Analysis

  • max time kernel
    115s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    13-01-2024 07:19

General

  • Target

    5850f51ce11cdf9dbfec4a2d73050584.exe

  • Size

    184KB

  • MD5

    5850f51ce11cdf9dbfec4a2d73050584

  • SHA1

    9ba5a847fc709d0aaffa91be7402d2b110cee2fc

  • SHA256

    775ebe8cc9da6f56643ab27f1d4d9de3f8c2fc055dde764c7d6e5fda0e490870

  • SHA512

    9527ac3050d2001a4e3614caae68af20e2b621397301ff277c3b65ae2a0aa92b02979838e4b9ec8bde63bcbeb0622ae737c500c1b546d46976d243b1153d59cf

  • SSDEEP

    3072:sDHUoHn2KiAC7MfQh5pz8FMB+SM9ztl/lSxUZoZyylPvpFw:sD0oHHC7sQ7pz8BP7xylPvpF

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 64 IoCs
  • Loads dropped DLL 64 IoCs
  • Program crash 1 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5850f51ce11cdf9dbfec4a2d73050584.exe
    "C:\Users\Admin\AppData\Local\Temp\5850f51ce11cdf9dbfec4a2d73050584.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1868
    • C:\Users\Admin\AppData\Local\Temp\Unicorn-26518.exe
      C:\Users\Admin\AppData\Local\Temp\Unicorn-26518.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3008
      • C:\Users\Admin\AppData\Local\Temp\Unicorn-1336.exe
        C:\Users\Admin\AppData\Local\Temp\Unicorn-1336.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2620
        • C:\Users\Admin\AppData\Local\Temp\Unicorn-46666.exe
          C:\Users\Admin\AppData\Local\Temp\Unicorn-46666.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2684
          • C:\Users\Admin\AppData\Local\Temp\Unicorn-8451.exe
            C:\Users\Admin\AppData\Local\Temp\Unicorn-8451.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2772
            • C:\Users\Admin\AppData\Local\Temp\Unicorn-63137.exe
              C:\Users\Admin\AppData\Local\Temp\Unicorn-63137.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              PID:2376
              • C:\Users\Admin\AppData\Local\Temp\Unicorn-49619.exe
                C:\Users\Admin\AppData\Local\Temp\Unicorn-49619.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:412
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-24508.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-24508.exe
                  8⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:2596
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-25617.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-25617.exe
                    9⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:2372
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-25474.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-25474.exe
                      10⤵
                        PID:1528
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-20975.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-20975.exe
                          11⤵
                            PID:384
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-51587.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-51587.exe
                              12⤵
                                PID:2172
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-31145.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-31145.exe
                              11⤵
                                PID:2768
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-13002.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-13002.exe
                        7⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:1868
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-8031.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-8031.exe
                          8⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:2536
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-20700.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-20700.exe
                            9⤵
                              PID:2116
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-34016.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-34016.exe
                                10⤵
                                  PID:2360
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-7409.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-7409.exe
                                9⤵
                                  PID:2708
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-5057.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-5057.exe
                            6⤵
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            PID:2096
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-39558.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-39558.exe
                              7⤵
                                PID:936
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-7171.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-7171.exe
                                  8⤵
                                    PID:740
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-59608.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-59608.exe
                              5⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • Suspicious use of SetWindowsHookEx
                              PID:1184
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-3433.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-3433.exe
                                6⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                PID:1496
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-57180.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-57180.exe
                                  7⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetWindowsHookEx
                                  PID:2924
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-47918.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-47918.exe
                                    8⤵
                                      PID:2748
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-28954.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-28954.exe
                                  6⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetWindowsHookEx
                                  PID:2544
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-30808.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-30808.exe
                                    7⤵
                                    • Executes dropped EXE
                                    • Suspicious use of SetWindowsHookEx
                                    PID:1152
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-61348.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-61348.exe
                                      8⤵
                                        PID:2532
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-42952.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-42952.exe
                                          9⤵
                                            PID:2380
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-7409.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-7409.exe
                                          8⤵
                                            PID:3068
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-62695.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-62695.exe
                                        6⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetWindowsHookEx
                                        PID:1356
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-36652.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-36652.exe
                                          7⤵
                                            PID:2328
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-42952.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-42952.exe
                                              8⤵
                                                PID:2680
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-23086.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-23086.exe
                                              7⤵
                                                PID:1732
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-54315.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-54315.exe
                                          4⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          • Suspicious use of SetWindowsHookEx
                                          PID:2388
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-44793.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-44793.exe
                                            5⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            • Suspicious use of SetWindowsHookEx
                                            PID:676
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-37450.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-37450.exe
                                              6⤵
                                              • Executes dropped EXE
                                              • Suspicious use of SetWindowsHookEx
                                              PID:1916
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-16039.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-16039.exe
                                                7⤵
                                                • Executes dropped EXE
                                                • Suspicious use of SetWindowsHookEx
                                                PID:2620
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-39942.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-39942.exe
                                                  8⤵
                                                    PID:2088
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-62608.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-62608.exe
                                                6⤵
                                                • Executes dropped EXE
                                                • Suspicious use of SetWindowsHookEx
                                                PID:2032
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-23086.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-23086.exe
                                                  7⤵
                                                    PID:704
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-9224.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-9224.exe
                                                5⤵
                                                • Executes dropped EXE
                                                • Suspicious use of SetWindowsHookEx
                                                PID:2988
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-49479.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-49479.exe
                                                  6⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:2916
                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-43891.exe
                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-43891.exe
                                                    7⤵
                                                    • Executes dropped EXE
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:1436
                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-11400.exe
                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-11400.exe
                                                      8⤵
                                                        PID:3048
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-2104.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-2104.exe
                                              3⤵
                                              • Executes dropped EXE
                                              • Loads dropped DLL
                                              • Suspicious use of SetWindowsHookEx
                                              • Suspicious use of WriteProcessMemory
                                              PID:2716
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-475.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-475.exe
                                                4⤵
                                                • Executes dropped EXE
                                                • Loads dropped DLL
                                                • Suspicious use of SetWindowsHookEx
                                                • Suspicious use of WriteProcessMemory
                                                PID:768
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-47185.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-47185.exe
                                                  5⤵
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:1148
                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-41451.exe
                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-41451.exe
                                                    6⤵
                                                    • Executes dropped EXE
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:1800
                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-32868.exe
                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-32868.exe
                                                      7⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:2604
                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-10610.exe
                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-10610.exe
                                                        8⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:1408
                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-43559.exe
                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-43559.exe
                                                          9⤵
                                                            PID:2388
                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-53703.exe
                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-53703.exe
                                                        7⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:2804
                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-35199.exe
                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-35199.exe
                                                          8⤵
                                                            PID:1984
                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-21170.exe
                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-21170.exe
                                                        6⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:2460
                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-62199.exe
                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-62199.exe
                                                          7⤵
                                                            PID:904
                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-31673.exe
                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-31673.exe
                                                        5⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:808
                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-387.exe
                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-387.exe
                                                          6⤵
                                                          • Executes dropped EXE
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:2600
                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-53839.exe
                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-53839.exe
                                                            7⤵
                                                              PID:2068
                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 2600 -s 216
                                                              7⤵
                                                              • Program crash
                                                              PID:2324
                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-57792.exe
                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-57792.exe
                                                        4⤵
                                                        • Executes dropped EXE
                                                        • Loads dropped DLL
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:2788
                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-62914.exe
                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-62914.exe
                                                          5⤵
                                                          • Executes dropped EXE
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:2156
                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-16724.exe
                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-16724.exe
                                                            6⤵
                                                            • Executes dropped EXE
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:2456
                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-13703.exe
                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-13703.exe
                                                              7⤵
                                                              • Executes dropped EXE
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:2528
                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-26242.exe
                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-26242.exe
                                                                8⤵
                                                                  PID:2712
                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-60855.exe
                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-60855.exe
                                                                    9⤵
                                                                      PID:2480
                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-3433.exe
                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-3433.exe
                                                                6⤵
                                                                • Executes dropped EXE
                                                                • Suspicious use of SetWindowsHookEx
                                                                PID:588
                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-1576.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-1576.exe
                                                                  7⤵
                                                                  • Executes dropped EXE
                                                                  • Suspicious use of SetWindowsHookEx
                                                                  PID:1576
                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-4446.exe
                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-4446.exe
                                                                    8⤵
                                                                      PID:2784
                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-44715.exe
                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-44715.exe
                                                                5⤵
                                                                • Executes dropped EXE
                                                                • Suspicious use of SetWindowsHookEx
                                                                PID:2888
                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-52111.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-52111.exe
                                                                  6⤵
                                                                    PID:1428
                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-5975.exe
                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-5975.exe
                                                            2⤵
                                                            • Executes dropped EXE
                                                            • Loads dropped DLL
                                                            • Suspicious use of SetWindowsHookEx
                                                            • Suspicious use of WriteProcessMemory
                                                            PID:2568
                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-13801.exe
                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-13801.exe
                                                              3⤵
                                                              • Executes dropped EXE
                                                              • Loads dropped DLL
                                                              • Suspicious use of SetWindowsHookEx
                                                              • Suspicious use of WriteProcessMemory
                                                              PID:2608
                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-23911.exe
                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-23911.exe
                                                                4⤵
                                                                • Executes dropped EXE
                                                                • Loads dropped DLL
                                                                • Suspicious use of SetWindowsHookEx
                                                                • Suspicious use of WriteProcessMemory
                                                                PID:2192
                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-28457.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-28457.exe
                                                                  5⤵
                                                                  • Executes dropped EXE
                                                                  • Loads dropped DLL
                                                                  • Suspicious use of SetWindowsHookEx
                                                                  PID:2884
                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-60091.exe
                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-60091.exe
                                                                    6⤵
                                                                    • Executes dropped EXE
                                                                    • Suspicious use of SetWindowsHookEx
                                                                    PID:1220
                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-41503.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-41503.exe
                                                                      7⤵
                                                                      • Executes dropped EXE
                                                                      • Suspicious use of SetWindowsHookEx
                                                                      PID:2384
                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-19658.exe
                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-19658.exe
                                                                        8⤵
                                                                        • Executes dropped EXE
                                                                        • Suspicious use of SetWindowsHookEx
                                                                        PID:2624
                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-31774.exe
                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-31774.exe
                                                                          9⤵
                                                                            PID:2484
                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-54310.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-54310.exe
                                                                      6⤵
                                                                      • Executes dropped EXE
                                                                      • Suspicious use of SetWindowsHookEx
                                                                      PID:2344
                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-48110.exe
                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-48110.exe
                                                                        7⤵
                                                                          PID:1496
                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-51409.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-51409.exe
                                                                      5⤵
                                                                      • Executes dropped EXE
                                                                      • Suspicious use of SetWindowsHookEx
                                                                      PID:1596
                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-41695.exe
                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-41695.exe
                                                                        6⤵
                                                                        • Executes dropped EXE
                                                                        • Suspicious use of SetWindowsHookEx
                                                                        PID:2164
                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-51151.exe
                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-51151.exe
                                                                          7⤵
                                                                            PID:2756
                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-42952.exe
                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-42952.exe
                                                                              8⤵
                                                                                PID:2424
                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-38654.exe
                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-38654.exe
                                                                              7⤵
                                                                                PID:940
                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-49432.exe
                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-49432.exe
                                                                          4⤵
                                                                          • Executes dropped EXE
                                                                          • Loads dropped DLL
                                                                          • Suspicious use of SetWindowsHookEx
                                                                          PID:1420
                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-55130.exe
                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-55130.exe
                                                                            5⤵
                                                                            • Executes dropped EXE
                                                                            • Suspicious use of SetWindowsHookEx
                                                                            PID:1232
                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-41503.exe
                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-41503.exe
                                                                              6⤵
                                                                              • Executes dropped EXE
                                                                              PID:2188
                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-22021.exe
                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-22021.exe
                                                                            5⤵
                                                                            • Executes dropped EXE
                                                                            • Suspicious use of SetWindowsHookEx
                                                                            PID:1216
                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-5069.exe
                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-5069.exe
                                                                              6⤵
                                                                                PID:844
                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-37786.exe
                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-37786.exe
                                                                          3⤵
                                                                          • Executes dropped EXE
                                                                          • Loads dropped DLL
                                                                          • Suspicious use of SetWindowsHookEx
                                                                          PID:1548
                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-61129.exe
                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-61129.exe
                                                                            4⤵
                                                                            • Executes dropped EXE
                                                                            • Loads dropped DLL
                                                                            • Suspicious use of SetWindowsHookEx
                                                                            PID:332
                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-30242.exe
                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-30242.exe
                                                                              5⤵
                                                                              • Executes dropped EXE
                                                                              • Suspicious use of SetWindowsHookEx
                                                                              PID:2324
                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-33527.exe
                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-33527.exe
                                                                                6⤵
                                                                                • Executes dropped EXE
                                                                                • Suspicious use of SetWindowsHookEx
                                                                                PID:1028
                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-62531.exe
                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-62531.exe
                                                                                  7⤵
                                                                                  • Executes dropped EXE
                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                  PID:2588
                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-12998.exe
                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-12998.exe
                                                                                    8⤵
                                                                                      PID:2408
                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-62608.exe
                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-62608.exe
                                                                                5⤵
                                                                                • Executes dropped EXE
                                                                                • Suspicious use of SetWindowsHookEx
                                                                                PID:1044
                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-28375.exe
                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-28375.exe
                                                                                  6⤵
                                                                                    PID:2432
                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-43432.exe
                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-43432.exe
                                                                                4⤵
                                                                                • Executes dropped EXE
                                                                                • Suspicious use of SetWindowsHookEx
                                                                                PID:740
                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-53703.exe
                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-53703.exe
                                                                                  5⤵
                                                                                  • Executes dropped EXE
                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                  PID:2496
                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-53180.exe
                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-53180.exe
                                                                                    6⤵
                                                                                      PID:2192
                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-42952.exe
                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-42952.exe
                                                                                        7⤵
                                                                                          PID:932
                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-23086.exe
                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-23086.exe
                                                                                        6⤵
                                                                                          PID:2716

                                                                              Network

                                                                              MITRE ATT&CK Matrix

                                                                              Replay Monitor

                                                                              Loading Replay Monitor...

                                                                              Downloads

                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-10610.exe

                                                                                Filesize

                                                                                184KB

                                                                                MD5

                                                                                32ef947c2548ecb6eebfe7cee193707b

                                                                                SHA1

                                                                                41e1e84f4a1edffe8b2489e097958ce1daf9ddab

                                                                                SHA256

                                                                                943c8f1743af8760915742c41fdf57a50695599622f0d54409ae53871faa4e03

                                                                                SHA512

                                                                                67bc8af40b86312afc30952d4397f6a82ac61538814fcbd33ff36e875ebc8368c4f143d9424ee5d2a7fb0c521620137881e123d9566794d4f1cb820c903c6088

                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-13801.exe

                                                                                Filesize

                                                                                184KB

                                                                                MD5

                                                                                f3e01080158af1b7289fa57839cf8833

                                                                                SHA1

                                                                                d6186f054f170df0b8743ade8d016a6b566ea83c

                                                                                SHA256

                                                                                b60a73f550bb4b69364091ae3ed949e4171c55e5230ffd588c8cbb31ffb69df2

                                                                                SHA512

                                                                                4147157f95e1c798fded1797481ee8f853138b433d61051b7e8a61336618de8189c200a7c2721eb11fd0f234ee4d41da5a503882b9e09fed017e167035243e22

                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-28457.exe

                                                                                Filesize

                                                                                184KB

                                                                                MD5

                                                                                3c27bc0c47766ce4e6b082fd85cd848a

                                                                                SHA1

                                                                                e1a4f0af4b1b6090139ea1dced19567d701d69c9

                                                                                SHA256

                                                                                5186b28a4d903272b4b88871afa49acf7fc0914624da2b8b6944c157f6c6b814

                                                                                SHA512

                                                                                8a2644823fc9c4e8e19057fd4b63bf2063142b1f623e5f6fdec08c531cd17deb3e56754e9b41f439a15276cccc6ae9fb6001bf8c69fd5ec6edab442a910c3c66

                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-47185.exe

                                                                                Filesize

                                                                                184KB

                                                                                MD5

                                                                                46c65e56f219798492e1b07ff16cd94f

                                                                                SHA1

                                                                                a46bc6817007b6afb38e8409ea9dc3d751641472

                                                                                SHA256

                                                                                faa60137fdfdd5e5d3024590176495c880317e0bf52e95806014c4ac4fc877cb

                                                                                SHA512

                                                                                78b7f5a0f5830deeb6b6a5c46f2dc6734b4849f627bf9b2da4134d723fc6cce4eaa21938e88d9c55920cd82d514dd05904ca39333b8b980ea6d07ce90ea9edcd

                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-475.exe

                                                                                Filesize

                                                                                184KB

                                                                                MD5

                                                                                3619a0170a121493939e9a7452a4eb7c

                                                                                SHA1

                                                                                c187f63a104a965aac71820ffe9e6fd5b2afd3db

                                                                                SHA256

                                                                                fcb174c2cccfbaf2189cfe2751bf530bdab1b841038c3a091ce9ab7de12c65b7

                                                                                SHA512

                                                                                524a254a8102d98cfdaf8cefdb4f5d3845a186dd27bcc9ddf3f42d0a092a550307856cecd218d4da7af2f5a369d5cfb9ece4e550793133789f96bad785d620e0

                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-5975.exe

                                                                                Filesize

                                                                                184KB

                                                                                MD5

                                                                                c002d48b3e97c745b28663914ab9f42b

                                                                                SHA1

                                                                                bbeea3ac3daf3fb056b1453463f331e3d2cbd67a

                                                                                SHA256

                                                                                f2eb33ed088079e78ff5a5294aae5d242377a0fa613c1ba96b8c2cfc7040fec9

                                                                                SHA512

                                                                                71006673bd1483d70e9cb6b0a0651cca9b59164f37537d5f73d7fd79dddcb76308cbbc8328171f724ad4070ada1d26208df0607da1e87a293b2bcc1c87006f9d

                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-63137.exe

                                                                                Filesize

                                                                                184KB

                                                                                MD5

                                                                                c99254a4f53d4f9238b88190cef03d31

                                                                                SHA1

                                                                                4c5fbeee4217b81266722a50488cfb5c94fd0430

                                                                                SHA256

                                                                                25a2c09014c8f35ccf7c36256afe209e81782ee6765c44f80e5c4644efacec39

                                                                                SHA512

                                                                                1c80df5f358a7b5cb2a0c53ca6d430cb04a66e08db987937509108f44bde5754d818d9f61de9137814d1a730752624e12f0e331fabcfa5c185485fc5a1a5e8f5

                                                                              • \Users\Admin\AppData\Local\Temp\Unicorn-1336.exe

                                                                                Filesize

                                                                                184KB

                                                                                MD5

                                                                                e36a4875214df2c24665ae138ffb27e1

                                                                                SHA1

                                                                                05a944c94fdcafe2b547f97682650fbbb3b7186a

                                                                                SHA256

                                                                                9864a709291039bc70beb7f944f9fbe7baee86de9f18b88a609f2e5c7a577ea4

                                                                                SHA512

                                                                                c7be1d921d9567ee4be12220a1bf93a8f4c6d23be8e4e6a1c31c718993c34277430951703af6b3bdc55ab92abe74fa4587e89638152dc1d71144fa76e7e7c9a1

                                                                              • \Users\Admin\AppData\Local\Temp\Unicorn-2104.exe

                                                                                Filesize

                                                                                184KB

                                                                                MD5

                                                                                f44046133f7e34acaf8d803f936e0485

                                                                                SHA1

                                                                                11bc6eed84951c08fa179682bd94e3d87927dfa3

                                                                                SHA256

                                                                                441d92a61c867fdbf294f1c21eaace5adcec0ce00748003835cec886f93d9540

                                                                                SHA512

                                                                                68536a613088c142d1e3510698d9ae6cc5e545bf016c44f4b59fee6691ea91623cda05b61aa302bc9d0679f1f54616913bc2e52ec6d87a993dcd5e0ef627ebf7

                                                                              • \Users\Admin\AppData\Local\Temp\Unicorn-23911.exe

                                                                                Filesize

                                                                                184KB

                                                                                MD5

                                                                                c7a4a1e75979963b09843f5eab4773b1

                                                                                SHA1

                                                                                66f2f62d9203f8dc67d47020197f7d52f6d663ea

                                                                                SHA256

                                                                                9fdecd6ca9c7e5b0b7ed0ec817fbf7ffe73eae1ceb55e959b655ab0f8fd561d4

                                                                                SHA512

                                                                                bc7b348f9dd9aa51592e691e281db0fc1b2af0c6c8f2ba133969d484688474cb4f2c1ded651d6ec1c478d5b09ac04707e6da5bcf6cb909748a91f65227f26cf1

                                                                              • \Users\Admin\AppData\Local\Temp\Unicorn-26518.exe

                                                                                Filesize

                                                                                184KB

                                                                                MD5

                                                                                4c92d8763d598b34e73b878012b722ae

                                                                                SHA1

                                                                                4ff3d66ac41d4bc5927aea62b0dff7cb2e4debbd

                                                                                SHA256

                                                                                de60c68f349167a52091401b37f177e0be27993ad425488ab546a284279238fe

                                                                                SHA512

                                                                                59dfa2daaff9c42a2600a8df0fb848ca50d57f8fbb36a2e2b0fe65ee38f60b1b6c28722ccf1e53655dd176de4460c4265128b541698804cd851f05329244849c

                                                                              • \Users\Admin\AppData\Local\Temp\Unicorn-37786.exe

                                                                                Filesize

                                                                                184KB

                                                                                MD5

                                                                                54f488bb3e9c8dab41e7831770069749

                                                                                SHA1

                                                                                df65145ec811b2caf3d080c5dd577ed8fcef9ff4

                                                                                SHA256

                                                                                bd63f80d56fd79a50d6eb3b8ce3c64d8c2a832c723fe1540e8f59e79ce1cb1c0

                                                                                SHA512

                                                                                c21f097601a62608afdfb5f0ea86aa7165b7e16bb2695a7edd130b208dd315dbd4109eec8b7bf7fcfbe705a6b4221ccc906682917cab20a7824ad6832b45e54c

                                                                              • \Users\Admin\AppData\Local\Temp\Unicorn-44793.exe

                                                                                Filesize

                                                                                184KB

                                                                                MD5

                                                                                2fb49a5fe416e9667d20206abc8589f5

                                                                                SHA1

                                                                                ae4e195dbef9987826ad4f997ad5f603f102a342

                                                                                SHA256

                                                                                0681990fa04a495d1757f40c20ba4df25ca09d4656ef61e871564ac0211f2b44

                                                                                SHA512

                                                                                894f27657fd03cdf5729232ad7b43dd82ea73eb0e59c7953bd1bed93ac1898f0657aed06f3d9f48ec2559f27e91626d4618de791107c7491f4a37d2f729654ab

                                                                              • \Users\Admin\AppData\Local\Temp\Unicorn-46666.exe

                                                                                Filesize

                                                                                184KB

                                                                                MD5

                                                                                ecfa50aeba4e489d1fc09544e0e80666

                                                                                SHA1

                                                                                abb5adc5528721e840459c5a6d4e8b748677cfd8

                                                                                SHA256

                                                                                1e784f61ab0e30258c124b6c1bdf2365ef389748cf64cb12f91951d091aa1cd3

                                                                                SHA512

                                                                                b390360cd75cdb3c059ca8ff5b151edda1f43ac83b80ff1fc5c5b603711a82b88b20fc4881bf91f8ca020d2f9d0e82c7b14a74a90379e7a1508a35a3a1d96345

                                                                              • \Users\Admin\AppData\Local\Temp\Unicorn-49432.exe

                                                                                Filesize

                                                                                184KB

                                                                                MD5

                                                                                2f7c851b979e24b62846c8ee58f8313d

                                                                                SHA1

                                                                                9594442402509828e345e517e07471223344506b

                                                                                SHA256

                                                                                a3bce764b47c0d2553198301007cb1484d15348beaf05c73a7d34eedc0134a6c

                                                                                SHA512

                                                                                4134ab29044f5fcb8968904eedf81add5a44c762df661e78a8c844d694e0cc7e5011a541a35dff5b7b60e1af40aae30660de369063b2f8e879a42061274f9b2d

                                                                              • \Users\Admin\AppData\Local\Temp\Unicorn-54315.exe

                                                                                Filesize

                                                                                184KB

                                                                                MD5

                                                                                a5e274aea0cbcdd4dd67f6bfc1408584

                                                                                SHA1

                                                                                b41c8210fa950e50bbd79fc9bac58c30a379b97b

                                                                                SHA256

                                                                                f5967e6770e10d35416944cfd23bbeb44f2104cb22253a8c6f24bc078c06a187

                                                                                SHA512

                                                                                720b5a856c4b49867441973dd3cc9aba7dc296aec0ebb32b8a4303c940efb51abf7ad55bf76aea230af63ac821add01029660d50989ec83df4b9a321742920a2

                                                                              • \Users\Admin\AppData\Local\Temp\Unicorn-57792.exe

                                                                                Filesize

                                                                                184KB

                                                                                MD5

                                                                                b015adcf2cbf9d330fbb055b2f6fa101

                                                                                SHA1

                                                                                9c492269c48b87a87bc219fdde027c4e22009fc5

                                                                                SHA256

                                                                                2cdc5cabfbb586edb462fffc7193b98566806302c0a725b25d8df12633b4c31d

                                                                                SHA512

                                                                                ec0b89150a02ba6caeeef0069ff4863dadaec341c87fd86a1690d63cb3f9dba4a9dc564aa84a3024f7cbe3b907abde7cd9c99d73e2fc232f3921e11fd0b55216

                                                                              • \Users\Admin\AppData\Local\Temp\Unicorn-59608.exe

                                                                                Filesize

                                                                                184KB

                                                                                MD5

                                                                                f413c0e961e2bd208e5a2579642ea961

                                                                                SHA1

                                                                                dd4383d1ca10f1468021c7f1109b2615a5d163a3

                                                                                SHA256

                                                                                0678960fc556dea23d85031f00c127a349cfbe3e0777fd0b694f436ac5f3b088

                                                                                SHA512

                                                                                8717eed6184f0cf4b60bf4587f2e37633a9f347cabc59775aa7128b2293dc5f005bac3e7485f9e2a7289bc16d3a63adc3ba50fe61450d747d39d94134a563677

                                                                              • \Users\Admin\AppData\Local\Temp\Unicorn-8451.exe

                                                                                Filesize

                                                                                184KB

                                                                                MD5

                                                                                b58a9c7b0b9501733ea9833cb114a5f7

                                                                                SHA1

                                                                                1abe645fdc97ec22462acac011cceb42c7fb5488

                                                                                SHA256

                                                                                c8b22c5cc21a5544fd097bdcde7176e8d68311becdd5bc65a5341e9a72ed055b

                                                                                SHA512

                                                                                1dda11a97f7aa6423a2ef63764b3764b4e2f7eae276af3faec833f6b432c132cc139393fbb86e106101fd52eb5cf403ab435d15eeb3c4cea75b1cd7bd44fbde9