Analysis
-
max time kernel
135s -
max time network
33s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
07/01/2024, 09:12
Static task
static1
Behavioral task
behavioral1
Sample
48950b2a1f48b785d8b17d7089a3d0dc.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
48950b2a1f48b785d8b17d7089a3d0dc.exe
Resource
win10v2004-20231222-en
General
-
Target
48950b2a1f48b785d8b17d7089a3d0dc.exe
-
Size
184KB
-
MD5
48950b2a1f48b785d8b17d7089a3d0dc
-
SHA1
5bcfa4c419037ac46e95a65ce435af378f94ddae
-
SHA256
1894ef49491d1c08ee7b30ef2d7214a0713f8f7d889727b846b6555fa546db89
-
SHA512
d515ae2eedbb0029cd1c242abf4e5d5386621179db2d2d7c80abec782b43cdc84d0358c8fd6660bada177eac736222c65e4c98b882a5ffe98062678da6576c73
-
SSDEEP
3072:+P65oVUme9ACdeP0HaLTJWcZCLJlMeDdlQEaxKELQnClP6pFT:+PsoCqCdjHyJWcCfH/ClP6pF
Malware Config
Signatures
-
Executes dropped EXE 59 IoCs
pid Process 2760 Unicorn-2832.exe 2492 Unicorn-12915.exe 2580 Unicorn-11841.exe 2880 Unicorn-144.exe 2100 Unicorn-15339.exe 2272 Unicorn-64540.exe 980 Unicorn-32802.exe 1496 Unicorn-7228.exe 816 Unicorn-56984.exe 692 Unicorn-12936.exe 2908 Unicorn-58266.exe 892 Unicorn-12594.exe 1656 Unicorn-24847.exe 2468 Unicorn-24847.exe 1744 Unicorn-4981.exe 1432 Unicorn-20763.exe 2060 Unicorn-59216.exe 868 Unicorn-10015.exe 2720 Unicorn-30628.exe 2796 Unicorn-38988.exe 2800 Unicorn-1847.exe 2616 Unicorn-49437.exe 2756 Unicorn-8404.exe 1560 Unicorn-33994.exe 1860 Unicorn-252.exe 364 Unicorn-42162.exe 2772 Unicorn-62582.exe 1880 Unicorn-54388.exe 584 Unicorn-58472.exe 1920 Unicorn-38798.exe 268 Unicorn-17632.exe 2532 Unicorn-42690.exe 800 Unicorn-61513.exe 2528 Unicorn-58664.exe 656 Unicorn-63303.exe 2156 Unicorn-11622.exe 1916 Unicorn-61378.exe 1500 Unicorn-45042.exe 2408 Unicorn-29578.exe 2916 Unicorn-15707.exe 1544 Unicorn-16257.exe 1224 Unicorn-48571.exe 368 Unicorn-48654.exe 1228 Unicorn-7813.exe 1304 Unicorn-3454.exe 1340 Unicorn-14030.exe 2456 Unicorn-18115.exe 2748 Unicorn-60491.exe 2812 Unicorn-22391.exe 1684 Unicorn-9946.exe 2632 Unicorn-52131.exe 3016 Unicorn-56215.exe 1380 Unicorn-2930.exe 2656 Unicorn-11098.exe 2072 Unicorn-11098.exe 2112 Unicorn-20393.exe 3028 Unicorn-36131.exe 456 Unicorn-40599.exe 540 Unicorn-3096.exe -
Loads dropped DLL 64 IoCs
pid Process 2620 48950b2a1f48b785d8b17d7089a3d0dc.exe 2620 48950b2a1f48b785d8b17d7089a3d0dc.exe 2760 Unicorn-2832.exe 2760 Unicorn-2832.exe 2492 Unicorn-12915.exe 2760 Unicorn-2832.exe 2492 Unicorn-12915.exe 2760 Unicorn-2832.exe 2880 Unicorn-144.exe 2580 Unicorn-11841.exe 2880 Unicorn-144.exe 2580 Unicorn-11841.exe 2580 Unicorn-11841.exe 2272 Unicorn-64540.exe 2272 Unicorn-64540.exe 2100 Unicorn-15339.exe 2100 Unicorn-15339.exe 2880 Unicorn-144.exe 2880 Unicorn-144.exe 2580 Unicorn-11841.exe 2272 Unicorn-64540.exe 2272 Unicorn-64540.exe 980 Unicorn-32802.exe 980 Unicorn-32802.exe 692 Unicorn-12936.exe 816 Unicorn-56984.exe 692 Unicorn-12936.exe 816 Unicorn-56984.exe 2100 Unicorn-15339.exe 2100 Unicorn-15339.exe 1496 Unicorn-7228.exe 1496 Unicorn-7228.exe 892 Unicorn-12594.exe 892 Unicorn-12594.exe 1656 Unicorn-24847.exe 1656 Unicorn-24847.exe 2908 Unicorn-58266.exe 1744 Unicorn-4981.exe 1432 Unicorn-20763.exe 1744 Unicorn-4981.exe 2908 Unicorn-58266.exe 1432 Unicorn-20763.exe 2060 Unicorn-59216.exe 2060 Unicorn-59216.exe 868 Unicorn-10015.exe 868 Unicorn-10015.exe 2720 Unicorn-30628.exe 2720 Unicorn-30628.exe 2800 Unicorn-1847.exe 2796 Unicorn-38988.exe 2756 Unicorn-8404.exe 2800 Unicorn-1847.exe 2756 Unicorn-8404.exe 2796 Unicorn-38988.exe 2772 Unicorn-62582.exe 2772 Unicorn-62582.exe 2720 Unicorn-30628.exe 2720 Unicorn-30628.exe 1860 Unicorn-252.exe 1860 Unicorn-252.exe 364 Unicorn-42162.exe 364 Unicorn-42162.exe 2800 Unicorn-1847.exe 2800 Unicorn-1847.exe -
Program crash 6 IoCs
pid pid_target Process procid_target 1060 1860 WerFault.exe 55 904 584 WerFault.exe 57 2792 2916 WerFault.exe 72 2264 2812 WerFault.exe 80 2516 3008 WerFault.exe 98 2444 2752 WerFault.exe 110 -
Suspicious use of SetWindowsHookEx 56 IoCs
pid Process 2620 48950b2a1f48b785d8b17d7089a3d0dc.exe 2760 Unicorn-2832.exe 2492 Unicorn-12915.exe 2580 Unicorn-11841.exe 2880 Unicorn-144.exe 2100 Unicorn-15339.exe 2272 Unicorn-64540.exe 1496 Unicorn-7228.exe 980 Unicorn-32802.exe 816 Unicorn-56984.exe 692 Unicorn-12936.exe 2908 Unicorn-58266.exe 1432 Unicorn-20763.exe 1744 Unicorn-4981.exe 1656 Unicorn-24847.exe 892 Unicorn-12594.exe 2060 Unicorn-59216.exe 868 Unicorn-10015.exe 2720 Unicorn-30628.exe 2800 Unicorn-1847.exe 2796 Unicorn-38988.exe 2616 Unicorn-49437.exe 2756 Unicorn-8404.exe 1560 Unicorn-33994.exe 364 Unicorn-42162.exe 1860 Unicorn-252.exe 2772 Unicorn-62582.exe 1880 Unicorn-54388.exe 584 Unicorn-58472.exe 268 Unicorn-17632.exe 1920 Unicorn-38798.exe 2532 Unicorn-42690.exe 2528 Unicorn-58664.exe 800 Unicorn-61513.exe 656 Unicorn-63303.exe 2916 Unicorn-15707.exe 1500 Unicorn-45042.exe 2156 Unicorn-11622.exe 1916 Unicorn-61378.exe 2408 Unicorn-29578.exe 1544 Unicorn-16257.exe 1224 Unicorn-48571.exe 368 Unicorn-48654.exe 1304 Unicorn-3454.exe 1228 Unicorn-7813.exe 2456 Unicorn-18115.exe 1340 Unicorn-14030.exe 2748 Unicorn-60491.exe 3016 Unicorn-56215.exe 1684 Unicorn-9946.exe 2632 Unicorn-52131.exe 2812 Unicorn-22391.exe 1380 Unicorn-2930.exe 2656 Unicorn-11098.exe 2072 Unicorn-11098.exe 2112 Unicorn-20393.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2620 wrote to memory of 2760 2620 48950b2a1f48b785d8b17d7089a3d0dc.exe 29 PID 2620 wrote to memory of 2760 2620 48950b2a1f48b785d8b17d7089a3d0dc.exe 29 PID 2620 wrote to memory of 2760 2620 48950b2a1f48b785d8b17d7089a3d0dc.exe 29 PID 2620 wrote to memory of 2760 2620 48950b2a1f48b785d8b17d7089a3d0dc.exe 29 PID 2760 wrote to memory of 2492 2760 Unicorn-2832.exe 30 PID 2760 wrote to memory of 2492 2760 Unicorn-2832.exe 30 PID 2760 wrote to memory of 2492 2760 Unicorn-2832.exe 30 PID 2760 wrote to memory of 2492 2760 Unicorn-2832.exe 30 PID 2492 wrote to memory of 2580 2492 Unicorn-12915.exe 31 PID 2492 wrote to memory of 2580 2492 Unicorn-12915.exe 31 PID 2492 wrote to memory of 2580 2492 Unicorn-12915.exe 31 PID 2492 wrote to memory of 2580 2492 Unicorn-12915.exe 31 PID 2760 wrote to memory of 2880 2760 Unicorn-2832.exe 32 PID 2760 wrote to memory of 2880 2760 Unicorn-2832.exe 32 PID 2760 wrote to memory of 2880 2760 Unicorn-2832.exe 32 PID 2760 wrote to memory of 2880 2760 Unicorn-2832.exe 32 PID 2880 wrote to memory of 2100 2880 Unicorn-144.exe 33 PID 2880 wrote to memory of 2100 2880 Unicorn-144.exe 33 PID 2880 wrote to memory of 2100 2880 Unicorn-144.exe 33 PID 2880 wrote to memory of 2100 2880 Unicorn-144.exe 33 PID 2580 wrote to memory of 2272 2580 Unicorn-11841.exe 34 PID 2580 wrote to memory of 2272 2580 Unicorn-11841.exe 34 PID 2580 wrote to memory of 2272 2580 Unicorn-11841.exe 34 PID 2580 wrote to memory of 2272 2580 Unicorn-11841.exe 34 PID 2272 wrote to memory of 980 2272 Unicorn-64540.exe 37 PID 2272 wrote to memory of 980 2272 Unicorn-64540.exe 37 PID 2272 wrote to memory of 980 2272 Unicorn-64540.exe 37 PID 2272 wrote to memory of 980 2272 Unicorn-64540.exe 37 PID 2100 wrote to memory of 1496 2100 Unicorn-15339.exe 36 PID 2100 wrote to memory of 1496 2100 Unicorn-15339.exe 36 PID 2100 wrote to memory of 1496 2100 Unicorn-15339.exe 36 PID 2100 wrote to memory of 1496 2100 Unicorn-15339.exe 36 PID 2880 wrote to memory of 816 2880 Unicorn-144.exe 35 PID 2880 wrote to memory of 816 2880 Unicorn-144.exe 35 PID 2880 wrote to memory of 816 2880 Unicorn-144.exe 35 PID 2880 wrote to memory of 816 2880 Unicorn-144.exe 35 PID 2580 wrote to memory of 692 2580 Unicorn-11841.exe 38 PID 2580 wrote to memory of 692 2580 Unicorn-11841.exe 38 PID 2580 wrote to memory of 692 2580 Unicorn-11841.exe 38 PID 2580 wrote to memory of 692 2580 Unicorn-11841.exe 38 PID 2272 wrote to memory of 2908 2272 Unicorn-64540.exe 39 PID 2272 wrote to memory of 2908 2272 Unicorn-64540.exe 39 PID 2272 wrote to memory of 2908 2272 Unicorn-64540.exe 39 PID 2272 wrote to memory of 2908 2272 Unicorn-64540.exe 39 PID 980 wrote to memory of 892 980 Unicorn-32802.exe 40 PID 980 wrote to memory of 892 980 Unicorn-32802.exe 40 PID 980 wrote to memory of 892 980 Unicorn-32802.exe 40 PID 980 wrote to memory of 892 980 Unicorn-32802.exe 40 PID 692 wrote to memory of 2468 692 Unicorn-12936.exe 44 PID 692 wrote to memory of 2468 692 Unicorn-12936.exe 44 PID 692 wrote to memory of 2468 692 Unicorn-12936.exe 44 PID 692 wrote to memory of 2468 692 Unicorn-12936.exe 44 PID 816 wrote to memory of 1656 816 Unicorn-56984.exe 43 PID 816 wrote to memory of 1656 816 Unicorn-56984.exe 43 PID 816 wrote to memory of 1656 816 Unicorn-56984.exe 43 PID 816 wrote to memory of 1656 816 Unicorn-56984.exe 43 PID 2100 wrote to memory of 1744 2100 Unicorn-15339.exe 42 PID 2100 wrote to memory of 1744 2100 Unicorn-15339.exe 42 PID 2100 wrote to memory of 1744 2100 Unicorn-15339.exe 42 PID 2100 wrote to memory of 1744 2100 Unicorn-15339.exe 42 PID 1496 wrote to memory of 1432 1496 Unicorn-7228.exe 41 PID 1496 wrote to memory of 1432 1496 Unicorn-7228.exe 41 PID 1496 wrote to memory of 1432 1496 Unicorn-7228.exe 41 PID 1496 wrote to memory of 1432 1496 Unicorn-7228.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\48950b2a1f48b785d8b17d7089a3d0dc.exe"C:\Users\Admin\AppData\Local\Temp\48950b2a1f48b785d8b17d7089a3d0dc.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-2832.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2832.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12915.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12915.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11841.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11841.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-64540.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64540.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-32802.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32802.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:980 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12594.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12594.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:892 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10015.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10015.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:868 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-8404.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8404.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62582.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62582.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54388.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54388.exe11⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1880 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48571.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48571.exe12⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1224 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-56215.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56215.exe13⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47829.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47829.exe14⤵PID:2804
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32047.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32047.exe13⤵PID:2892
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45042.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45042.exe11⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18115.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18115.exe12⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60465.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60465.exe13⤵PID:1900
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-219.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-219.exe14⤵PID:2900
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40599.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40599.exe12⤵
- Executes dropped EXE
PID:456
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58266.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58266.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38988.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38988.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-42162.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42162.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:364 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17632.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17632.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:268 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11622.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11622.exe10⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-52131.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52131.exe11⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-55997.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55997.exe12⤵PID:2660
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59446.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59446.exe13⤵PID:1128
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36131.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36131.exe11⤵
- Executes dropped EXE
PID:3028
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61378.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61378.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9946.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9946.exe10⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1684 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-52105.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52105.exe11⤵PID:2180
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10273.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10273.exe12⤵PID:1404
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32239.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32239.exe10⤵PID:2992
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63303.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63303.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:656 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16257.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16257.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14030.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14030.exe10⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1340 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3096.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3096.exe11⤵
- Executes dropped EXE
PID:540
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48768.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48768.exe10⤵PID:1048
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43413.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43413.exe11⤵PID:1880
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12936.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12936.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:692 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-24847.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24847.exe6⤵
- Executes dropped EXE
PID:2468
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-144.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-144.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15339.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15339.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-7228.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7228.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1496 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-20763.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20763.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1432 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-1847.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1847.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-252.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-252.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1860 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58472.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58472.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:584 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15707.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15707.exe10⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22391.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22391.exe11⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2812 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-31493.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31493.exe12⤵PID:3008
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2876.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2876.exe13⤵PID:2752
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2752 -s 24014⤵
- Program crash
PID:2444
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3008 -s 23613⤵
- Program crash
PID:2516
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2812 -s 23612⤵
- Program crash
PID:2264
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2916 -s 23611⤵
- Program crash
PID:2792
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 584 -s 23610⤵
- Program crash
PID:904
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1860 -s 2369⤵
- Program crash
PID:1060
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42690.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42690.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-7813.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7813.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1228 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60491.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60491.exe10⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-39661.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39661.exe11⤵PID:1532
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30090.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30090.exe12⤵PID:2836
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27963.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27963.exe10⤵PID:2384
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30090.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30090.exe11⤵PID:1912
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45409.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45409.exe12⤵PID:2880
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4981.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4981.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30628.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30628.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-33994.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33994.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58664.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58664.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48654.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48654.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:368 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-2930.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2930.exe10⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1380 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-24669.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24669.exe11⤵PID:2960
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47360.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47360.exe12⤵PID:1936
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11885.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11885.exe13⤵PID:2720
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57557.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57557.exe12⤵PID:2184
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8887.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8887.exe10⤵PID:2300
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38798.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38798.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3454.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3454.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1304 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11098.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11098.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-4056.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4056.exe10⤵PID:2704
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49728.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49728.exe9⤵PID:2340
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56984.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56984.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:816 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-24847.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24847.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1656 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-59216.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59216.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49437.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49437.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61513.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61513.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:800 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-29578.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29578.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11098.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11098.exe10⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-20393.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20393.exe11⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2112
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16863.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16863.exe10⤵PID:1964
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD589738a7cf5193d782ed29637e38758fc
SHA1573959aefb214556cc8527c6773b6ef993239300
SHA256b1c9d7699c249ffb0f98a44e50d8ed5238b522fc84f1ed4b7f8723b3d5c197c0
SHA51269d804d2f8bb3b8bee2780145bf090622c32f40d08a951a6fbbc4bfd285d788995560debb7d3309544cc403db756cd8c3a5b73ac83e22f1e67dc0eef74d37814
-
Filesize
184KB
MD548596cd5d9c57a8a456f0ce2321d0155
SHA1e86598bc134a9273966d197aff9bafee2eb92d4c
SHA2560a74bf49bbd6408158a2152960677d14294b10128dd7fc5f04655421a8e41d05
SHA51277b52c7b70ded7e5c80c7843b781b6a1dfa01b9ba8a54e329680e468f6e22d611e6a153f6606fd795e6be2bac4437122b9eb72b3a53cc6fe3e28e95049ab6b80
-
Filesize
184KB
MD5737153552d2c260277428f5adab56a12
SHA10dff2f0c096f6b3445fb3b856b05f285f7a32ce4
SHA256da42aaff8041c3ed31d2e3bf0926b0bbfe2621dfc9cfcc0f0946cfc0b04eb22b
SHA512126502cf1870f2fa43db9b753270975224c5969f58560d95beb6f4da18268ec2054cf8b44a8b135a428fbae3dd5aa22c5f2c1b7891caeac88afa8b32556653ae
-
Filesize
184KB
MD5a66e98ab122625e507a137f94c931b62
SHA102d13c1d0e1c8be057658377c00a15407284a329
SHA256ff4c895ef6a4d722a61016565682a15f208d173f1770248feef799c885fd7f76
SHA512e9d69f67033d5c54277882745f2a6fea87c59f422d989c29c1b955cc72f90ce9920fad5f0692d441e841cfd1b82491b188ad02ac902ae14fa128733bfdf2d398
-
Filesize
184KB
MD552548a1354302a7510aeb9f7737cf987
SHA107600d928850bc2b88e8ef331f717c071e9959ce
SHA2565d8bf6f2397aa73be26b32be0481549d41f7c0817f89c40e20d665ea3e1b1d74
SHA512fb6fa7e839e1e9fdb060a3464d2df0f983ac79bc250a936560b234b3c4b2d5c0d22504e4816fcf3488514cab3b8ca4985c2ad1b05fe1a45944721193fc09e344
-
Filesize
85KB
MD59b6680e7e0f9bc657936366422b03188
SHA15a4518175920da7251157b269a33d9ecb2497050
SHA256481f770f6193cde0761e131812dde658d8001d9ec48651ec895320269d6a286e
SHA512566f2e556b6d900280edc4e6640c9cf0430c9dbdd2ed4e8a843dd68bf86bf7c647704d42605f7c298fbd1ec224a1b0092f4bbe4d28fd160347607ce172cc3bb3
-
Filesize
184KB
MD5926d6a3a4af57e08062f2e21900d9eb4
SHA16c1107e31459a7870f5c6f1b1d42bb40d90517d3
SHA256e3ebbd803f5882eddc7e5befbce51ea540d071171f88dd896c268e65cc4963ca
SHA51268cd89966af5e27257081ebac24e2920087fcb4f8dff62fb2f3012c019ee362e499507f046dc46e1fcc2924fc293a15d8f25018298b7fa68a70708fcea428677
-
Filesize
176KB
MD56030738285c1777b4438e5f83dc9ed9f
SHA1968d4423f3060f32a2a058c85abc02a96f240c84
SHA25612c75e84aa17e63498c5351917261e5f868d5f4c98bd68676e601ff6c1f0b4aa
SHA5124b46d76f04fcd9e79e19c07bf9b09f70277276f81056af7e839dbfada5b9775f33af74e386535c8aa2a08a7144f030a360a440b0f3ae311b00649df5e5696c8d
-
Filesize
184KB
MD59a7687a32c4adf06dc708f5b803ee405
SHA1c9fd49b85f6f0b5cc27b4f99c720d0530c272f07
SHA256c950230d736287e5cfbca96f25bee06f5afd986d9dbc5855bc4f61abc7d1633a
SHA5124024f97d3f04b858d20134a4aefcc80887d2bfb220002361ab9fe99a31f20b78df92eb4fa96c6bd4321ca38750541342c41b998ddf9cf33f7e073180c4282883
-
Filesize
1KB
MD529cc626fea83cdd053cab5ebdd726cb1
SHA133d07aa67bcacbada63e8f08457c04c829db9d73
SHA256091396a9b0ddb5848274072a76db3ea17725521d4f8b581218bf421ea064a2b0
SHA5127bfb5dc07e28caf38871eefcc7c49a4984889756540adbcd3230d066dcae42a8bed678bfa2202f97a32fcc0453bebcf4f11b09bfe4eaad7d454a545d0d4ceb67
-
Filesize
184KB
MD509641fb2683a3bb592fc3e4e302deaf1
SHA1f3d935d1d7fa62637a9adf91e9897e6a35391c55
SHA2565fe705d9930fb4f7b241777a6d7d4deba9f6d89b058ac88dc94eb0b86815c4f7
SHA512408ce7c17fa3ab59da739dacf642a391ab42c7612b2e5413f6a980b8f469523e09200a9938005f962e6ef9cc682bd1c05a72c942eac1c7814ebeeb43706e23ab
-
Filesize
184KB
MD5f6b0f0257024025e96574d4812a430ed
SHA173537dcf977e88b56bd3be89041219d41a6b357f
SHA25649a1ae23e49743d21a980903379d10cda4fdcf7bb177c714b54940647e4f2dfe
SHA51280236aa96594310f8477647286a917d2e3dac5330ec7e1992c87ad0db95337eecf39d1dec0fc8445bc320e7a34c67b5dc4e7c0b44a371ef5a2b5f26260e88921
-
Filesize
184KB
MD5cafdef48db2dbd6dee07716a2eb9f351
SHA15d70310e3da45948a59c5d65d43713ef06079f73
SHA256ad0f96e4e3ca90a924eeb665d23157b5c242b998e04f4dcb68b788fc1af21b56
SHA5124893414afcea45767bbdee3f9fa0b676842173abf497d56ef52ed3eaedcd229133a5008996491d5efbd6d91ad646b0541b173071a887f3f0e5b5188d32c2a2ed
-
Filesize
184KB
MD5b9d439c4513674d69adc3b5ba22c3fcd
SHA1defe07ad991db0ef37347448275fcc4dbb13d485
SHA256a15a4773893de16d507819e900fa144f61b2275caee5cbeb14f11eebc28835a8
SHA5129f1cd31f36c111cd91324860642a8be797b59060e1132945aae3bdc8eb6b944e409b4d6f3343fd534f253c1f0fdddb4bdd6927eca8f07a76bc715ee12c7f310a
-
Filesize
184KB
MD5bd9706afdfb2595665fbdd57d7afcc2b
SHA1412eea6fad457e2b258f0f98a7e4549d1a1f5e57
SHA256fd3714ba3af8d9a56a20d3f9884ebfd20e91ac95acc712028f8ac8d46916db9c
SHA5122085a2b056c7a3e1d09516055a03a9c09b184cb5f9257f4ed59cc7a1e73b28e456691234acf0251ef91b6dd02396390ebe1dfc05ef60f28d92678e554df3dcb6
-
Filesize
184KB
MD5213c7034fb2218a5e1651f3a961492f5
SHA1d531e6cda9fe0d037e9a69234fe186511fe30574
SHA256c983b999f066c9120945f78f34f7f22d1beecba637962a2d95f3050744b235cd
SHA5124b253eee0618c2dc5041dbc5a0576091886865c602e3a92207843279f4a358c0ea4c0bbc730858685a3abc4b20a0832acc578ca2d821e68698806b2dc7e8f745
-
Filesize
184KB
MD5380140e013efcaa37e8a8793e00fc8f1
SHA16ae560d5113ae064ad3cb3a3e57983085187fbcd
SHA25679af18ef83812ffeea9b0491c3313071cfdc743cf55ce8827d05a803554e72ed
SHA512f63e32f64e48b8b4c86219c0df0cf5012c1b696e04754c0692040365157261ca136420622e427087c199224268a62589fff89bdecbfb99e29320ede80b67cb59
-
Filesize
1KB
MD58a4b7ace5e10cccd30ead78759b569f6
SHA1a2ff783990ce3fd2ce1eb463a948f81fd4bb9c61
SHA2561291eaea8880ea1f1fc1894b931ddf8bd96f07651e795aabcd23fc636d0bccb3
SHA5125d06cab898dec58cb8a6f46a9c07f1055f7fb5a2ca69abb24ee07ef1f390266ffc9a781c029e6d6dd046c6e87a85a863caad38c02700318890278179bce006ed
-
Filesize
184KB
MD5985399a319152abd3a823a47a7de66f3
SHA1ebc5cf239b2c3e4f013e353e8f1a4369f58f47d9
SHA25683f735cde79c52aac356609d67be8f49f33daaeee3802ea0fa973bd0556b80d5
SHA512b8e140454a1aa1a493eda4eb87bffa5d69effe0b723e50ec75896762308df6038f1a67517d691f176bd3439157777c427da70f95417b1de58cc9a8f64b43c57f
-
Filesize
184KB
MD51ce2b2b1c6965ddd2873c88a2d3a4067
SHA1e00495f4e1ae09d094decb3f8ff4e776f1b3ada4
SHA256e86a5dafb82248ab66b38eb56a619d9710c639a1039f9b36f153362005b73aa8
SHA5128734be09ac800018c69ab469bd7d2b23c090aff19e0d07537f798fc1c018d1ccbec9f13c58b5edd6c7682392d113894cbedabd1c34322fac8ac7aa9f2b1d302a
-
Filesize
184KB
MD58fbed2aef5d9d471d4df5c4c012025aa
SHA13e74b43999f9db12e80fabef6268935614de0971
SHA256c0cc275f54b2ca6a9766a520a7cef391a56dd1e668b4cc86e26f91925fa41d88
SHA51249ef39fc75e9c50cc249e230ea2246b4d13b6f33e227967a9de9835f8f97fbc3fb41ad2f62abb42f2fda60627be7b0c3c7a6610eb5ad1fb90250c7eae2885c73
-
Filesize
45KB
MD512a3baac19054804ec98ae09cfc45fcb
SHA1e754aa40f9922f699635d31f35268f150a1eb4bf
SHA256f47dd41794539fe5075a62cb6897461ceb2e958ce0873398b54e93b00fb31df6
SHA512eecffca80568e2c2da83f54484456ad97854e4b0cda54b61430b1dae0997fa5663ee48d00d112080dead1ed1583447e589b6367294df616e8917b1f3d5b55718
-
Filesize
72KB
MD55ea7e498cf00d7f7f5f9247953f43021
SHA14dfda61686e535932af4b1253d1fea7a1903b04f
SHA256c438db997e16c23c8809d6b345ffe1d37cd0b47c280ad7a070849b1afdd83681
SHA5128078c21e48fb7f19365c7e86305995bbd6717280ea12553b4557f7d0fec0f3b92df8087f8c8844a67f7816ea82d80147192124709541625e736b189b38028446