 PID 2908 wrote to memory of 1528 2908 Unicorn-37915.exe 43 PID 2908 wrote to memory of 1528 2908 Unicorn-37915.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\47ad782560fad3022e9f990f369a8df2.exe"C:\Users\Admin\AppData\Local\Temp\47ad782560fad3022e9f990f369a8df2.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-36603.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36603.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-29053.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29053.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45553.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45553.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38683.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38683.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26351.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26351.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-59470.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59470.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1028 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30034.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30034.exe8⤵
- Executes dropped EXE
PID:2896
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1028 -s 2368⤵
- Program crash
PID:2364
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34750.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34750.exe7⤵
- Executes dropped EXE
PID:2984 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-425.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-425.exe8⤵PID:940
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1188 -s 2407⤵
- Program crash
PID:1156
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30585.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30585.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54616.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54616.exe7⤵
- Executes dropped EXE
PID:796 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58376.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58376.exe8⤵PID:1736
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48582.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48582.exe9⤵PID:2116
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 796 -s 2368⤵
- Program crash
PID:1548
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2004 -s 2367⤵
- Program crash
PID:2672
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2924 -s 2406⤵
- Program crash
PID:2160
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39349.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39349.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3012
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2952 -s 2405⤵
- Program crash
PID:1284
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33342.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33342.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1804 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-42412.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42412.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2468 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3279.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3279.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54616.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54616.exe7⤵
- Executes dropped EXE
PID:1564
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2396 -s 2167⤵
- Program crash
PID:2080
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34750.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34750.exe6⤵
- Executes dropped EXE
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-64575.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64575.exe7⤵PID:2884
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2884 -s 1888⤵
- Program crash
PID:2692
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2528 -s 2367⤵
- Program crash
PID:1820
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2468 -s 2406⤵
- Program crash
PID:1860
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2521.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2521.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54860.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54860.exe6⤵
- Executes dropped EXE
PID:320
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1448 -s 2366⤵
- Program crash
PID:2312
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1804 -s 2405⤵
- Program crash
PID:2740
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2696 -s 2404⤵
- Loads dropped DLL
- Program crash
PID:1920
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41146.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41146.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37915.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37915.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54607.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54607.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1528 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30036.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30036.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51707.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51707.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45452.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45452.exe8⤵PID:2088
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15587.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15587.exe9⤵PID:2920
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2088 -s 2369⤵
- Program crash
PID:2472
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2776 -s 2368⤵
- Program crash
PID:1784
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25586.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25586.exe7⤵PID:2660
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2492 -s 2407⤵
- Program crash
PID:2996
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47327.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47327.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2724
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1528 -s 2406⤵
- Program crash
PID:1572
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46107.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46107.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1780 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-1655.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1655.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2744 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2744 -s 2407⤵
- Program crash
PID:2136
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1780 -s 2366⤵
- Program crash
PID:2304
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2908 -s 2405⤵
- Program crash
PID:2228
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25888.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25888.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18417.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18417.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-39489.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39489.exe6⤵
- Executes dropped EXE
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46534.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46534.exe7⤵PID:1600
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2632 -s 2367⤵
- Program crash
PID:2216
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1744 -s 2366⤵
- Program crash
PID:3020
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3178.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3178.exe5⤵
- Executes dropped EXE
PID:2640
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2344 -s 2405⤵
- Program crash
PID:2944
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2856 -s 2404⤵
- Program crash
PID:2340
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2532 -s 2403⤵
- Loads dropped DLL
- Program crash
PID:2576
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26976.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26976.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2816 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-28340.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28340.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5652.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5652.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26927.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26927.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17457.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17457.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-4486.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4486.exe7⤵
- Executes dropped EXE
PID:2596
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1836 -s 2367⤵
- Program crash
PID:3024
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54190.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54190.exe6⤵
- Executes dropped EXE
PID:2580 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15269.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15269.exe7⤵PID:2072
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2580 -s 2367⤵
- Program crash
PID:1360
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2904 -s 2406⤵
- Program crash
PID:1728
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32889.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32889.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-19022.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19022.exe6⤵PID:1316
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62578.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62578.exe7⤵PID:2012
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1316 -s 2367⤵
- Program crash
PID:2668
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2408 -s 2366⤵
- Program crash
PID:2656
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1604 -s 2405⤵
- Program crash
PID:2392
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4757.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4757.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1088 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3279.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3279.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-19022.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19022.exe6⤵PID:1764
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1752 -s 2366⤵
- Program crash
PID:948
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64237.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64237.exe5⤵
- Executes dropped EXE
PID:748
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1088 -s 2405⤵
- Program crash
PID:1876
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2612 -s 2404⤵
- Program crash
PID:2356
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34302.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34302.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2164 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9739.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9739.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51027.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51027.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2176 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2176 -s 2406⤵
- Program crash
PID:2948
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34750.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34750.exe5⤵
- Executes dropped EXE
PID:2504
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2000 -s 2405⤵
- Program crash
PID:1732
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64410.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64410.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:548 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18758.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18758.exe5⤵
- Executes dropped EXE
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-55357.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55357.exe6⤵PID:2900
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18404.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18404.exe7⤵PID:2260
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2900 -s 2367⤵
- Program crash
PID:1508
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2248 -s 2366⤵
- Program crash
PID:2208
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 548 -s 2365⤵
- Program crash
PID:1488
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2164 -s 2404⤵
- Program crash
PID:3052
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2816 -s 2403⤵
- Loads dropped DLL
- Program crash
PID:772
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1940 -s 2402⤵
- Program crash
PID:2320
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD525be3dc1955beb554dc5cb73ae90a71a
SHA13b5104539337eba7fff0fbb9810fad52a341885e
SHA256ba098a650fb3254f6f40a2aa947fc478dd92bceb35be02a67e14d176e7bc46a8
SHA5122075c40c82b576c9c44e0cf178fa9aa239fd940bf998e14192ea2b4ae86f0f118723280499d118f5dc88d299959479f8bef10d8f6c27221dd87436c6fbc9b56b
-
Filesize
181KB
MD5ed516615d58b183e6cfc3f4dd339a6aa
SHA160ca3e01c6d046521fd0f11d282fc5aa0d0bd96e
SHA256e589a9c1ffb95740a4950aa1de5ab4ba8fe5652a5ecaf515aeaddb713331a79a
SHA5121827bdaac484e3bf98c869c1fecc88611117c329b42f10261fb84c49df08a1e3e617a42d4bc9bc8ea7c8966b8a9df66d09cedd8f376786033e61c35202e02d46
-
Filesize
120KB
MD5c4928c3ba6affa7fb915c05fdb0d9c22
SHA175f87badb5848ba43c1a98965061f41d3f7a0549
SHA256a257bc5ad90a8c1fb6c1f15e6823c324499f96cf0db16950ab45119ca1c055aa
SHA512c163858853d73c1de082e5a6e27fd2adcec16374229f00be3ca3533291721909bf0c43a2569b2d8258e12a264c09ecd78d529ab326b87d34f70c5e4eb830605c
-
Filesize
112KB
MD592c58c20f0cd1d5305a58527c2efb13b
SHA16e81cfad2bd804e328896c95c2528c15142f2134
SHA256b8d9bf6f30eab81a18a91069e7c62235fba8f40f34560d998235c7d2c45165a3
SHA512dc88f5a78fd01925620e409c419e4d3e686d7ca3a3cd8cf55949a502c7e44e3ee134f4918fd4137b96f25c4e91176b8e2ad30edb6a35b043d342f00cb2674301
-
Filesize
102KB
MD5cf1ee135259023411d5e1bc9968b705a
SHA122bfd83ddf953d40fefe76ca984e2cf6c750b898
SHA256b5d6330a14ef4cdba7386f94531acc19fb97d7b0d9399cac85c322baa2b0753b
SHA512c38a4beff18e681f5bff97bbfab037afabc9d9d35521598eb8e0456767e546567a38cc9003efc3429b3119aa9f3cb33b12ba7de95acb42f7ee7c25b93f18c20c
-
Filesize
99KB
MD56bf31c845d3aeefc02c1c1047c173fb4
SHA1cf0da4f6d2f88aaa0d83fb9e17b4ddbf2c67431d
SHA2564a513e39da404afc7a3719428a9969751fbe6b20a3a73c5abf2d975efd08be59
SHA5129b7fa95d38365746f71fb7de1c37382f5e2006d0de11861121f3f6cc604f3c9626881dc9510e92468ba5718b68f6a3896dfdd9285513c14566dff4720b24f842
-
Filesize
142KB
MD532715bcfe463079aa761c480d4fd93a8
SHA10d755d0da0f3e1483332dd21f50ac9924cbf7fed
SHA25664df056ba611d25b1bc927ab0f5aea7205311809fe69edef5521907aae44e918
SHA512f443a2783bb318f378e9468604955fd14949e85871c70911bcbce59acb001f86db2fbb9b8c070a0ada6b2a33936e962501a07e94b51f5bc5533619c8fcc10f58
-
Filesize
105KB
MD5491325aafe86277548164e03f266bf4f
SHA1a95c12fa710518fc8d8b026edd68a6e227c7976d
SHA256bd804806976d7e35d36084fc732edb70e18749e02cfe8dea3de93b3ae869cf60
SHA512fefd43aa7a8ccf1e587c9a8591b72411c658521bead76b5efcb0911e818451df3924065b3b9ab4aa034b1b3b16ce666f2e1a4ae63a508c0aeb3c71c1173123d0
-
Filesize
184KB
MD5c49c3183234a2cfffe7da682d7fa6b34
SHA1b94411cf6412065d6b8ec66f810363d402d57225
SHA25681b150a13b9c54a04ccf658c7935955b4378411db2307f785d7000ae46803d5d
SHA5125f348d9265cc0ab0260f4979d1c49dec8967c903190ba2431b4d3cea7a34eb8a82217fe454666f2471ee7d73a3dc59904c5aef7f7db9da68a8525e7826a3235a
-
Filesize
184KB
MD51e114cf2c5a5044ee59c607973d51b3f
SHA17562a367e6cec51d03ca7fe216025af229473a7f
SHA2561e9398cb33949cf30f7da2350623afbf3b836c1ae63f452d253530fedb6065f0
SHA51253f0b6ce8ea41d9a92149a4b93b47087de98e5ff5f1f4c7da05d8c52b40c2ea51271cb712220aba0a35d7d13e23fd232fe47e919605179291834f1615615ca51
-
Filesize
184KB
MD550e03d1ed80c0896b4a1245abd334683
SHA179d5c7b5fbe72da00888c3b713a78a0bfa373795
SHA2568d6d857e50d8e94f847059d8b6d69dd4e03c0c6b8421648454178f36b75f093a
SHA512dc4edc59c93ac6e1e2eeee013896215144a5266b62943379b35b6adb01d0794396fb9392b07ad9705f8395da984ccccdde741963d862465efcb1d2164efd8de3
-
Filesize
155KB
MD518ebccf0316e657704f7ad9100507315
SHA12e89785e73b3a47b5eb68c1b690320c1ca35beb4
SHA256a9cf386f9a032ce1c7bc16aebec4c046fc67d6c7c2ddbe42e1ed79dafa87f90a
SHA5124ba245d0bd6a20ceb36cfbae9b7ef83d107c3376da2237d55d0bfe1ebd5c2ebaca2c9b9b322665f318b8060efdfee7bfacef329b511bd8d2a8b6721e1c0200f0
-
Filesize
184KB
MD5c29cdab7d83a0f40b07cf556a99dee05
SHA1a5a48dae6be8c821f2977ef8e0a5189431d6acb3
SHA25616090956ca1554fb9e0aab6fac6913b69b77bc04e9f88b2798a246eb44977bd5
SHA512da18eea42d2b34fd4c20d767360dbd7c451a3c995a31e925c1cf1fd9fc880f04efb8fe966d07c06c9b1ef9779d6d22b6397b567ac1d039bdbba88e57ffd10cbc
-
Filesize
184KB
MD57b952f6b4b4b5b09bfd6e6a7945ba435
SHA19d48bfff56e4fd054ce376e4ac82aa1712762465
SHA256553e46112909b6b8cd01e1d7a415ea1e5e7f6d41e2bf7a3ee5168edc0b796beb
SHA5123849498d2d7b63be090a08999ec015bf4bb07275ae296706b02819ccd48e4cc06d7bc67c8708de900faa3bb15c48872a5e9815e5284bf935d0534ea6498d4c4f
-
Filesize
184KB
MD567a560ff4ba061a1b835f42c4aa30216
SHA1a0dca5a7513cf76fe262a26d9ef680d4de8a186d
SHA2568662e41d77787b6560c64b75d5e3e8897f7b36aa27c4baf8573a49f6e07379bc
SHA5120e01f77e62f344212e56aea959ecfd12c2454341201500dd05f566dcd512c82f3b03053dc30244e564bba2644685ce15df747951769446c86f475f047e2dcc13
-
Filesize
184KB
MD5b5f3caf5b412b6c2976f27f553f14676
SHA127346e00bdf15cbbedbad1ee810e9155d68cf7e5
SHA25633784659b728ceb86aa2824cddef2ba13c56614d852a0e93b97346fe7d86c3ce
SHA512ff06e1d914f10c8a9a880b20303b0041baa739357cb4a0f9b85d2c4007e834ed5e7be4b7f4d5c9423c75f92e5dd2d2e518a34fda81d6b1e3f9955158932c560a
-
Filesize
184KB
MD58a4faeccd3ed3075f85f4a3423553903
SHA1b9f19e79da554410661fbf515818a35e2c9d19c7
SHA25650bc8d876ad2c2b72827105ef6ce6ad5e0212f96452a6f62b80c47769e22a682
SHA512a23b313c4e0740c6b12a9822e1904bc220c4ec675e00b522cbf082180a8efdf3fe22b21890d276a1f29c5b8234fdbd6a23a800031deceb4227be22b1b53f395d
-
Filesize
184KB
MD5fe744f44ccabb258d31971d431a3f748
SHA1c1eb8cbb095b73c22d70b06be98d5b8bbe08974d
SHA2565e07c014575fbb349f877e9565d661516893938dbfef8a8cb1074e53ac48f733
SHA51222b3769a615935dc0f8e3bc123b74f821c84576cd840456891077e49f72948896da7d871c13b9510ec86f00a912e34ab6db0279a13635dc56e81355056fb1a0c
-
Filesize
184KB
MD55fd7c318cb27c7baec21eddaea15981a
SHA1a04fff03022ee493349d8d2b09a44972f3316c64
SHA256099972b520d821a350830c9fd5c843392bb7983d45fc3e51878a03ff7a8f87e8
SHA5129a8a774cb79ef800b3ee7930cf9f8dd057d5ac71a01e3cea1bd28376afd1e1a53851d4292b30f54a120850b8282e9e2b4b6ffa67610a3061900be6ad182e9aca