Analysis
-
max time kernel
115s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
13-01-2024 07:19
Static task
static1
Behavioral task
behavioral1
Sample
5850f51ce11cdf9dbfec4a2d73050584.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
5850f51ce11cdf9dbfec4a2d73050584.exe
Resource
win10v2004-20231215-en
General
-
Target
5850f51ce11cdf9dbfec4a2d73050584.exe
-
Size
184KB
-
MD5
5850f51ce11cdf9dbfec4a2d73050584
-
SHA1
9ba5a847fc709d0aaffa91be7402d2b110cee2fc
-
SHA256
775ebe8cc9da6f56643ab27f1d4d9de3f8c2fc055dde764c7d6e5fda0e490870
-
SHA512
9527ac3050d2001a4e3614caae68af20e2b621397301ff277c3b65ae2a0aa92b02979838e4b9ec8bde63bcbeb0622ae737c500c1b546d46976d243b1153d59cf
-
SSDEEP
3072:sDHUoHn2KiAC7MfQh5pz8FMB+SM9ztl/lSxUZoZyylPvpFw:sD0oHHC7sQ7pz8BP7xylPvpF
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 3008 Unicorn-26518.exe 2620 Unicorn-1336.exe 2568 Unicorn-5975.exe 2684 Unicorn-46666.exe 2716 Unicorn-2104.exe 2608 Unicorn-13801.exe 2772 Unicorn-8451.exe 768 Unicorn-475.exe 2388 Unicorn-54315.exe 2192 Unicorn-23911.exe 1548 Unicorn-37786.exe 2376 Unicorn-63137.exe 1184 Unicorn-59608.exe 1148 Unicorn-47185.exe 2788 Unicorn-57792.exe 2884 Unicorn-28457.exe 676 Unicorn-44793.exe 1420 Unicorn-49432.exe 332 Unicorn-61129.exe 412 Unicorn-49619.exe 2096 Unicorn-5057.exe 1496 Unicorn-3433.exe 1800 Unicorn-41451.exe 808 Unicorn-31673.exe 2156 Unicorn-62914.exe 1220 Unicorn-60091.exe 1596 Unicorn-51409.exe 2324 Unicorn-30242.exe 740 Unicorn-43432.exe 1232 Unicorn-55130.exe 1916 Unicorn-37450.exe 2988 Unicorn-9224.exe 2924 Unicorn-57180.exe 2544 Unicorn-28954.exe 2596 Unicorn-24508.exe 1868 Unicorn-13002.exe 2460 Unicorn-21170.exe 2600 Unicorn-387.exe 2604 Unicorn-32868.exe 2456 Unicorn-16724.exe 2888 Unicorn-44715.exe 2916 Unicorn-49479.exe 2188 Unicorn-41503.exe 2384 Unicorn-41503.exe 2344 Unicorn-54310.exe 2164 Unicorn-41695.exe 1216 Unicorn-22021.exe 1028 Unicorn-33527.exe 2620 Unicorn-16039.exe 2032 Unicorn-62608.exe 1044 Unicorn-62608.exe 1356 Unicorn-62695.exe 2496 Unicorn-53703.exe 2804 Unicorn-53703.exe 2528 Unicorn-13703.exe 1152 Unicorn-30808.exe 2536 Unicorn-8031.exe 588 Unicorn-3433.exe 1408 Unicorn-10610.exe 2372 Unicorn-25617.exe 2624 Unicorn-19658.exe 1576 Unicorn-1576.exe 1436 Unicorn-43891.exe 2588 Unicorn-62531.exe -
Loads dropped DLL 64 IoCs
pid Process 1868 5850f51ce11cdf9dbfec4a2d73050584.exe 1868 5850f51ce11cdf9dbfec4a2d73050584.exe 3008 Unicorn-26518.exe 3008 Unicorn-26518.exe 1868 5850f51ce11cdf9dbfec4a2d73050584.exe 1868 5850f51ce11cdf9dbfec4a2d73050584.exe 2620 Unicorn-1336.exe 2620 Unicorn-1336.exe 3008 Unicorn-26518.exe 3008 Unicorn-26518.exe 2568 Unicorn-5975.exe 2568 Unicorn-5975.exe 2684 Unicorn-46666.exe 2684 Unicorn-46666.exe 2620 Unicorn-1336.exe 2620 Unicorn-1336.exe 2716 Unicorn-2104.exe 2716 Unicorn-2104.exe 2608 Unicorn-13801.exe 2608 Unicorn-13801.exe 2568 Unicorn-5975.exe 2568 Unicorn-5975.exe 2772 Unicorn-8451.exe 2772 Unicorn-8451.exe 2684 Unicorn-46666.exe 2684 Unicorn-46666.exe 768 Unicorn-475.exe 768 Unicorn-475.exe 2716 Unicorn-2104.exe 2716 Unicorn-2104.exe 2192 Unicorn-23911.exe 2192 Unicorn-23911.exe 2388 Unicorn-54315.exe 2388 Unicorn-54315.exe 2608 Unicorn-13801.exe 2608 Unicorn-13801.exe 1548 Unicorn-37786.exe 1548 Unicorn-37786.exe 2376 Unicorn-63137.exe 2376 Unicorn-63137.exe 2772 Unicorn-8451.exe 2772 Unicorn-8451.exe 1184 Unicorn-59608.exe 1184 Unicorn-59608.exe 1148 Unicorn-47185.exe 1148 Unicorn-47185.exe 768 Unicorn-475.exe 768 Unicorn-475.exe 2788 Unicorn-57792.exe 2788 Unicorn-57792.exe 2884 Unicorn-28457.exe 2884 Unicorn-28457.exe 332 Unicorn-61129.exe 332 Unicorn-61129.exe 2192 Unicorn-23911.exe 2192 Unicorn-23911.exe 1548 Unicorn-37786.exe 1548 Unicorn-37786.exe 1420 Unicorn-49432.exe 1420 Unicorn-49432.exe 676 Unicorn-44793.exe 676 Unicorn-44793.exe 2388 Unicorn-54315.exe 2388 Unicorn-54315.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2324 2600 WerFault.exe 65 -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1868 5850f51ce11cdf9dbfec4a2d73050584.exe 3008 Unicorn-26518.exe 2620 Unicorn-1336.exe 2568 Unicorn-5975.exe 2684 Unicorn-46666.exe 2716 Unicorn-2104.exe 2608 Unicorn-13801.exe 2772 Unicorn-8451.exe 768 Unicorn-475.exe 2388 Unicorn-54315.exe 2192 Unicorn-23911.exe 1548 Unicorn-37786.exe 2376 Unicorn-63137.exe 1184 Unicorn-59608.exe 1148 Unicorn-47185.exe 2788 Unicorn-57792.exe 2884 Unicorn-28457.exe 332 Unicorn-61129.exe 676 Unicorn-44793.exe 1420 Unicorn-49432.exe 412 Unicorn-49619.exe 1496 Unicorn-3433.exe 2096 Unicorn-5057.exe 1800 Unicorn-41451.exe 808 Unicorn-31673.exe 2156 Unicorn-62914.exe 740 Unicorn-43432.exe 1232 Unicorn-55130.exe 2988 Unicorn-9224.exe 1596 Unicorn-51409.exe 1220 Unicorn-60091.exe 2324 Unicorn-30242.exe 1916 Unicorn-37450.exe 2924 Unicorn-57180.exe 2544 Unicorn-28954.exe 2596 Unicorn-24508.exe 2600 Unicorn-387.exe 2604 Unicorn-32868.exe 1868 Unicorn-13002.exe 2460 Unicorn-21170.exe 2456 Unicorn-16724.exe 2888 Unicorn-44715.exe 2916 Unicorn-49479.exe 2164 Unicorn-41695.exe 2384 Unicorn-41503.exe 1216 Unicorn-22021.exe 1028 Unicorn-33527.exe 2344 Unicorn-54310.exe 2032 Unicorn-62608.exe 1356 Unicorn-62695.exe 2496 Unicorn-53703.exe 2804 Unicorn-53703.exe 588 Unicorn-3433.exe 1044 Unicorn-62608.exe 2620 Unicorn-16039.exe 2536 Unicorn-8031.exe 2528 Unicorn-13703.exe 1152 Unicorn-30808.exe 1408 Unicorn-10610.exe 2372 Unicorn-25617.exe 1576 Unicorn-1576.exe 2624 Unicorn-19658.exe 2588 Unicorn-62531.exe 1436 Unicorn-43891.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1868 wrote to memory of 3008 1868 5850f51ce11cdf9dbfec4a2d73050584.exe 28 PID 1868 wrote to memory of 3008 1868 5850f51ce11cdf9dbfec4a2d73050584.exe 28 PID 1868 wrote to memory of 3008 1868 5850f51ce11cdf9dbfec4a2d73050584.exe 28 PID 1868 wrote to memory of 3008 1868 5850f51ce11cdf9dbfec4a2d73050584.exe 28 PID 3008 wrote to memory of 2620 3008 Unicorn-26518.exe 29 PID 3008 wrote to memory of 2620 3008 Unicorn-26518.exe 29 PID 3008 wrote to memory of 2620 3008 Unicorn-26518.exe 29 PID 3008 wrote to memory of 2620 3008 Unicorn-26518.exe 29 PID 1868 wrote to memory of 2568 1868 5850f51ce11cdf9dbfec4a2d73050584.exe 30 PID 1868 wrote to memory of 2568 1868 5850f51ce11cdf9dbfec4a2d73050584.exe 30 PID 1868 wrote to memory of 2568 1868 5850f51ce11cdf9dbfec4a2d73050584.exe 30 PID 1868 wrote to memory of 2568 1868 5850f51ce11cdf9dbfec4a2d73050584.exe 30 PID 2620 wrote to memory of 2684 2620 Unicorn-1336.exe 31 PID 2620 wrote to memory of 2684 2620 Unicorn-1336.exe 31 PID 2620 wrote to memory of 2684 2620 Unicorn-1336.exe 31 PID 2620 wrote to memory of 2684 2620 Unicorn-1336.exe 31 PID 3008 wrote to memory of 2716 3008 Unicorn-26518.exe 32 PID 3008 wrote to memory of 2716 3008 Unicorn-26518.exe 32 PID 3008 wrote to memory of 2716 3008 Unicorn-26518.exe 32 PID 3008 wrote to memory of 2716 3008 Unicorn-26518.exe 32 PID 2568 wrote to memory of 2608 2568 Unicorn-5975.exe 33 PID 2568 wrote to memory of 2608 2568 Unicorn-5975.exe 33 PID 2568 wrote to memory of 2608 2568 Unicorn-5975.exe 33 PID 2568 wrote to memory of 2608 2568 Unicorn-5975.exe 33 PID 2684 wrote to memory of 2772 2684 Unicorn-46666.exe 34 PID 2684 wrote to memory of 2772 2684 Unicorn-46666.exe 34 PID 2684 wrote to memory of 2772 2684 Unicorn-46666.exe 34 PID 2684 wrote to memory of 2772 2684 Unicorn-46666.exe 34 PID 2620 wrote to memory of 2388 2620 Unicorn-1336.exe 35 PID 2620 wrote to memory of 2388 2620 Unicorn-1336.exe 35 PID 2620 wrote to memory of 2388 2620 Unicorn-1336.exe 35 PID 2620 wrote to memory of 2388 2620 Unicorn-1336.exe 35 PID 2716 wrote to memory of 768 2716 Unicorn-2104.exe 36 PID 2716 wrote to memory of 768 2716 Unicorn-2104.exe 36 PID 2716 wrote to memory of 768 2716 Unicorn-2104.exe 36 PID 2716 wrote to memory of 768 2716 Unicorn-2104.exe 36 PID 2608 wrote to memory of 2192 2608 Unicorn-13801.exe 38 PID 2608 wrote to memory of 2192 2608 Unicorn-13801.exe 38 PID 2608 wrote to memory of 2192 2608 Unicorn-13801.exe 38 PID 2608 wrote to memory of 2192 2608 Unicorn-13801.exe 38 PID 2568 wrote to memory of 1548 2568 Unicorn-5975.exe 37 PID 2568 wrote to memory of 1548 2568 Unicorn-5975.exe 37 PID 2568 wrote to memory of 1548 2568 Unicorn-5975.exe 37 PID 2568 wrote to memory of 1548 2568 Unicorn-5975.exe 37 PID 2772 wrote to memory of 2376 2772 Unicorn-8451.exe 39 PID 2772 wrote to memory of 2376 2772 Unicorn-8451.exe 39 PID 2772 wrote to memory of 2376 2772 Unicorn-8451.exe 39 PID 2772 wrote to memory of 2376 2772 Unicorn-8451.exe 39 PID 2684 wrote to memory of 1184 2684 Unicorn-46666.exe 40 PID 2684 wrote to memory of 1184 2684 Unicorn-46666.exe 40 PID 2684 wrote to memory of 1184 2684 Unicorn-46666.exe 40 PID 2684 wrote to memory of 1184 2684 Unicorn-46666.exe 40 PID 768 wrote to memory of 1148 768 Unicorn-475.exe 41 PID 768 wrote to memory of 1148 768 Unicorn-475.exe 41 PID 768 wrote to memory of 1148 768 Unicorn-475.exe 41 PID 768 wrote to memory of 1148 768 Unicorn-475.exe 41 PID 2716 wrote to memory of 2788 2716 Unicorn-2104.exe 42 PID 2716 wrote to memory of 2788 2716 Unicorn-2104.exe 42 PID 2716 wrote to memory of 2788 2716 Unicorn-2104.exe 42 PID 2716 wrote to memory of 2788 2716 Unicorn-2104.exe 42 PID 2192 wrote to memory of 2884 2192 Unicorn-23911.exe 43 PID 2192 wrote to memory of 2884 2192 Unicorn-23911.exe 43 PID 2192 wrote to memory of 2884 2192 Unicorn-23911.exe 43 PID 2192 wrote to memory of 2884 2192 Unicorn-23911.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\5850f51ce11cdf9dbfec4a2d73050584.exe"C:\Users\Admin\AppData\Local\Temp\5850f51ce11cdf9dbfec4a2d73050584.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26518.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26518.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-1336.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1336.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46666.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46666.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-8451.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8451.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-63137.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63137.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49619.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49619.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:412 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-24508.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24508.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2596 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-25617.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25617.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-25474.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25474.exe10⤵PID:1528
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20975.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20975.exe11⤵PID:384
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51587.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51587.exe12⤵PID:2172
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31145.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31145.exe11⤵PID:2768
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13002.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13002.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-8031.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8031.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-20700.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20700.exe9⤵PID:2116
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34016.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34016.exe10⤵PID:2360
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7409.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7409.exe9⤵PID:2708
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5057.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5057.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-39558.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39558.exe7⤵PID:936
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7171.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7171.exe8⤵PID:740
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59608.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59608.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1184 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3433.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3433.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1496 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-57180.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57180.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47918.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47918.exe8⤵PID:2748
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28954.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28954.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30808.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30808.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61348.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61348.exe8⤵PID:2532
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42952.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42952.exe9⤵PID:2380
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7409.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7409.exe8⤵PID:3068
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62695.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62695.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1356 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-36652.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36652.exe7⤵PID:2328
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42952.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42952.exe8⤵PID:2680
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23086.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23086.exe7⤵PID:1732
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54315.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54315.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44793.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44793.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:676 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37450.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37450.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16039.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16039.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2620 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-39942.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39942.exe8⤵PID:2088
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62608.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62608.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23086.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23086.exe7⤵PID:704
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9224.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9224.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49479.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49479.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2916 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-43891.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43891.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1436 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11400.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11400.exe8⤵PID:3048
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2104.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2104.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-475.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-475.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:768 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47185.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47185.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-41451.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41451.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-32868.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32868.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10610.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10610.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1408 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-43559.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43559.exe9⤵PID:2388
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53703.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53703.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35199.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35199.exe8⤵PID:1984
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21170.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21170.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62199.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62199.exe7⤵PID:904
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31673.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31673.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:808 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-387.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-387.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2600 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-53839.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53839.exe7⤵PID:2068
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2600 -s 2167⤵
- Program crash
PID:2324
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57792.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57792.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62914.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62914.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16724.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16724.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13703.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13703.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26242.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26242.exe8⤵PID:2712
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60855.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60855.exe9⤵PID:2480
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3433.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3433.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:588 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-1576.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1576.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1576 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-4446.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4446.exe8⤵PID:2784
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44715.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44715.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-52111.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52111.exe6⤵PID:1428
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5975.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5975.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13801.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13801.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2608 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23911.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23911.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2192 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-28457.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28457.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60091.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60091.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1220 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-41503.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41503.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2384 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-19658.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19658.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2624 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-31774.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31774.exe9⤵PID:2484
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54310.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54310.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48110.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48110.exe7⤵PID:1496
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51409.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51409.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1596 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-41695.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41695.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2164 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51151.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51151.exe7⤵PID:2756
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42952.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42952.exe8⤵PID:2424
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38654.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38654.exe7⤵PID:940
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49432.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49432.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1420 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-55130.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55130.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1232 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-41503.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41503.exe6⤵
- Executes dropped EXE
PID:2188
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22021.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22021.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5069.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5069.exe6⤵PID:844
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37786.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37786.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61129.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61129.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:332 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30242.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30242.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2324 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-33527.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33527.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1028 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62531.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62531.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12998.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12998.exe8⤵PID:2408
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62608.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62608.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-28375.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28375.exe6⤵PID:2432
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43432.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43432.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:740 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-53703.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53703.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-53180.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53180.exe6⤵PID:2192
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42952.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42952.exe7⤵PID:932
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23086.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23086.exe6⤵PID:2716
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD532ef947c2548ecb6eebfe7cee193707b
SHA141e1e84f4a1edffe8b2489e097958ce1daf9ddab
SHA256943c8f1743af8760915742c41fdf57a50695599622f0d54409ae53871faa4e03
SHA51267bc8af40b86312afc30952d4397f6a82ac61538814fcbd33ff36e875ebc8368c4f143d9424ee5d2a7fb0c521620137881e123d9566794d4f1cb820c903c6088
-
Filesize
184KB
MD5f3e01080158af1b7289fa57839cf8833
SHA1d6186f054f170df0b8743ade8d016a6b566ea83c
SHA256b60a73f550bb4b69364091ae3ed949e4171c55e5230ffd588c8cbb31ffb69df2
SHA5124147157f95e1c798fded1797481ee8f853138b433d61051b7e8a61336618de8189c200a7c2721eb11fd0f234ee4d41da5a503882b9e09fed017e167035243e22
-
Filesize
184KB
MD53c27bc0c47766ce4e6b082fd85cd848a
SHA1e1a4f0af4b1b6090139ea1dced19567d701d69c9
SHA2565186b28a4d903272b4b88871afa49acf7fc0914624da2b8b6944c157f6c6b814
SHA5128a2644823fc9c4e8e19057fd4b63bf2063142b1f623e5f6fdec08c531cd17deb3e56754e9b41f439a15276cccc6ae9fb6001bf8c69fd5ec6edab442a910c3c66
-
Filesize
184KB
MD546c65e56f219798492e1b07ff16cd94f
SHA1a46bc6817007b6afb38e8409ea9dc3d751641472
SHA256faa60137fdfdd5e5d3024590176495c880317e0bf52e95806014c4ac4fc877cb
SHA51278b7f5a0f5830deeb6b6a5c46f2dc6734b4849f627bf9b2da4134d723fc6cce4eaa21938e88d9c55920cd82d514dd05904ca39333b8b980ea6d07ce90ea9edcd
-
Filesize
184KB
MD53619a0170a121493939e9a7452a4eb7c
SHA1c187f63a104a965aac71820ffe9e6fd5b2afd3db
SHA256fcb174c2cccfbaf2189cfe2751bf530bdab1b841038c3a091ce9ab7de12c65b7
SHA512524a254a8102d98cfdaf8cefdb4f5d3845a186dd27bcc9ddf3f42d0a092a550307856cecd218d4da7af2f5a369d5cfb9ece4e550793133789f96bad785d620e0
-
Filesize
184KB
MD5c002d48b3e97c745b28663914ab9f42b
SHA1bbeea3ac3daf3fb056b1453463f331e3d2cbd67a
SHA256f2eb33ed088079e78ff5a5294aae5d242377a0fa613c1ba96b8c2cfc7040fec9
SHA51271006673bd1483d70e9cb6b0a0651cca9b59164f37537d5f73d7fd79dddcb76308cbbc8328171f724ad4070ada1d26208df0607da1e87a293b2bcc1c87006f9d
-
Filesize
184KB
MD5c99254a4f53d4f9238b88190cef03d31
SHA14c5fbeee4217b81266722a50488cfb5c94fd0430
SHA25625a2c09014c8f35ccf7c36256afe209e81782ee6765c44f80e5c4644efacec39
SHA5121c80df5f358a7b5cb2a0c53ca6d430cb04a66e08db987937509108f44bde5754d818d9f61de9137814d1a730752624e12f0e331fabcfa5c185485fc5a1a5e8f5
-
Filesize
184KB
MD5e36a4875214df2c24665ae138ffb27e1
SHA105a944c94fdcafe2b547f97682650fbbb3b7186a
SHA2569864a709291039bc70beb7f944f9fbe7baee86de9f18b88a609f2e5c7a577ea4
SHA512c7be1d921d9567ee4be12220a1bf93a8f4c6d23be8e4e6a1c31c718993c34277430951703af6b3bdc55ab92abe74fa4587e89638152dc1d71144fa76e7e7c9a1
-
Filesize
184KB
MD5f44046133f7e34acaf8d803f936e0485
SHA111bc6eed84951c08fa179682bd94e3d87927dfa3
SHA256441d92a61c867fdbf294f1c21eaace5adcec0ce00748003835cec886f93d9540
SHA51268536a613088c142d1e3510698d9ae6cc5e545bf016c44f4b59fee6691ea91623cda05b61aa302bc9d0679f1f54616913bc2e52ec6d87a993dcd5e0ef627ebf7
-
Filesize
184KB
MD5c7a4a1e75979963b09843f5eab4773b1
SHA166f2f62d9203f8dc67d47020197f7d52f6d663ea
SHA2569fdecd6ca9c7e5b0b7ed0ec817fbf7ffe73eae1ceb55e959b655ab0f8fd561d4
SHA512bc7b348f9dd9aa51592e691e281db0fc1b2af0c6c8f2ba133969d484688474cb4f2c1ded651d6ec1c478d5b09ac04707e6da5bcf6cb909748a91f65227f26cf1
-
Filesize
184KB
MD54c92d8763d598b34e73b878012b722ae
SHA14ff3d66ac41d4bc5927aea62b0dff7cb2e4debbd
SHA256de60c68f349167a52091401b37f177e0be27993ad425488ab546a284279238fe
SHA51259dfa2daaff9c42a2600a8df0fb848ca50d57f8fbb36a2e2b0fe65ee38f60b1b6c28722ccf1e53655dd176de4460c4265128b541698804cd851f05329244849c
-
Filesize
184KB
MD554f488bb3e9c8dab41e7831770069749
SHA1df65145ec811b2caf3d080c5dd577ed8fcef9ff4
SHA256bd63f80d56fd79a50d6eb3b8ce3c64d8c2a832c723fe1540e8f59e79ce1cb1c0
SHA512c21f097601a62608afdfb5f0ea86aa7165b7e16bb2695a7edd130b208dd315dbd4109eec8b7bf7fcfbe705a6b4221ccc906682917cab20a7824ad6832b45e54c
-
Filesize
184KB
MD52fb49a5fe416e9667d20206abc8589f5
SHA1ae4e195dbef9987826ad4f997ad5f603f102a342
SHA2560681990fa04a495d1757f40c20ba4df25ca09d4656ef61e871564ac0211f2b44
SHA512894f27657fd03cdf5729232ad7b43dd82ea73eb0e59c7953bd1bed93ac1898f0657aed06f3d9f48ec2559f27e91626d4618de791107c7491f4a37d2f729654ab
-
Filesize
184KB
MD5ecfa50aeba4e489d1fc09544e0e80666
SHA1abb5adc5528721e840459c5a6d4e8b748677cfd8
SHA2561e784f61ab0e30258c124b6c1bdf2365ef389748cf64cb12f91951d091aa1cd3
SHA512b390360cd75cdb3c059ca8ff5b151edda1f43ac83b80ff1fc5c5b603711a82b88b20fc4881bf91f8ca020d2f9d0e82c7b14a74a90379e7a1508a35a3a1d96345
-
Filesize
184KB
MD52f7c851b979e24b62846c8ee58f8313d
SHA19594442402509828e345e517e07471223344506b
SHA256a3bce764b47c0d2553198301007cb1484d15348beaf05c73a7d34eedc0134a6c
SHA5124134ab29044f5fcb8968904eedf81add5a44c762df661e78a8c844d694e0cc7e5011a541a35dff5b7b60e1af40aae30660de369063b2f8e879a42061274f9b2d
-
Filesize
184KB
MD5a5e274aea0cbcdd4dd67f6bfc1408584
SHA1b41c8210fa950e50bbd79fc9bac58c30a379b97b
SHA256f5967e6770e10d35416944cfd23bbeb44f2104cb22253a8c6f24bc078c06a187
SHA512720b5a856c4b49867441973dd3cc9aba7dc296aec0ebb32b8a4303c940efb51abf7ad55bf76aea230af63ac821add01029660d50989ec83df4b9a321742920a2
-
Filesize
184KB
MD5b015adcf2cbf9d330fbb055b2f6fa101
SHA19c492269c48b87a87bc219fdde027c4e22009fc5
SHA2562cdc5cabfbb586edb462fffc7193b98566806302c0a725b25d8df12633b4c31d
SHA512ec0b89150a02ba6caeeef0069ff4863dadaec341c87fd86a1690d63cb3f9dba4a9dc564aa84a3024f7cbe3b907abde7cd9c99d73e2fc232f3921e11fd0b55216
-
Filesize
184KB
MD5f413c0e961e2bd208e5a2579642ea961
SHA1dd4383d1ca10f1468021c7f1109b2615a5d163a3
SHA2560678960fc556dea23d85031f00c127a349cfbe3e0777fd0b694f436ac5f3b088
SHA5128717eed6184f0cf4b60bf4587f2e37633a9f347cabc59775aa7128b2293dc5f005bac3e7485f9e2a7289bc16d3a63adc3ba50fe61450d747d39d94134a563677
-
Filesize
184KB
MD5b58a9c7b0b9501733ea9833cb114a5f7
SHA11abe645fdc97ec22462acac011cceb42c7fb5488
SHA256c8b22c5cc21a5544fd097bdcde7176e8d68311becdd5bc65a5341e9a72ed055b
SHA5121dda11a97f7aa6423a2ef63764b3764b4e2f7eae276af3faec833f6b432c132cc139393fbb86e106101fd52eb5cf403ab435d15eeb3c4cea75b1cd7bd44fbde9