Analysis
-
max time kernel
32s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
11/01/2024, 14:00
Static task
static1
Behavioral task
behavioral1
Sample
53b4d65df8e6e1aeb26ca5daf2b8700e.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
53b4d65df8e6e1aeb26ca5daf2b8700e.exe
Resource
win10v2004-20231222-en
General
-
Target
53b4d65df8e6e1aeb26ca5daf2b8700e.exe
-
Size
184KB
-
MD5
53b4d65df8e6e1aeb26ca5daf2b8700e
-
SHA1
75a5b9582edfe38927587fdf3b3666a081caac1b
-
SHA256
e8aab3758e331e481357a67cd8a1a60d56b480b8078238e7e0dcdd1b48469466
-
SHA512
eb90dfa83bb84e0ef0616333a947dbc40ba8f58e72fffd4ab742ec6c5a76a8bfa6efe4c4a98ef717b4c5ae01fe96eaf21d5bc674862b90d11f99ec050d7d80ee
-
SSDEEP
3072:pDJ7oC69fUAQrgAZfTX4F8NjWlX6vHfVsseIgP/d6lPvpFH:pDNojlQrffL4F899VQ6lPvpF
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 3052 Unicorn-22242.exe 2500 Unicorn-33267.exe 2072 Unicorn-9317.exe 2840 Unicorn-40916.exe 2868 Unicorn-37386.exe 2872 Unicorn-61336.exe 2580 Unicorn-1357.exe 2212 Unicorn-21948.exe 1472 Unicorn-28493.exe 1944 Unicorn-42368.exe 2508 Unicorn-32577.exe 524 Unicorn-61523.exe 800 Unicorn-37573.exe 1484 Unicorn-49079.exe 1564 Unicorn-262.exe 1680 Unicorn-45934.exe 2820 Unicorn-53355.exe 2452 Unicorn-29405.exe 2356 Unicorn-5306.exe 440 Unicorn-7335.exe 1548 Unicorn-62675.exe 2000 Unicorn-42062.exe 944 Unicorn-49676.exe 1928 Unicorn-61928.exe 684 Unicorn-12898.exe 832 Unicorn-42001.exe 2332 Unicorn-40932.exe 1696 Unicorn-45016.exe 2396 Unicorn-21066.exe 2232 Unicorn-23863.exe 2288 Unicorn-43729.exe 2660 Unicorn-49458.exe 2188 Unicorn-53734.exe 2056 Unicorn-9577.exe 2732 Unicorn-34082.exe 2892 Unicorn-22768.exe 2828 Unicorn-26852.exe 3024 Unicorn-54886.exe 2752 Unicorn-59525.exe 2848 Unicorn-18108.exe 2656 Unicorn-37974.exe 1072 Unicorn-26276.exe 2172 Unicorn-34274.exe 1732 Unicorn-50226.exe 1260 Unicorn-34274.exe 2244 Unicorn-12182.exe 552 Unicorn-36687.exe 304 Unicorn-16821.exe 2620 Unicorn-48555.exe 2300 Unicorn-28689.exe 2912 Unicorn-53983.exe 2920 Unicorn-34117.exe 1900 Unicorn-9058.exe 932 Unicorn-62898.exe 2476 Unicorn-16651.exe 1224 Unicorn-30896.exe 2436 Unicorn-34980.exe 2676 Unicorn-7351.exe 1556 Unicorn-61191.exe 2144 Unicorn-23688.exe 2080 Unicorn-61191.exe 2176 Unicorn-27772.exe 2132 Unicorn-44108.exe 1880 Unicorn-49131.exe -
Loads dropped DLL 64 IoCs
pid Process 2980 53b4d65df8e6e1aeb26ca5daf2b8700e.exe 2980 53b4d65df8e6e1aeb26ca5daf2b8700e.exe 3052 Unicorn-22242.exe 3052 Unicorn-22242.exe 2980 53b4d65df8e6e1aeb26ca5daf2b8700e.exe 2980 53b4d65df8e6e1aeb26ca5daf2b8700e.exe 3052 Unicorn-22242.exe 3052 Unicorn-22242.exe 2072 Unicorn-9317.exe 2500 Unicorn-33267.exe 2072 Unicorn-9317.exe 2500 Unicorn-33267.exe 2868 Unicorn-37386.exe 2868 Unicorn-37386.exe 2072 Unicorn-9317.exe 2072 Unicorn-9317.exe 2840 Unicorn-40916.exe 2840 Unicorn-40916.exe 2500 Unicorn-33267.exe 2500 Unicorn-33267.exe 2872 Unicorn-61336.exe 2872 Unicorn-61336.exe 2580 Unicorn-1357.exe 2868 Unicorn-37386.exe 2580 Unicorn-1357.exe 2868 Unicorn-37386.exe 1472 Unicorn-28493.exe 1472 Unicorn-28493.exe 2840 Unicorn-40916.exe 2212 Unicorn-21948.exe 2840 Unicorn-40916.exe 2212 Unicorn-21948.exe 2508 Unicorn-32577.exe 2508 Unicorn-32577.exe 2872 Unicorn-61336.exe 2872 Unicorn-61336.exe 1944 Unicorn-42368.exe 1944 Unicorn-42368.exe 800 Unicorn-37573.exe 800 Unicorn-37573.exe 2212 Unicorn-21948.exe 2212 Unicorn-21948.exe 1680 Unicorn-45934.exe 1680 Unicorn-45934.exe 1472 Unicorn-28493.exe 1484 Unicorn-49079.exe 1472 Unicorn-28493.exe 1484 Unicorn-49079.exe 1784 WerFault.exe 1784 WerFault.exe 1784 WerFault.exe 1784 WerFault.exe 1784 WerFault.exe 1784 WerFault.exe 1944 Unicorn-42368.exe 1944 Unicorn-42368.exe 2356 Unicorn-5306.exe 2452 Unicorn-29405.exe 2820 Unicorn-53355.exe 2356 Unicorn-5306.exe 2452 Unicorn-29405.exe 2508 Unicorn-32577.exe 2820 Unicorn-53355.exe 2508 Unicorn-32577.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 1784 1564 WerFault.exe 45 2712 2920 WerFault.exe 79 -
Suspicious use of SetWindowsHookEx 59 IoCs
pid Process 2980 53b4d65df8e6e1aeb26ca5daf2b8700e.exe 3052 Unicorn-22242.exe 2072 Unicorn-9317.exe 2500 Unicorn-33267.exe 2868 Unicorn-37386.exe 2840 Unicorn-40916.exe 2872 Unicorn-61336.exe 2580 Unicorn-1357.exe 1472 Unicorn-28493.exe 2212 Unicorn-21948.exe 2508 Unicorn-32577.exe 1944 Unicorn-42368.exe 524 Unicorn-61523.exe 800 Unicorn-37573.exe 1484 Unicorn-49079.exe 1564 Unicorn-262.exe 1680 Unicorn-45934.exe 2820 Unicorn-53355.exe 2452 Unicorn-29405.exe 2356 Unicorn-5306.exe 440 Unicorn-7335.exe 1548 Unicorn-62675.exe 2000 Unicorn-42062.exe 944 Unicorn-49676.exe 1928 Unicorn-61928.exe 684 Unicorn-12898.exe 2332 Unicorn-40932.exe 832 Unicorn-42001.exe 2396 Unicorn-21066.exe 1696 Unicorn-45016.exe 2232 Unicorn-23863.exe 2288 Unicorn-43729.exe 2660 Unicorn-49458.exe 2188 Unicorn-53734.exe 2056 Unicorn-9577.exe 2892 Unicorn-22768.exe 2732 Unicorn-34082.exe 3024 Unicorn-54886.exe 2828 Unicorn-26852.exe 2752 Unicorn-59525.exe 1072 Unicorn-26276.exe 1260 Unicorn-34274.exe 2848 Unicorn-18108.exe 2656 Unicorn-37974.exe 1732 Unicorn-50226.exe 2172 Unicorn-34274.exe 2244 Unicorn-12182.exe 552 Unicorn-36687.exe 304 Unicorn-16821.exe 2300 Unicorn-28689.exe 2620 Unicorn-48555.exe 2912 Unicorn-53983.exe 2920 Unicorn-34117.exe 932 Unicorn-62898.exe 2476 Unicorn-16651.exe 1224 Unicorn-30896.exe 2436 Unicorn-34980.exe 1556 Unicorn-61191.exe 2144 Unicorn-23688.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2980 wrote to memory of 3052 2980 53b4d65df8e6e1aeb26ca5daf2b8700e.exe 28 PID 2980 wrote to memory of 3052 2980 53b4d65df8e6e1aeb26ca5daf2b8700e.exe 28 PID 2980 wrote to memory of 3052 2980 53b4d65df8e6e1aeb26ca5daf2b8700e.exe 28 PID 2980 wrote to memory of 3052 2980 53b4d65df8e6e1aeb26ca5daf2b8700e.exe 28 PID 3052 wrote to memory of 2500 3052 Unicorn-22242.exe 29 PID 3052 wrote to memory of 2500 3052 Unicorn-22242.exe 29 PID 3052 wrote to memory of 2500 3052 Unicorn-22242.exe 29 PID 3052 wrote to memory of 2500 3052 Unicorn-22242.exe 29 PID 2980 wrote to memory of 2072 2980 53b4d65df8e6e1aeb26ca5daf2b8700e.exe 30 PID 2980 wrote to memory of 2072 2980 53b4d65df8e6e1aeb26ca5daf2b8700e.exe 30 PID 2980 wrote to memory of 2072 2980 53b4d65df8e6e1aeb26ca5daf2b8700e.exe 30 PID 2980 wrote to memory of 2072 2980 53b4d65df8e6e1aeb26ca5daf2b8700e.exe 30 PID 3052 wrote to memory of 2868 3052 Unicorn-22242.exe 31 PID 3052 wrote to memory of 2868 3052 Unicorn-22242.exe 31 PID 3052 wrote to memory of 2868 3052 Unicorn-22242.exe 31 PID 3052 wrote to memory of 2868 3052 Unicorn-22242.exe 31 PID 2072 wrote to memory of 2840 2072 Unicorn-9317.exe 33 PID 2072 wrote to memory of 2840 2072 Unicorn-9317.exe 33 PID 2072 wrote to memory of 2840 2072 Unicorn-9317.exe 33 PID 2072 wrote to memory of 2840 2072 Unicorn-9317.exe 33 PID 2500 wrote to memory of 2872 2500 Unicorn-33267.exe 32 PID 2500 wrote to memory of 2872 2500 Unicorn-33267.exe 32 PID 2500 wrote to memory of 2872 2500 Unicorn-33267.exe 32 PID 2500 wrote to memory of 2872 2500 Unicorn-33267.exe 32 PID 2868 wrote to memory of 2580 2868 Unicorn-37386.exe 34 PID 2868 wrote to memory of 2580 2868 Unicorn-37386.exe 34 PID 2868 wrote to memory of 2580 2868 Unicorn-37386.exe 34 PID 2868 wrote to memory of 2580 2868 Unicorn-37386.exe 34 PID 2072 wrote to memory of 2212 2072 Unicorn-9317.exe 35 PID 2072 wrote to memory of 2212 2072 Unicorn-9317.exe 35 PID 2072 wrote to memory of 2212 2072 Unicorn-9317.exe 35 PID 2072 wrote to memory of 2212 2072 Unicorn-9317.exe 35 PID 2840 wrote to memory of 1472 2840 Unicorn-40916.exe 36 PID 2840 wrote to memory of 1472 2840 Unicorn-40916.exe 36 PID 2840 wrote to memory of 1472 2840 Unicorn-40916.exe 36 PID 2840 wrote to memory of 1472 2840 Unicorn-40916.exe 36 PID 2500 wrote to memory of 1944 2500 Unicorn-33267.exe 38 PID 2500 wrote to memory of 1944 2500 Unicorn-33267.exe 38 PID 2500 wrote to memory of 1944 2500 Unicorn-33267.exe 38 PID 2500 wrote to memory of 1944 2500 Unicorn-33267.exe 38 PID 2872 wrote to memory of 2508 2872 Unicorn-61336.exe 37 PID 2872 wrote to memory of 2508 2872 Unicorn-61336.exe 37 PID 2872 wrote to memory of 2508 2872 Unicorn-61336.exe 37 PID 2872 wrote to memory of 2508 2872 Unicorn-61336.exe 37 PID 2580 wrote to memory of 524 2580 Unicorn-1357.exe 39 PID 2580 wrote to memory of 524 2580 Unicorn-1357.exe 39 PID 2580 wrote to memory of 524 2580 Unicorn-1357.exe 39 PID 2580 wrote to memory of 524 2580 Unicorn-1357.exe 39 PID 2868 wrote to memory of 800 2868 Unicorn-37386.exe 40 PID 2868 wrote to memory of 800 2868 Unicorn-37386.exe 40 PID 2868 wrote to memory of 800 2868 Unicorn-37386.exe 40 PID 2868 wrote to memory of 800 2868 Unicorn-37386.exe 40 PID 1472 wrote to memory of 1484 1472 Unicorn-28493.exe 41 PID 1472 wrote to memory of 1484 1472 Unicorn-28493.exe 41 PID 1472 wrote to memory of 1484 1472 Unicorn-28493.exe 41 PID 1472 wrote to memory of 1484 1472 Unicorn-28493.exe 41 PID 2212 wrote to memory of 1564 2212 Unicorn-21948.exe 45 PID 2840 wrote to memory of 1680 2840 Unicorn-40916.exe 46 PID 2212 wrote to memory of 1564 2212 Unicorn-21948.exe 45 PID 2212 wrote to memory of 1564 2212 Unicorn-21948.exe 45 PID 2212 wrote to memory of 1564 2212 Unicorn-21948.exe 45 PID 2840 wrote to memory of 1680 2840 Unicorn-40916.exe 46 PID 2840 wrote to memory of 1680 2840 Unicorn-40916.exe 46 PID 2840 wrote to memory of 1680 2840 Unicorn-40916.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\53b4d65df8e6e1aeb26ca5daf2b8700e.exe"C:\Users\Admin\AppData\Local\Temp\53b4d65df8e6e1aeb26ca5daf2b8700e.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22242.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22242.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-33267.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33267.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2500 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61336.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61336.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-32577.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32577.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-53355.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53355.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2820 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40932.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40932.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34082.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34082.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3459.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3459.exe9⤵PID:1704
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6914.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6914.exe10⤵PID:1160
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49131.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49131.exe8⤵
- Executes dropped EXE
PID:1880 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50654.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50654.exe9⤵PID:2144
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26852.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26852.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2828 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27772.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27772.exe8⤵
- Executes dropped EXE
PID:2176
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21066.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21066.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34274.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34274.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1260 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-52468.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52468.exe8⤵PID:2972
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4590.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4590.exe7⤵PID:2168
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29405.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29405.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2452 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45016.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45016.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37974.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37974.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-24456.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24456.exe8⤵PID:2528
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14085.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14085.exe9⤵PID:1600
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18108.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18108.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23688.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23688.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30232.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30232.exe8⤵PID:2560
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64060.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64060.exe9⤵PID:1080
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42368.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42368.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5306.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5306.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-42001.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42001.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:832 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9577.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9577.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9058.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9058.exe8⤵
- Executes dropped EXE
PID:1900
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62898.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62898.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:932 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62089.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62089.exe8⤵PID:2616
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22768.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22768.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16651.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16651.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2476 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62089.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62089.exe8⤵PID:2864
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42223.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42223.exe7⤵PID:2060
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12898.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12898.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:684 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34274.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34274.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48384.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48384.exe7⤵PID:3008
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37386.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37386.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-1357.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1357.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61523.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61523.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:524 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-24456.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24456.exe6⤵PID:1760
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37573.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37573.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:800 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-7335.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7335.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:440 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-43729.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43729.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2288 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-36687.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36687.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:552 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-24456.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24456.exe8⤵PID:2444
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4590.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4590.exe7⤵PID:1944
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16821.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16821.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:304 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-24456.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24456.exe7⤵PID:2544
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23863.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23863.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12182.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12182.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-24456.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24456.exe7⤵PID:2100
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4590.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4590.exe6⤵PID:1980
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9317.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9317.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40916.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40916.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-28493.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28493.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1472 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49079.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49079.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1484 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61928.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61928.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1928 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54886.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54886.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34980.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34980.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30434.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30434.exe9⤵PID:2180
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61191.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61191.exe7⤵
- Executes dropped EXE
PID:2080
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59525.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59525.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2752 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44108.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44108.exe7⤵
- Executes dropped EXE
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-57286.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57286.exe8⤵PID:932
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42062.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42062.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-53734.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53734.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-53983.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53983.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40984.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40984.exe8⤵PID:2884
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25052.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25052.exe9⤵PID:868
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21118.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21118.exe7⤵PID:2856
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34117.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34117.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2920 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2920 -s 2407⤵
- Program crash
PID:2712
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45934.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45934.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49676.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49676.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:944 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50226.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50226.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-7351.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7351.exe7⤵
- Executes dropped EXE
PID:2676
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61191.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61191.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-56526.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56526.exe7⤵PID:2512
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26276.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26276.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1072 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30896.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30896.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1224 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47481.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47481.exe7⤵PID:3068
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27615.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27615.exe6⤵PID:3052
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21948.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21948.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-262.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-262.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1564 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1564 -s 2405⤵
- Loads dropped DLL
- Program crash
PID:1784
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62675.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62675.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49458.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49458.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48555.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48555.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2620 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40984.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40984.exe7⤵PID:2588
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21118.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21118.exe6⤵PID:2904
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28689.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28689.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40984.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40984.exe6⤵PID:2844
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64408.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64408.exe7⤵PID:2804
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD5e7527d351359939b4a212f4055b4cffc
SHA195759e261b3c550dbf4270589f931e8982b0324d
SHA2567e26e86fe1d527910071f744a8625ba679b01ef9894b3f50027f47756f8eb18b
SHA512eb6b536fef8372cf08d432baf8e8b09d78b7c83f4ab1ddf1ca7ac09190b3898e34aa294a48615e248e27fb531e02afa91315d790f0f9f3da5f336b1976963b28
-
Filesize
184KB
MD5e885151a2ad2bf2772c46233154172aa
SHA13e0ff5e018f834a6a642ff09fc2e6715e07e4eb3
SHA256adb5cadad210ec640bac37f2db4faf1acc1ca7144a26b40e6d2ad1a9415ad998
SHA51280492cfacb80da1b44d22d8a2ce945023baaf150c3e734e5619b51ea1fbcd8f61e8699923117bfa484e93f6c0f933822b2d324e22aec8780e7b9b7b8886cc38c
-
Filesize
184KB
MD564593b93aab276e137bfa20aacd90ed5
SHA1ad0bfa5c96a9331659722b1d89ed1ffde7aba20f
SHA256d0415da4d1604ec5e75ede5bc0c3fef4b11768b69458802342ed43d5b06ed7f2
SHA5122ad15f7f64fc6143ad04319bad033ef642d810ba36c77f374b704f4bb233c64ea3297332373f6c0c1aeb2493e63c38cb1a5b7ae9c281f4db9639fb804fbbf93b
-
Filesize
184KB
MD508db6035f333fc2bd8c54835660bb594
SHA1e6b002976232a567565c543086b803201cdd5459
SHA256f8975559d85ebcaac5da62a46856d461248c07f615f830d2f54957708f41b281
SHA5126541ddc64b1d9d31c5574c68cfe2243b50c50bd7bc57225c5834b3526e8c773390b7176c63eaa0883e0fd7274ddacc446b9fbd32588bcecc14246a94bd503a13
-
Filesize
184KB
MD5894005e805977ed44230cad6ba220391
SHA1c2ef9a955f32d07ce4ca7d18e42e84fcd0b0d3b8
SHA2566a46c7fe4c62b9451963eb3050eebf52836d17c7d94b8110cec96ccacc17d447
SHA51264e7d20bb310bd3537819f0e89b99fc3adb607cf1e89c6523cdfcf93313bd34c14e65c35d6dbaad93e85636cb354442ddb64ad1d1048f04b675db405e82ac1bf
-
Filesize
184KB
MD527539fc24e7d50eebf3034b0f5e90304
SHA17c943abb5e1facabb539de42d4fe2ded165adc62
SHA2564fba51dafbe961ec8deace8e03fc2cb7acb060d8b1b24311989f2249b9d242af
SHA5120633513794cf6fb5d8312830be87dad76a5c061a73f9060c1537d23361feb40b67b92721ff3d2aa6de696e6a6adfcf3c4da87d326294fe9c3ad37d0a8b80449d
-
Filesize
184KB
MD57b68a9c345c4182f05eaa40c7d136028
SHA1944144a620ed149846717c286814d8587180c744
SHA256f344b6693455aa1d31d9752d30c0eec2355cc97baa076a2e4bc2839548da3bb6
SHA5126a2fa3698608920a59063e30d53fbd7500c25ee88a46abc19e416676f47964307e1d4ad9323d113587f43bbb7c29a5a86463e9c46c7a50475f51764c9be8598d
-
Filesize
184KB
MD525cdea6a48452a18d9bd360b00896c81
SHA1b2dd3ac74a01f921a3884eab8bf19fa22e166de9
SHA2569d23b360841148f85db7b59eb306d0398647d9b8d8239294e95fcacb031d4fa2
SHA5128d28e9c86aa2033b44c11c0af105e66e08686e96e87619e7ecf25864ca021419472ead2468fbd8e0fe4ceb1b87abe111613b65d57ed9d1048a6644fbb9f78f63
-
Filesize
184KB
MD57ba5c64bbef78fa6447008bc4857fb68
SHA176dc4d72ba86cf002932d9f0570554317fe32c27
SHA256e993e17c821adb3f804f337c93c8b490cba47cb45d55bf39e9342bb8270d0d91
SHA512039fd787201f7d89a4790106b2cd9b7b5d06a904ead90a26fec8e8ed11c022733f65284720d16c8959b812a6e0fb824204845114476ab2161d7be5113a4ce22a
-
Filesize
184KB
MD505960852d8b1481323f6367722f100f2
SHA1d847801485f21b86eeb58a2f220827efc44bbd15
SHA256981bda0eaf32689ed0561dc0810f7c3befdf1af5aa81ec2438b288c78af83915
SHA512b7d7ac06092179e3c31e4fcc2f0e163edaebff1953c205f1eab2f00095deb24212178b05d21cefc407a98643a6342e08a40c9f9897c02948749401b61d2a7a56
-
Filesize
184KB
MD5fd908e9c8570fc9f3d4cd9ecd8234341
SHA1b5f7e4cd7272a7ad29b367598b7e9123b02e22bd
SHA2563f1fdaafdd5bfbe214b9551ca93dd434963da6aa92df9c888c74354fd46e73ae
SHA51226161d49cc8cb7d09edddc66ad429449f85d0f739cb277095e5a02151b52f35ad1eadcbb62c02bfa3280570256ba7ec61727a283b0d775a76cef57c3d24ac2c5
-
Filesize
184KB
MD5a87d7a6d4d79b5daa46fbaf638656c2b
SHA1c45a2b237ea909c086c99c27a6cfde940a925348
SHA2568291a04d92c234aa9fbe5e1216589b755f8bcc8fccfd9fc366c14c63373d8fb0
SHA51298ae65ea4a309d5347f9755a155f7acf66352f04b2d6dc5c423b867a241ed638aed1ce96a3838a43783a2f8dfe87a2b10270a84a90a4999b7d710d812e6752e3
-
Filesize
184KB
MD581e360ddf15d111dd9726c942d85bc5a
SHA177d93543c610288e1698b16f05cca59892756b9b
SHA2561394c74bdb47201337c1df86bc8bf94ac25aabdf3300df4a999f2e7fa321110c
SHA512e902fc3dbe98f18fadb1dbf017e43697bc49b9fa64910e5e50e9e6d8d756c1f46d20c56fed212aa0b5c18a30d2efbd7d8c43a137e9c4c748af6eb7f0a5ba0007
-
Filesize
184KB
MD58626bce584f580aca10f06f19e3d9580
SHA11b7ca9c3d27da0ab36f0fc94a5ce1fe9e079f0ae
SHA256e29058fee71e9f20381b2b593a31ed213e3a21639b6adeef3b4945ae8815ec5f
SHA5129fff8cec99454b19f0f5a6ee4805b7fdcd29d323b45c2e49b416125c1e8baa4bed43d30ad22371e95d2ca8653984701fcd7aca3cb4c56fb9d198488c078b7196
-
Filesize
184KB
MD5306b800c2af1ac5e068d5d7d0ffd7621
SHA15f19a1a03a4dff5e69a71226f90176ca019a20eb
SHA256f9023b91274aa0b29bc5674e90c3b980951c7c46750bb05f5a8a9bb783ae4a77
SHA512e62114ccf34ffad6b5aac7a3f334d81c94fef67ab6e9700088bbf21d80a9416256cedd88f5ab547abb0a58c8cb39e2a561b0a367e16874e58d423780fb6d0ee6
-
Filesize
128KB
MD57027e7151e1b32cfe1d1ca56ed7d6280
SHA1a9ef2ab2cdffe99736ee7b095beeb43236252316
SHA2567cabf44bad229a2453ce94f19af072f09e4cb0e5b0d426f9a7059fbda666e075
SHA51282c94a83dd3c8abb70a8a13a3d5dd28402b9f7afd915d2c733816ce9ff3d6115d850c8406b3a4347402f7f4de799c72281e8cdfe7caf1308bd5a802666126fe2
-
Filesize
184KB
MD5aeac334e63e8444d4b25106e6c91a965
SHA176300488fff708f6328891dc7cc56fe55e4823bf
SHA256d5569ac0e587ae8188645bf39f777e4fdd9f1b3157841f927958a571a2cf0f77
SHA512f55b5a1936af26311b32b7bb1bdba54dbe696b16dacfaead8e1449e1219ce0885a31c7fd19b39ce91c8f4dbf1fca3702bfcdce11444abc7a7ec516dca17330d4
-
Filesize
184KB
MD512f1cfb515483a736ef62081fd87dd70
SHA12e56ec49b82d27ae31fba5e97b8cb73c671c36e2
SHA25676cd9b18bef472596c8216b57aa0584ce0d1d8b75d55bdb52a4918eeb338a1c9
SHA51243ccc60271368ef9f81edc2b24edb5f117b410ed40e5a452417e062f01af10f53b55f253cc6076f70dec2f026f09c1b0477157f224a9e90618d6516ab42f4da8
-
Filesize
184KB
MD5a91b34b32abd5f4e30b1f688344babd7
SHA1cf60fabb238ebca94a2b3067cdadba78d8120eca
SHA256bb6fa5a6c95d80cf06babf17627439e79cf7b468356a64354246a9ad97dbb8fc
SHA512e899eb4d111bb0eadf453ace17fc641e0f7de1f26af97c983e9d83c8d4cad876eadeee433f3ad4cd3855fafb31a765ba6e11f112bab5db534c380fa73a37ced7
-
Filesize
184KB
MD51751c6f6647677e58ff1052c91036b56
SHA11abc1f472499a03b2c44d90e6feaf8ee275d88d3
SHA2566281c596ca7c3fedca84217f60ee588e23af48095d65a325c41ab7aa843f0c74
SHA5122df6865323bd0295434f4285e6f7b04cb8f10b2169116cea8035c347eb48f7f3a78ba2c5e0e22e50a599ba3ff001a52f6af44ccd4ea08f9d9a5a7d2c76e46565