Analysis

  • max time kernel
    135s
  • max time network
    33s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    07/01/2024, 09:12

General

  • Target

    48950b2a1f48b785d8b17d7089a3d0dc.exe

  • Size

    184KB

  • MD5

    48950b2a1f48b785d8b17d7089a3d0dc

  • SHA1

    5bcfa4c419037ac46e95a65ce435af378f94ddae

  • SHA256

    1894ef49491d1c08ee7b30ef2d7214a0713f8f7d889727b846b6555fa546db89

  • SHA512

    d515ae2eedbb0029cd1c242abf4e5d5386621179db2d2d7c80abec782b43cdc84d0358c8fd6660bada177eac736222c65e4c98b882a5ffe98062678da6576c73

  • SSDEEP

    3072:+P65oVUme9ACdeP0HaLTJWcZCLJlMeDdlQEaxKELQnClP6pFT:+PsoCqCdjHyJWcCfH/ClP6pF

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 59 IoCs
  • Loads dropped DLL 64 IoCs
  • Program crash 6 IoCs
  • Suspicious use of SetWindowsHookEx 56 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\48950b2a1f48b785d8b17d7089a3d0dc.exe
    "C:\Users\Admin\AppData\Local\Temp\48950b2a1f48b785d8b17d7089a3d0dc.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2620
    • C:\Users\Admin\AppData\Local\Temp\Unicorn-2832.exe
      C:\Users\Admin\AppData\Local\Temp\Unicorn-2832.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2760
      • C:\Users\Admin\AppData\Local\Temp\Unicorn-12915.exe
        C:\Users\Admin\AppData\Local\Temp\Unicorn-12915.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2492
        • C:\Users\Admin\AppData\Local\Temp\Unicorn-11841.exe
          C:\Users\Admin\AppData\Local\Temp\Unicorn-11841.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2580
          • C:\Users\Admin\AppData\Local\Temp\Unicorn-64540.exe
            C:\Users\Admin\AppData\Local\Temp\Unicorn-64540.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2272
            • C:\Users\Admin\AppData\Local\Temp\Unicorn-32802.exe
              C:\Users\Admin\AppData\Local\Temp\Unicorn-32802.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:980
              • C:\Users\Admin\AppData\Local\Temp\Unicorn-12594.exe
                C:\Users\Admin\AppData\Local\Temp\Unicorn-12594.exe
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetWindowsHookEx
                PID:892
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-10015.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-10015.exe
                  8⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of SetWindowsHookEx
                  PID:868
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-8404.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-8404.exe
                    9⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of SetWindowsHookEx
                    PID:2756
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-62582.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-62582.exe
                      10⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Suspicious use of SetWindowsHookEx
                      PID:2772
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-54388.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-54388.exe
                        11⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:1880
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-48571.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-48571.exe
                          12⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:1224
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-56215.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-56215.exe
                            13⤵
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            PID:3016
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-47829.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-47829.exe
                              14⤵
                                PID:2804
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-32047.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-32047.exe
                              13⤵
                                PID:2892
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-45042.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-45042.exe
                            11⤵
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            PID:1500
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-18115.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-18115.exe
                              12⤵
                              • Executes dropped EXE
                              • Suspicious use of SetWindowsHookEx
                              PID:2456
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-60465.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-60465.exe
                                13⤵
                                  PID:1900
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-219.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-219.exe
                                    14⤵
                                      PID:2900
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-40599.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-40599.exe
                                  12⤵
                                  • Executes dropped EXE
                                  PID:456
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-58266.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-58266.exe
                      6⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Suspicious use of SetWindowsHookEx
                      PID:2908
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-38988.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-38988.exe
                        7⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Suspicious use of SetWindowsHookEx
                        PID:2796
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-42162.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-42162.exe
                          8⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Suspicious use of SetWindowsHookEx
                          PID:364
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-17632.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-17632.exe
                            9⤵
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            PID:268
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-11622.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-11622.exe
                              10⤵
                              • Executes dropped EXE
                              • Suspicious use of SetWindowsHookEx
                              PID:2156
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-52131.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-52131.exe
                                11⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                PID:2632
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-55997.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-55997.exe
                                  12⤵
                                    PID:2660
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-59446.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-59446.exe
                                      13⤵
                                        PID:1128
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-36131.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-36131.exe
                                    11⤵
                                    • Executes dropped EXE
                                    PID:3028
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-61378.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-61378.exe
                                9⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                PID:1916
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-9946.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-9946.exe
                                  10⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetWindowsHookEx
                                  PID:1684
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-52105.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-52105.exe
                                    11⤵
                                      PID:2180
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-10273.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-10273.exe
                                        12⤵
                                          PID:1404
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-32239.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-32239.exe
                                      10⤵
                                        PID:2992
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-63303.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-63303.exe
                                    8⤵
                                    • Executes dropped EXE
                                    • Suspicious use of SetWindowsHookEx
                                    PID:656
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-16257.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-16257.exe
                                      9⤵
                                      • Executes dropped EXE
                                      • Suspicious use of SetWindowsHookEx
                                      PID:1544
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-14030.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-14030.exe
                                        10⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetWindowsHookEx
                                        PID:1340
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-3096.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-3096.exe
                                          11⤵
                                          • Executes dropped EXE
                                          PID:540
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-48768.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-48768.exe
                                        10⤵
                                          PID:1048
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-43413.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-43413.exe
                                            11⤵
                                              PID:1880
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-12936.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-12936.exe
                                  5⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Suspicious use of SetWindowsHookEx
                                  • Suspicious use of WriteProcessMemory
                                  PID:692
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-24847.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-24847.exe
                                    6⤵
                                    • Executes dropped EXE
                                    PID:2468
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-144.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-144.exe
                              3⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • Suspicious use of SetWindowsHookEx
                              • Suspicious use of WriteProcessMemory
                              PID:2880
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-15339.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-15339.exe
                                4⤵
                                • Executes dropped EXE
                                • Loads dropped DLL
                                • Suspicious use of SetWindowsHookEx
                                • Suspicious use of WriteProcessMemory
                                PID:2100
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-7228.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-7228.exe
                                  5⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Suspicious use of SetWindowsHookEx
                                  • Suspicious use of WriteProcessMemory
                                  PID:1496
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-20763.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-20763.exe
                                    6⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • Suspicious use of SetWindowsHookEx
                                    PID:1432
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-1847.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-1847.exe
                                      7⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Suspicious use of SetWindowsHookEx
                                      PID:2800
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-252.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-252.exe
                                        8⤵
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        • Suspicious use of SetWindowsHookEx
                                        PID:1860
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-58472.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-58472.exe
                                          9⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetWindowsHookEx
                                          PID:584
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-15707.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-15707.exe
                                            10⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetWindowsHookEx
                                            PID:2916
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-22391.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-22391.exe
                                              11⤵
                                              • Executes dropped EXE
                                              • Suspicious use of SetWindowsHookEx
                                              PID:2812
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-31493.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-31493.exe
                                                12⤵
                                                  PID:3008
                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-2876.exe
                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-2876.exe
                                                    13⤵
                                                      PID:2752
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 2752 -s 240
                                                        14⤵
                                                        • Program crash
                                                        PID:2444
                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 3008 -s 236
                                                      13⤵
                                                      • Program crash
                                                      PID:2516
                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 2812 -s 236
                                                    12⤵
                                                    • Program crash
                                                    PID:2264
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 2916 -s 236
                                                  11⤵
                                                  • Program crash
                                                  PID:2792
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -u -p 584 -s 236
                                                10⤵
                                                • Program crash
                                                PID:904
                                            • C:\Windows\SysWOW64\WerFault.exe
                                              C:\Windows\SysWOW64\WerFault.exe -u -p 1860 -s 236
                                              9⤵
                                              • Program crash
                                              PID:1060
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-42690.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-42690.exe
                                            8⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetWindowsHookEx
                                            PID:2532
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-7813.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-7813.exe
                                              9⤵
                                              • Executes dropped EXE
                                              • Suspicious use of SetWindowsHookEx
                                              PID:1228
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-60491.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-60491.exe
                                                10⤵
                                                • Executes dropped EXE
                                                • Suspicious use of SetWindowsHookEx
                                                PID:2748
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-39661.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-39661.exe
                                                  11⤵
                                                    PID:1532
                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-30090.exe
                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-30090.exe
                                                      12⤵
                                                        PID:2836
                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-27963.exe
                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-27963.exe
                                                    10⤵
                                                      PID:2384
                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-30090.exe
                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-30090.exe
                                                        11⤵
                                                          PID:1912
                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-45409.exe
                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-45409.exe
                                                            12⤵
                                                              PID:2880
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-4981.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-4981.exe
                                                5⤵
                                                • Executes dropped EXE
                                                • Loads dropped DLL
                                                • Suspicious use of SetWindowsHookEx
                                                PID:1744
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-30628.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-30628.exe
                                                  6⤵
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:2720
                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-33994.exe
                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-33994.exe
                                                    7⤵
                                                    • Executes dropped EXE
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:1560
                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-58664.exe
                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-58664.exe
                                                      8⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:2528
                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-48654.exe
                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-48654.exe
                                                        9⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:368
                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-2930.exe
                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-2930.exe
                                                          10⤵
                                                          • Executes dropped EXE
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:1380
                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-24669.exe
                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-24669.exe
                                                            11⤵
                                                              PID:2960
                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-47360.exe
                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-47360.exe
                                                                12⤵
                                                                  PID:1936
                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-11885.exe
                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-11885.exe
                                                                    13⤵
                                                                      PID:2720
                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-57557.exe
                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-57557.exe
                                                                    12⤵
                                                                      PID:2184
                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-8887.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-8887.exe
                                                                  10⤵
                                                                    PID:2300
                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-38798.exe
                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-38798.exe
                                                              7⤵
                                                              • Executes dropped EXE
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:1920
                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-3454.exe
                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-3454.exe
                                                                8⤵
                                                                • Executes dropped EXE
                                                                • Suspicious use of SetWindowsHookEx
                                                                PID:1304
                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-11098.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-11098.exe
                                                                  9⤵
                                                                  • Executes dropped EXE
                                                                  • Suspicious use of SetWindowsHookEx
                                                                  PID:2656
                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-4056.exe
                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-4056.exe
                                                                    10⤵
                                                                      PID:2704
                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-49728.exe
                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-49728.exe
                                                                    9⤵
                                                                      PID:2340
                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-56984.exe
                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-56984.exe
                                                            4⤵
                                                            • Executes dropped EXE
                                                            • Loads dropped DLL
                                                            • Suspicious use of SetWindowsHookEx
                                                            • Suspicious use of WriteProcessMemory
                                                            PID:816
                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-24847.exe
                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-24847.exe
                                                              5⤵
                                                              • Executes dropped EXE
                                                              • Loads dropped DLL
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:1656
                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-59216.exe
                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-59216.exe
                                                                6⤵
                                                                • Executes dropped EXE
                                                                • Loads dropped DLL
                                                                • Suspicious use of SetWindowsHookEx
                                                                PID:2060
                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-49437.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-49437.exe
                                                                  7⤵
                                                                  • Executes dropped EXE
                                                                  • Suspicious use of SetWindowsHookEx
                                                                  PID:2616
                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-61513.exe
                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-61513.exe
                                                                    8⤵
                                                                    • Executes dropped EXE
                                                                    • Suspicious use of SetWindowsHookEx
                                                                    PID:800
                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-29578.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-29578.exe
                                                                      9⤵
                                                                      • Executes dropped EXE
                                                                      • Suspicious use of SetWindowsHookEx
                                                                      PID:2408
                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-11098.exe
                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-11098.exe
                                                                        10⤵
                                                                        • Executes dropped EXE
                                                                        • Suspicious use of SetWindowsHookEx
                                                                        PID:2072
                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-20393.exe
                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-20393.exe
                                                                          11⤵
                                                                          • Executes dropped EXE
                                                                          • Suspicious use of SetWindowsHookEx
                                                                          PID:2112
                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-16863.exe
                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-16863.exe
                                                                        10⤵
                                                                          PID:1964

                                                      Network

                                                            MITRE ATT&CK Matrix

                                                            Replay Monitor

                                                            Loading Replay Monitor...

                                                            Downloads

                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-12594.exe

                                                              Filesize

                                                              184KB

                                                              MD5

                                                              89738a7cf5193d782ed29637e38758fc

                                                              SHA1

                                                              573959aefb214556cc8527c6773b6ef993239300

                                                              SHA256

                                                              b1c9d7699c249ffb0f98a44e50d8ed5238b522fc84f1ed4b7f8723b3d5c197c0

                                                              SHA512

                                                              69d804d2f8bb3b8bee2780145bf090622c32f40d08a951a6fbbc4bfd285d788995560debb7d3309544cc403db756cd8c3a5b73ac83e22f1e67dc0eef74d37814

                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-12936.exe

                                                              Filesize

                                                              184KB

                                                              MD5

                                                              48596cd5d9c57a8a456f0ce2321d0155

                                                              SHA1

                                                              e86598bc134a9273966d197aff9bafee2eb92d4c

                                                              SHA256

                                                              0a74bf49bbd6408158a2152960677d14294b10128dd7fc5f04655421a8e41d05

                                                              SHA512

                                                              77b52c7b70ded7e5c80c7843b781b6a1dfa01b9ba8a54e329680e468f6e22d611e6a153f6606fd795e6be2bac4437122b9eb72b3a53cc6fe3e28e95049ab6b80

                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-15339.exe

                                                              Filesize

                                                              184KB

                                                              MD5

                                                              737153552d2c260277428f5adab56a12

                                                              SHA1

                                                              0dff2f0c096f6b3445fb3b856b05f285f7a32ce4

                                                              SHA256

                                                              da42aaff8041c3ed31d2e3bf0926b0bbfe2621dfc9cfcc0f0946cfc0b04eb22b

                                                              SHA512

                                                              126502cf1870f2fa43db9b753270975224c5969f58560d95beb6f4da18268ec2054cf8b44a8b135a428fbae3dd5aa22c5f2c1b7891caeac88afa8b32556653ae

                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-32802.exe

                                                              Filesize

                                                              184KB

                                                              MD5

                                                              a66e98ab122625e507a137f94c931b62

                                                              SHA1

                                                              02d13c1d0e1c8be057658377c00a15407284a329

                                                              SHA256

                                                              ff4c895ef6a4d722a61016565682a15f208d173f1770248feef799c885fd7f76

                                                              SHA512

                                                              e9d69f67033d5c54277882745f2a6fea87c59f422d989c29c1b955cc72f90ce9920fad5f0692d441e841cfd1b82491b188ad02ac902ae14fa128733bfdf2d398

                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-40599.exe

                                                              Filesize

                                                              184KB

                                                              MD5

                                                              52548a1354302a7510aeb9f7737cf987

                                                              SHA1

                                                              07600d928850bc2b88e8ef331f717c071e9959ce

                                                              SHA256

                                                              5d8bf6f2397aa73be26b32be0481549d41f7c0817f89c40e20d665ea3e1b1d74

                                                              SHA512

                                                              fb6fa7e839e1e9fdb060a3464d2df0f983ac79bc250a936560b234b3c4b2d5c0d22504e4816fcf3488514cab3b8ca4985c2ad1b05fe1a45944721193fc09e344

                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-56984.exe

                                                              Filesize

                                                              85KB

                                                              MD5

                                                              9b6680e7e0f9bc657936366422b03188

                                                              SHA1

                                                              5a4518175920da7251157b269a33d9ecb2497050

                                                              SHA256

                                                              481f770f6193cde0761e131812dde658d8001d9ec48651ec895320269d6a286e

                                                              SHA512

                                                              566f2e556b6d900280edc4e6640c9cf0430c9dbdd2ed4e8a843dd68bf86bf7c647704d42605f7c298fbd1ec224a1b0092f4bbe4d28fd160347607ce172cc3bb3

                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-64540.exe

                                                              Filesize

                                                              184KB

                                                              MD5

                                                              926d6a3a4af57e08062f2e21900d9eb4

                                                              SHA1

                                                              6c1107e31459a7870f5c6f1b1d42bb40d90517d3

                                                              SHA256

                                                              e3ebbd803f5882eddc7e5befbce51ea540d071171f88dd896c268e65cc4963ca

                                                              SHA512

                                                              68cd89966af5e27257081ebac24e2920087fcb4f8dff62fb2f3012c019ee362e499507f046dc46e1fcc2924fc293a15d8f25018298b7fa68a70708fcea428677

                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-64540.exe

                                                              Filesize

                                                              176KB

                                                              MD5

                                                              6030738285c1777b4438e5f83dc9ed9f

                                                              SHA1

                                                              968d4423f3060f32a2a058c85abc02a96f240c84

                                                              SHA256

                                                              12c75e84aa17e63498c5351917261e5f868d5f4c98bd68676e601ff6c1f0b4aa

                                                              SHA512

                                                              4b46d76f04fcd9e79e19c07bf9b09f70277276f81056af7e839dbfada5b9775f33af74e386535c8aa2a08a7144f030a360a440b0f3ae311b00649df5e5696c8d

                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-7228.exe

                                                              Filesize

                                                              184KB

                                                              MD5

                                                              9a7687a32c4adf06dc708f5b803ee405

                                                              SHA1

                                                              c9fd49b85f6f0b5cc27b4f99c720d0530c272f07

                                                              SHA256

                                                              c950230d736287e5cfbca96f25bee06f5afd986d9dbc5855bc4f61abc7d1633a

                                                              SHA512

                                                              4024f97d3f04b858d20134a4aefcc80887d2bfb220002361ab9fe99a31f20b78df92eb4fa96c6bd4321ca38750541342c41b998ddf9cf33f7e073180c4282883

                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-7228.exe

                                                              Filesize

                                                              1KB

                                                              MD5

                                                              29cc626fea83cdd053cab5ebdd726cb1

                                                              SHA1

                                                              33d07aa67bcacbada63e8f08457c04c829db9d73

                                                              SHA256

                                                              091396a9b0ddb5848274072a76db3ea17725521d4f8b581218bf421ea064a2b0

                                                              SHA512

                                                              7bfb5dc07e28caf38871eefcc7c49a4984889756540adbcd3230d066dcae42a8bed678bfa2202f97a32fcc0453bebcf4f11b09bfe4eaad7d454a545d0d4ceb67

                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-10015.exe

                                                              Filesize

                                                              184KB

                                                              MD5

                                                              09641fb2683a3bb592fc3e4e302deaf1

                                                              SHA1

                                                              f3d935d1d7fa62637a9adf91e9897e6a35391c55

                                                              SHA256

                                                              5fe705d9930fb4f7b241777a6d7d4deba9f6d89b058ac88dc94eb0b86815c4f7

                                                              SHA512

                                                              408ce7c17fa3ab59da739dacf642a391ab42c7612b2e5413f6a980b8f469523e09200a9938005f962e6ef9cc682bd1c05a72c942eac1c7814ebeeb43706e23ab

                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-11841.exe

                                                              Filesize

                                                              184KB

                                                              MD5

                                                              f6b0f0257024025e96574d4812a430ed

                                                              SHA1

                                                              73537dcf977e88b56bd3be89041219d41a6b357f

                                                              SHA256

                                                              49a1ae23e49743d21a980903379d10cda4fdcf7bb177c714b54940647e4f2dfe

                                                              SHA512

                                                              80236aa96594310f8477647286a917d2e3dac5330ec7e1992c87ad0db95337eecf39d1dec0fc8445bc320e7a34c67b5dc4e7c0b44a371ef5a2b5f26260e88921

                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-12915.exe

                                                              Filesize

                                                              184KB

                                                              MD5

                                                              cafdef48db2dbd6dee07716a2eb9f351

                                                              SHA1

                                                              5d70310e3da45948a59c5d65d43713ef06079f73

                                                              SHA256

                                                              ad0f96e4e3ca90a924eeb665d23157b5c242b998e04f4dcb68b788fc1af21b56

                                                              SHA512

                                                              4893414afcea45767bbdee3f9fa0b676842173abf497d56ef52ed3eaedcd229133a5008996491d5efbd6d91ad646b0541b173071a887f3f0e5b5188d32c2a2ed

                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-144.exe

                                                              Filesize

                                                              184KB

                                                              MD5

                                                              b9d439c4513674d69adc3b5ba22c3fcd

                                                              SHA1

                                                              defe07ad991db0ef37347448275fcc4dbb13d485

                                                              SHA256

                                                              a15a4773893de16d507819e900fa144f61b2275caee5cbeb14f11eebc28835a8

                                                              SHA512

                                                              9f1cd31f36c111cd91324860642a8be797b59060e1132945aae3bdc8eb6b944e409b4d6f3343fd534f253c1f0fdddb4bdd6927eca8f07a76bc715ee12c7f310a

                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-20763.exe

                                                              Filesize

                                                              184KB

                                                              MD5

                                                              bd9706afdfb2595665fbdd57d7afcc2b

                                                              SHA1

                                                              412eea6fad457e2b258f0f98a7e4549d1a1f5e57

                                                              SHA256

                                                              fd3714ba3af8d9a56a20d3f9884ebfd20e91ac95acc712028f8ac8d46916db9c

                                                              SHA512

                                                              2085a2b056c7a3e1d09516055a03a9c09b184cb5f9257f4ed59cc7a1e73b28e456691234acf0251ef91b6dd02396390ebe1dfc05ef60f28d92678e554df3dcb6

                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-24847.exe

                                                              Filesize

                                                              184KB

                                                              MD5

                                                              213c7034fb2218a5e1651f3a961492f5

                                                              SHA1

                                                              d531e6cda9fe0d037e9a69234fe186511fe30574

                                                              SHA256

                                                              c983b999f066c9120945f78f34f7f22d1beecba637962a2d95f3050744b235cd

                                                              SHA512

                                                              4b253eee0618c2dc5041dbc5a0576091886865c602e3a92207843279f4a358c0ea4c0bbc730858685a3abc4b20a0832acc578ca2d821e68698806b2dc7e8f745

                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-2832.exe

                                                              Filesize

                                                              184KB

                                                              MD5

                                                              380140e013efcaa37e8a8793e00fc8f1

                                                              SHA1

                                                              6ae560d5113ae064ad3cb3a3e57983085187fbcd

                                                              SHA256

                                                              79af18ef83812ffeea9b0491c3313071cfdc743cf55ce8827d05a803554e72ed

                                                              SHA512

                                                              f63e32f64e48b8b4c86219c0df0cf5012c1b696e04754c0692040365157261ca136420622e427087c199224268a62589fff89bdecbfb99e29320ede80b67cb59

                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-32802.exe

                                                              Filesize

                                                              1KB

                                                              MD5

                                                              8a4b7ace5e10cccd30ead78759b569f6

                                                              SHA1

                                                              a2ff783990ce3fd2ce1eb463a948f81fd4bb9c61

                                                              SHA256

                                                              1291eaea8880ea1f1fc1894b931ddf8bd96f07651e795aabcd23fc636d0bccb3

                                                              SHA512

                                                              5d06cab898dec58cb8a6f46a9c07f1055f7fb5a2ca69abb24ee07ef1f390266ffc9a781c029e6d6dd046c6e87a85a863caad38c02700318890278179bce006ed

                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-4981.exe

                                                              Filesize

                                                              184KB

                                                              MD5

                                                              985399a319152abd3a823a47a7de66f3

                                                              SHA1

                                                              ebc5cf239b2c3e4f013e353e8f1a4369f58f47d9

                                                              SHA256

                                                              83f735cde79c52aac356609d67be8f49f33daaeee3802ea0fa973bd0556b80d5

                                                              SHA512

                                                              b8e140454a1aa1a493eda4eb87bffa5d69effe0b723e50ec75896762308df6038f1a67517d691f176bd3439157777c427da70f95417b1de58cc9a8f64b43c57f

                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-56984.exe

                                                              Filesize

                                                              184KB

                                                              MD5

                                                              1ce2b2b1c6965ddd2873c88a2d3a4067

                                                              SHA1

                                                              e00495f4e1ae09d094decb3f8ff4e776f1b3ada4

                                                              SHA256

                                                              e86a5dafb82248ab66b38eb56a619d9710c639a1039f9b36f153362005b73aa8

                                                              SHA512

                                                              8734be09ac800018c69ab469bd7d2b23c090aff19e0d07537f798fc1c018d1ccbec9f13c58b5edd6c7682392d113894cbedabd1c34322fac8ac7aa9f2b1d302a

                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-58266.exe

                                                              Filesize

                                                              184KB

                                                              MD5

                                                              8fbed2aef5d9d471d4df5c4c012025aa

                                                              SHA1

                                                              3e74b43999f9db12e80fabef6268935614de0971

                                                              SHA256

                                                              c0cc275f54b2ca6a9766a520a7cef391a56dd1e668b4cc86e26f91925fa41d88

                                                              SHA512

                                                              49ef39fc75e9c50cc249e230ea2246b4d13b6f33e227967a9de9835f8f97fbc3fb41ad2f62abb42f2fda60627be7b0c3c7a6610eb5ad1fb90250c7eae2885c73

                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-7228.exe

                                                              Filesize

                                                              45KB

                                                              MD5

                                                              12a3baac19054804ec98ae09cfc45fcb

                                                              SHA1

                                                              e754aa40f9922f699635d31f35268f150a1eb4bf

                                                              SHA256

                                                              f47dd41794539fe5075a62cb6897461ceb2e958ce0873398b54e93b00fb31df6

                                                              SHA512

                                                              eecffca80568e2c2da83f54484456ad97854e4b0cda54b61430b1dae0997fa5663ee48d00d112080dead1ed1583447e589b6367294df616e8917b1f3d5b55718

                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-7228.exe

                                                              Filesize

                                                              72KB

                                                              MD5

                                                              5ea7e498cf00d7f7f5f9247953f43021

                                                              SHA1

                                                              4dfda61686e535932af4b1253d1fea7a1903b04f

                                                              SHA256

                                                              c438db997e16c23c8809d6b345ffe1d37cd0b47c280ad7a070849b1afdd83681

                                                              SHA512

                                                              8078c21e48fb7f19365c7e86305995bbd6717280ea12553b4557f7d0fec0f3b92df8087f8c8844a67f7816ea82d80147192124709541625e736b189b38028446