Analysis

  • max time kernel
    32s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    11/01/2024, 14:00

General

  • Target

    53b4d65df8e6e1aeb26ca5daf2b8700e.exe

  • Size

    184KB

  • MD5

    53b4d65df8e6e1aeb26ca5daf2b8700e

  • SHA1

    75a5b9582edfe38927587fdf3b3666a081caac1b

  • SHA256

    e8aab3758e331e481357a67cd8a1a60d56b480b8078238e7e0dcdd1b48469466

  • SHA512

    eb90dfa83bb84e0ef0616333a947dbc40ba8f58e72fffd4ab742ec6c5a76a8bfa6efe4c4a98ef717b4c5ae01fe96eaf21d5bc674862b90d11f99ec050d7d80ee

  • SSDEEP

    3072:pDJ7oC69fUAQrgAZfTX4F8NjWlX6vHfVsseIgP/d6lPvpFH:pDNojlQrffL4F899VQ6lPvpF

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 64 IoCs
  • Loads dropped DLL 64 IoCs
  • Program crash 2 IoCs
  • Suspicious use of SetWindowsHookEx 59 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\53b4d65df8e6e1aeb26ca5daf2b8700e.exe
    "C:\Users\Admin\AppData\Local\Temp\53b4d65df8e6e1aeb26ca5daf2b8700e.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2980
    • C:\Users\Admin\AppData\Local\Temp\Unicorn-22242.exe
      C:\Users\Admin\AppData\Local\Temp\Unicorn-22242.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3052
      • C:\Users\Admin\AppData\Local\Temp\Unicorn-33267.exe
        C:\Users\Admin\AppData\Local\Temp\Unicorn-33267.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2500
        • C:\Users\Admin\AppData\Local\Temp\Unicorn-61336.exe
          C:\Users\Admin\AppData\Local\Temp\Unicorn-61336.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2872
          • C:\Users\Admin\AppData\Local\Temp\Unicorn-32577.exe
            C:\Users\Admin\AppData\Local\Temp\Unicorn-32577.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            PID:2508
            • C:\Users\Admin\AppData\Local\Temp\Unicorn-53355.exe
              C:\Users\Admin\AppData\Local\Temp\Unicorn-53355.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              PID:2820
              • C:\Users\Admin\AppData\Local\Temp\Unicorn-40932.exe
                C:\Users\Admin\AppData\Local\Temp\Unicorn-40932.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:2332
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-34082.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-34082.exe
                  8⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:2732
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-3459.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-3459.exe
                    9⤵
                      PID:1704
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-6914.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-6914.exe
                        10⤵
                          PID:1160
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-49131.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-49131.exe
                      8⤵
                      • Executes dropped EXE
                      PID:1880
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-50654.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-50654.exe
                        9⤵
                          PID:2144
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-26852.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-26852.exe
                      7⤵
                      • Executes dropped EXE
                      • Suspicious use of SetWindowsHookEx
                      PID:2828
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-27772.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-27772.exe
                        8⤵
                        • Executes dropped EXE
                        PID:2176
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-21066.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-21066.exe
                    6⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:2396
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-34274.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-34274.exe
                      7⤵
                      • Executes dropped EXE
                      • Suspicious use of SetWindowsHookEx
                      PID:1260
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-52468.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-52468.exe
                        8⤵
                          PID:2972
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-4590.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-4590.exe
                        7⤵
                          PID:2168
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-29405.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-29405.exe
                      5⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Suspicious use of SetWindowsHookEx
                      PID:2452
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-45016.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-45016.exe
                        6⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:1696
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-37974.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-37974.exe
                          7⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:2656
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-24456.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-24456.exe
                            8⤵
                              PID:2528
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-14085.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-14085.exe
                                9⤵
                                  PID:1600
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-18108.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-18108.exe
                            6⤵
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            PID:2848
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-23688.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-23688.exe
                              7⤵
                              • Executes dropped EXE
                              • Suspicious use of SetWindowsHookEx
                              PID:2144
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-30232.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-30232.exe
                                8⤵
                                  PID:2560
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-64060.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-64060.exe
                                    9⤵
                                      PID:1080
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-42368.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-42368.exe
                            4⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Suspicious use of SetWindowsHookEx
                            PID:1944
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-5306.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-5306.exe
                              5⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • Suspicious use of SetWindowsHookEx
                              PID:2356
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-42001.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-42001.exe
                                6⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                PID:832
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-9577.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-9577.exe
                                  7⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetWindowsHookEx
                                  PID:2056
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-9058.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-9058.exe
                                    8⤵
                                    • Executes dropped EXE
                                    PID:1900
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-62898.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-62898.exe
                                  7⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetWindowsHookEx
                                  PID:932
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-62089.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-62089.exe
                                    8⤵
                                      PID:2616
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-22768.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-22768.exe
                                  6⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetWindowsHookEx
                                  PID:2892
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-16651.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-16651.exe
                                    7⤵
                                    • Executes dropped EXE
                                    • Suspicious use of SetWindowsHookEx
                                    PID:2476
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-62089.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-62089.exe
                                      8⤵
                                        PID:2864
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-42223.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-42223.exe
                                      7⤵
                                        PID:2060
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-12898.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-12898.exe
                                    5⤵
                                    • Executes dropped EXE
                                    • Suspicious use of SetWindowsHookEx
                                    PID:684
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-34274.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-34274.exe
                                      6⤵
                                      • Executes dropped EXE
                                      • Suspicious use of SetWindowsHookEx
                                      PID:2172
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-48384.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-48384.exe
                                        7⤵
                                          PID:3008
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-37386.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-37386.exe
                                  3⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Suspicious use of SetWindowsHookEx
                                  • Suspicious use of WriteProcessMemory
                                  PID:2868
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-1357.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-1357.exe
                                    4⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • Suspicious use of SetWindowsHookEx
                                    • Suspicious use of WriteProcessMemory
                                    PID:2580
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-61523.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-61523.exe
                                      5⤵
                                      • Executes dropped EXE
                                      • Suspicious use of SetWindowsHookEx
                                      PID:524
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-24456.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-24456.exe
                                        6⤵
                                          PID:1760
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-37573.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-37573.exe
                                      4⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Suspicious use of SetWindowsHookEx
                                      PID:800
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-7335.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-7335.exe
                                        5⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetWindowsHookEx
                                        PID:440
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-43729.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-43729.exe
                                          6⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetWindowsHookEx
                                          PID:2288
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-36687.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-36687.exe
                                            7⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetWindowsHookEx
                                            PID:552
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-24456.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-24456.exe
                                              8⤵
                                                PID:2444
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-4590.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-4590.exe
                                              7⤵
                                                PID:1944
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-16821.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-16821.exe
                                              6⤵
                                              • Executes dropped EXE
                                              • Suspicious use of SetWindowsHookEx
                                              PID:304
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-24456.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-24456.exe
                                                7⤵
                                                  PID:2544
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-23863.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-23863.exe
                                              5⤵
                                              • Executes dropped EXE
                                              • Suspicious use of SetWindowsHookEx
                                              PID:2232
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-12182.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-12182.exe
                                                6⤵
                                                • Executes dropped EXE
                                                • Suspicious use of SetWindowsHookEx
                                                PID:2244
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-24456.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-24456.exe
                                                  7⤵
                                                    PID:2100
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-4590.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-4590.exe
                                                  6⤵
                                                    PID:1980
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-9317.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-9317.exe
                                            2⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            • Suspicious use of SetWindowsHookEx
                                            • Suspicious use of WriteProcessMemory
                                            PID:2072
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-40916.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-40916.exe
                                              3⤵
                                              • Executes dropped EXE
                                              • Loads dropped DLL
                                              • Suspicious use of SetWindowsHookEx
                                              • Suspicious use of WriteProcessMemory
                                              PID:2840
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-28493.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-28493.exe
                                                4⤵
                                                • Executes dropped EXE
                                                • Loads dropped DLL
                                                • Suspicious use of SetWindowsHookEx
                                                • Suspicious use of WriteProcessMemory
                                                PID:1472
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-49079.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-49079.exe
                                                  5⤵
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:1484
                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-61928.exe
                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-61928.exe
                                                    6⤵
                                                    • Executes dropped EXE
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:1928
                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-54886.exe
                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-54886.exe
                                                      7⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:3024
                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-34980.exe
                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-34980.exe
                                                        8⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:2436
                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-30434.exe
                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-30434.exe
                                                          9⤵
                                                            PID:2180
                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-61191.exe
                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-61191.exe
                                                        7⤵
                                                        • Executes dropped EXE
                                                        PID:2080
                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-59525.exe
                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-59525.exe
                                                      6⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:2752
                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-44108.exe
                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-44108.exe
                                                        7⤵
                                                        • Executes dropped EXE
                                                        PID:2132
                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-57286.exe
                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-57286.exe
                                                          8⤵
                                                            PID:932
                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-42062.exe
                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-42062.exe
                                                      5⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:2000
                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-53734.exe
                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-53734.exe
                                                        6⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:2188
                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-53983.exe
                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-53983.exe
                                                          7⤵
                                                          • Executes dropped EXE
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:2912
                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-40984.exe
                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-40984.exe
                                                            8⤵
                                                              PID:2884
                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-25052.exe
                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-25052.exe
                                                                9⤵
                                                                  PID:868
                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-21118.exe
                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-21118.exe
                                                              7⤵
                                                                PID:2856
                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-34117.exe
                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-34117.exe
                                                              6⤵
                                                              • Executes dropped EXE
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:2920
                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 2920 -s 240
                                                                7⤵
                                                                • Program crash
                                                                PID:2712
                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-45934.exe
                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-45934.exe
                                                          4⤵
                                                          • Executes dropped EXE
                                                          • Loads dropped DLL
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:1680
                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-49676.exe
                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-49676.exe
                                                            5⤵
                                                            • Executes dropped EXE
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:944
                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-50226.exe
                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-50226.exe
                                                              6⤵
                                                              • Executes dropped EXE
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:1732
                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-7351.exe
                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-7351.exe
                                                                7⤵
                                                                • Executes dropped EXE
                                                                PID:2676
                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-61191.exe
                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-61191.exe
                                                              6⤵
                                                              • Executes dropped EXE
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:1556
                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-56526.exe
                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-56526.exe
                                                                7⤵
                                                                  PID:2512
                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-26276.exe
                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-26276.exe
                                                              5⤵
                                                              • Executes dropped EXE
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:1072
                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-30896.exe
                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-30896.exe
                                                                6⤵
                                                                • Executes dropped EXE
                                                                • Suspicious use of SetWindowsHookEx
                                                                PID:1224
                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-47481.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-47481.exe
                                                                  7⤵
                                                                    PID:3068
                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-27615.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-27615.exe
                                                                  6⤵
                                                                    PID:3052
                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-21948.exe
                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-21948.exe
                                                              3⤵
                                                              • Executes dropped EXE
                                                              • Loads dropped DLL
                                                              • Suspicious use of SetWindowsHookEx
                                                              • Suspicious use of WriteProcessMemory
                                                              PID:2212
                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-262.exe
                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-262.exe
                                                                4⤵
                                                                • Executes dropped EXE
                                                                • Suspicious use of SetWindowsHookEx
                                                                PID:1564
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 1564 -s 240
                                                                  5⤵
                                                                  • Loads dropped DLL
                                                                  • Program crash
                                                                  PID:1784
                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-62675.exe
                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-62675.exe
                                                                4⤵
                                                                • Executes dropped EXE
                                                                • Suspicious use of SetWindowsHookEx
                                                                PID:1548
                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-49458.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-49458.exe
                                                                  5⤵
                                                                  • Executes dropped EXE
                                                                  • Suspicious use of SetWindowsHookEx
                                                                  PID:2660
                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-48555.exe
                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-48555.exe
                                                                    6⤵
                                                                    • Executes dropped EXE
                                                                    • Suspicious use of SetWindowsHookEx
                                                                    PID:2620
                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-40984.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-40984.exe
                                                                      7⤵
                                                                        PID:2588
                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-21118.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-21118.exe
                                                                      6⤵
                                                                        PID:2904
                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-28689.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-28689.exe
                                                                      5⤵
                                                                      • Executes dropped EXE
                                                                      • Suspicious use of SetWindowsHookEx
                                                                      PID:2300
                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-40984.exe
                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-40984.exe
                                                                        6⤵
                                                                          PID:2844
                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-64408.exe
                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-64408.exe
                                                                            7⤵
                                                                              PID:2804

                                                                Network

                                                                      MITRE ATT&CK Matrix

                                                                      Replay Monitor

                                                                      Loading Replay Monitor...

                                                                      Downloads

                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-40916.exe

                                                                        Filesize

                                                                        184KB

                                                                        MD5

                                                                        e7527d351359939b4a212f4055b4cffc

                                                                        SHA1

                                                                        95759e261b3c550dbf4270589f931e8982b0324d

                                                                        SHA256

                                                                        7e26e86fe1d527910071f744a8625ba679b01ef9894b3f50027f47756f8eb18b

                                                                        SHA512

                                                                        eb6b536fef8372cf08d432baf8e8b09d78b7c83f4ab1ddf1ca7ac09190b3898e34aa294a48615e248e27fb531e02afa91315d790f0f9f3da5f336b1976963b28

                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-45934.exe

                                                                        Filesize

                                                                        184KB

                                                                        MD5

                                                                        e885151a2ad2bf2772c46233154172aa

                                                                        SHA1

                                                                        3e0ff5e018f834a6a642ff09fc2e6715e07e4eb3

                                                                        SHA256

                                                                        adb5cadad210ec640bac37f2db4faf1acc1ca7144a26b40e6d2ad1a9415ad998

                                                                        SHA512

                                                                        80492cfacb80da1b44d22d8a2ce945023baaf150c3e734e5619b51ea1fbcd8f61e8699923117bfa484e93f6c0f933822b2d324e22aec8780e7b9b7b8886cc38c

                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-49079.exe

                                                                        Filesize

                                                                        184KB

                                                                        MD5

                                                                        64593b93aab276e137bfa20aacd90ed5

                                                                        SHA1

                                                                        ad0bfa5c96a9331659722b1d89ed1ffde7aba20f

                                                                        SHA256

                                                                        d0415da4d1604ec5e75ede5bc0c3fef4b11768b69458802342ed43d5b06ed7f2

                                                                        SHA512

                                                                        2ad15f7f64fc6143ad04319bad033ef642d810ba36c77f374b704f4bb233c64ea3297332373f6c0c1aeb2493e63c38cb1a5b7ae9c281f4db9639fb804fbbf93b

                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-61336.exe

                                                                        Filesize

                                                                        184KB

                                                                        MD5

                                                                        08db6035f333fc2bd8c54835660bb594

                                                                        SHA1

                                                                        e6b002976232a567565c543086b803201cdd5459

                                                                        SHA256

                                                                        f8975559d85ebcaac5da62a46856d461248c07f615f830d2f54957708f41b281

                                                                        SHA512

                                                                        6541ddc64b1d9d31c5574c68cfe2243b50c50bd7bc57225c5834b3526e8c773390b7176c63eaa0883e0fd7274ddacc446b9fbd32588bcecc14246a94bd503a13

                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-9317.exe

                                                                        Filesize

                                                                        184KB

                                                                        MD5

                                                                        894005e805977ed44230cad6ba220391

                                                                        SHA1

                                                                        c2ef9a955f32d07ce4ca7d18e42e84fcd0b0d3b8

                                                                        SHA256

                                                                        6a46c7fe4c62b9451963eb3050eebf52836d17c7d94b8110cec96ccacc17d447

                                                                        SHA512

                                                                        64e7d20bb310bd3537819f0e89b99fc3adb607cf1e89c6523cdfcf93313bd34c14e65c35d6dbaad93e85636cb354442ddb64ad1d1048f04b675db405e82ac1bf

                                                                      • \Users\Admin\AppData\Local\Temp\Unicorn-1357.exe

                                                                        Filesize

                                                                        184KB

                                                                        MD5

                                                                        27539fc24e7d50eebf3034b0f5e90304

                                                                        SHA1

                                                                        7c943abb5e1facabb539de42d4fe2ded165adc62

                                                                        SHA256

                                                                        4fba51dafbe961ec8deace8e03fc2cb7acb060d8b1b24311989f2249b9d242af

                                                                        SHA512

                                                                        0633513794cf6fb5d8312830be87dad76a5c061a73f9060c1537d23361feb40b67b92721ff3d2aa6de696e6a6adfcf3c4da87d326294fe9c3ad37d0a8b80449d

                                                                      • \Users\Admin\AppData\Local\Temp\Unicorn-21948.exe

                                                                        Filesize

                                                                        184KB

                                                                        MD5

                                                                        7b68a9c345c4182f05eaa40c7d136028

                                                                        SHA1

                                                                        944144a620ed149846717c286814d8587180c744

                                                                        SHA256

                                                                        f344b6693455aa1d31d9752d30c0eec2355cc97baa076a2e4bc2839548da3bb6

                                                                        SHA512

                                                                        6a2fa3698608920a59063e30d53fbd7500c25ee88a46abc19e416676f47964307e1d4ad9323d113587f43bbb7c29a5a86463e9c46c7a50475f51764c9be8598d

                                                                      • \Users\Admin\AppData\Local\Temp\Unicorn-22242.exe

                                                                        Filesize

                                                                        184KB

                                                                        MD5

                                                                        25cdea6a48452a18d9bd360b00896c81

                                                                        SHA1

                                                                        b2dd3ac74a01f921a3884eab8bf19fa22e166de9

                                                                        SHA256

                                                                        9d23b360841148f85db7b59eb306d0398647d9b8d8239294e95fcacb031d4fa2

                                                                        SHA512

                                                                        8d28e9c86aa2033b44c11c0af105e66e08686e96e87619e7ecf25864ca021419472ead2468fbd8e0fe4ceb1b87abe111613b65d57ed9d1048a6644fbb9f78f63

                                                                      • \Users\Admin\AppData\Local\Temp\Unicorn-262.exe

                                                                        Filesize

                                                                        184KB

                                                                        MD5

                                                                        7ba5c64bbef78fa6447008bc4857fb68

                                                                        SHA1

                                                                        76dc4d72ba86cf002932d9f0570554317fe32c27

                                                                        SHA256

                                                                        e993e17c821adb3f804f337c93c8b490cba47cb45d55bf39e9342bb8270d0d91

                                                                        SHA512

                                                                        039fd787201f7d89a4790106b2cd9b7b5d06a904ead90a26fec8e8ed11c022733f65284720d16c8959b812a6e0fb824204845114476ab2161d7be5113a4ce22a

                                                                      • \Users\Admin\AppData\Local\Temp\Unicorn-28493.exe

                                                                        Filesize

                                                                        184KB

                                                                        MD5

                                                                        05960852d8b1481323f6367722f100f2

                                                                        SHA1

                                                                        d847801485f21b86eeb58a2f220827efc44bbd15

                                                                        SHA256

                                                                        981bda0eaf32689ed0561dc0810f7c3befdf1af5aa81ec2438b288c78af83915

                                                                        SHA512

                                                                        b7d7ac06092179e3c31e4fcc2f0e163edaebff1953c205f1eab2f00095deb24212178b05d21cefc407a98643a6342e08a40c9f9897c02948749401b61d2a7a56

                                                                      • \Users\Admin\AppData\Local\Temp\Unicorn-29405.exe

                                                                        Filesize

                                                                        184KB

                                                                        MD5

                                                                        fd908e9c8570fc9f3d4cd9ecd8234341

                                                                        SHA1

                                                                        b5f7e4cd7272a7ad29b367598b7e9123b02e22bd

                                                                        SHA256

                                                                        3f1fdaafdd5bfbe214b9551ca93dd434963da6aa92df9c888c74354fd46e73ae

                                                                        SHA512

                                                                        26161d49cc8cb7d09edddc66ad429449f85d0f739cb277095e5a02151b52f35ad1eadcbb62c02bfa3280570256ba7ec61727a283b0d775a76cef57c3d24ac2c5

                                                                      • \Users\Admin\AppData\Local\Temp\Unicorn-32577.exe

                                                                        Filesize

                                                                        184KB

                                                                        MD5

                                                                        a87d7a6d4d79b5daa46fbaf638656c2b

                                                                        SHA1

                                                                        c45a2b237ea909c086c99c27a6cfde940a925348

                                                                        SHA256

                                                                        8291a04d92c234aa9fbe5e1216589b755f8bcc8fccfd9fc366c14c63373d8fb0

                                                                        SHA512

                                                                        98ae65ea4a309d5347f9755a155f7acf66352f04b2d6dc5c423b867a241ed638aed1ce96a3838a43783a2f8dfe87a2b10270a84a90a4999b7d710d812e6752e3

                                                                      • \Users\Admin\AppData\Local\Temp\Unicorn-33267.exe

                                                                        Filesize

                                                                        184KB

                                                                        MD5

                                                                        81e360ddf15d111dd9726c942d85bc5a

                                                                        SHA1

                                                                        77d93543c610288e1698b16f05cca59892756b9b

                                                                        SHA256

                                                                        1394c74bdb47201337c1df86bc8bf94ac25aabdf3300df4a999f2e7fa321110c

                                                                        SHA512

                                                                        e902fc3dbe98f18fadb1dbf017e43697bc49b9fa64910e5e50e9e6d8d756c1f46d20c56fed212aa0b5c18a30d2efbd7d8c43a137e9c4c748af6eb7f0a5ba0007

                                                                      • \Users\Admin\AppData\Local\Temp\Unicorn-37386.exe

                                                                        Filesize

                                                                        184KB

                                                                        MD5

                                                                        8626bce584f580aca10f06f19e3d9580

                                                                        SHA1

                                                                        1b7ca9c3d27da0ab36f0fc94a5ce1fe9e079f0ae

                                                                        SHA256

                                                                        e29058fee71e9f20381b2b593a31ed213e3a21639b6adeef3b4945ae8815ec5f

                                                                        SHA512

                                                                        9fff8cec99454b19f0f5a6ee4805b7fdcd29d323b45c2e49b416125c1e8baa4bed43d30ad22371e95d2ca8653984701fcd7aca3cb4c56fb9d198488c078b7196

                                                                      • \Users\Admin\AppData\Local\Temp\Unicorn-37573.exe

                                                                        Filesize

                                                                        184KB

                                                                        MD5

                                                                        306b800c2af1ac5e068d5d7d0ffd7621

                                                                        SHA1

                                                                        5f19a1a03a4dff5e69a71226f90176ca019a20eb

                                                                        SHA256

                                                                        f9023b91274aa0b29bc5674e90c3b980951c7c46750bb05f5a8a9bb783ae4a77

                                                                        SHA512

                                                                        e62114ccf34ffad6b5aac7a3f334d81c94fef67ab6e9700088bbf21d80a9416256cedd88f5ab547abb0a58c8cb39e2a561b0a367e16874e58d423780fb6d0ee6

                                                                      • \Users\Admin\AppData\Local\Temp\Unicorn-40916.exe

                                                                        Filesize

                                                                        128KB

                                                                        MD5

                                                                        7027e7151e1b32cfe1d1ca56ed7d6280

                                                                        SHA1

                                                                        a9ef2ab2cdffe99736ee7b095beeb43236252316

                                                                        SHA256

                                                                        7cabf44bad229a2453ce94f19af072f09e4cb0e5b0d426f9a7059fbda666e075

                                                                        SHA512

                                                                        82c94a83dd3c8abb70a8a13a3d5dd28402b9f7afd915d2c733816ce9ff3d6115d850c8406b3a4347402f7f4de799c72281e8cdfe7caf1308bd5a802666126fe2

                                                                      • \Users\Admin\AppData\Local\Temp\Unicorn-42368.exe

                                                                        Filesize

                                                                        184KB

                                                                        MD5

                                                                        aeac334e63e8444d4b25106e6c91a965

                                                                        SHA1

                                                                        76300488fff708f6328891dc7cc56fe55e4823bf

                                                                        SHA256

                                                                        d5569ac0e587ae8188645bf39f777e4fdd9f1b3157841f927958a571a2cf0f77

                                                                        SHA512

                                                                        f55b5a1936af26311b32b7bb1bdba54dbe696b16dacfaead8e1449e1219ce0885a31c7fd19b39ce91c8f4dbf1fca3702bfcdce11444abc7a7ec516dca17330d4

                                                                      • \Users\Admin\AppData\Local\Temp\Unicorn-5306.exe

                                                                        Filesize

                                                                        184KB

                                                                        MD5

                                                                        12f1cfb515483a736ef62081fd87dd70

                                                                        SHA1

                                                                        2e56ec49b82d27ae31fba5e97b8cb73c671c36e2

                                                                        SHA256

                                                                        76cd9b18bef472596c8216b57aa0584ce0d1d8b75d55bdb52a4918eeb338a1c9

                                                                        SHA512

                                                                        43ccc60271368ef9f81edc2b24edb5f117b410ed40e5a452417e062f01af10f53b55f253cc6076f70dec2f026f09c1b0477157f224a9e90618d6516ab42f4da8

                                                                      • \Users\Admin\AppData\Local\Temp\Unicorn-53355.exe

                                                                        Filesize

                                                                        184KB

                                                                        MD5

                                                                        a91b34b32abd5f4e30b1f688344babd7

                                                                        SHA1

                                                                        cf60fabb238ebca94a2b3067cdadba78d8120eca

                                                                        SHA256

                                                                        bb6fa5a6c95d80cf06babf17627439e79cf7b468356a64354246a9ad97dbb8fc

                                                                        SHA512

                                                                        e899eb4d111bb0eadf453ace17fc641e0f7de1f26af97c983e9d83c8d4cad876eadeee433f3ad4cd3855fafb31a765ba6e11f112bab5db534c380fa73a37ced7

                                                                      • \Users\Admin\AppData\Local\Temp\Unicorn-61523.exe

                                                                        Filesize

                                                                        184KB

                                                                        MD5

                                                                        1751c6f6647677e58ff1052c91036b56

                                                                        SHA1

                                                                        1abc1f472499a03b2c44d90e6feaf8ee275d88d3

                                                                        SHA256

                                                                        6281c596ca7c3fedca84217f60ee588e23af48095d65a325c41ab7aa843f0c74

                                                                        SHA512

                                                                        2df6865323bd0295434f4285e6f7b04cb8f10b2169116cea8035c347eb48f7f3a78ba2c5e0e22e50a599ba3ff001a52f6af44ccd4ea08f9d9a5a7d2c76e46565