Analysis

  • max time kernel
    150s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    15/01/2024, 04:01

General

  • Target

    5c1493526eabcec4f649126b4bcc97e1.exe

  • Size

    184KB

  • MD5

    5c1493526eabcec4f649126b4bcc97e1

  • SHA1

    0e69238c4d4e4034fdd67913de2642553ef337c4

  • SHA256

    5132a0f9773476815e7f708ffce54f5e36e0d9f7b6a2bdcecf93b74845dfc708

  • SHA512

    0b17868768a9244edbf1e82b713ad60f1cc0e222edebc5ee31de46413bc4cb2ffe578d52d3157cfc7202ad71a6d0528416421caf0435076070c2fa438d95b436

  • SSDEEP

    3072:NoIYom8H0DA8oOjydU54S8FbKZi601xi0D4xXfPObNlPvpFE:NoDow88oNd44S8Xkf0NlPvpF

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 64 IoCs
  • Loads dropped DLL 64 IoCs
  • Program crash 1 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\5c1493526eabcec4f649126b4bcc97e1.exe
    "C:\Users\Admin\AppData\Local\Temp\5c1493526eabcec4f649126b4bcc97e1.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2088
    • C:\Users\Admin\AppData\Local\Temp\Unicorn-28295.exe
      C:\Users\Admin\AppData\Local\Temp\Unicorn-28295.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1316
      • C:\Users\Admin\AppData\Local\Temp\Unicorn-23578.exe
        C:\Users\Admin\AppData\Local\Temp\Unicorn-23578.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2424
        • C:\Users\Admin\AppData\Local\Temp\Unicorn-22089.exe
          C:\Users\Admin\AppData\Local\Temp\Unicorn-22089.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2748
          • C:\Users\Admin\AppData\Local\Temp\Unicorn-15220.exe
            C:\Users\Admin\AppData\Local\Temp\Unicorn-15220.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2332
            • C:\Users\Admin\AppData\Local\Temp\Unicorn-38371.exe
              C:\Users\Admin\AppData\Local\Temp\Unicorn-38371.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              PID:2004
              • C:\Users\Admin\AppData\Local\Temp\Unicorn-33846.exe
                C:\Users\Admin\AppData\Local\Temp\Unicorn-33846.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:444
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-62533.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-62533.exe
                  8⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:2160
              • C:\Users\Admin\AppData\Local\Temp\Unicorn-25755.exe
                C:\Users\Admin\AppData\Local\Temp\Unicorn-25755.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:2728
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-29999.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-29999.exe
                  8⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:2312
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-42184.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-42184.exe
                    9⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:2500
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-24965.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-24965.exe
                      10⤵
                        PID:1492
              • C:\Users\Admin\AppData\Local\Temp\Unicorn-63181.exe
                C:\Users\Admin\AppData\Local\Temp\Unicorn-63181.exe
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:2404
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-12948.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-12948.exe
                  7⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:2948
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-41410.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-41410.exe
                    8⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:1568
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-14687.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-14687.exe
                      9⤵
                        PID:1332
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-59144.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-59144.exe
                          10⤵
                            PID:2784
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-34432.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-34432.exe
                        8⤵
                          PID:1788
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-1593.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-1593.exe
                    5⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of SetWindowsHookEx
                    PID:864
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-48921.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-48921.exe
                      6⤵
                      • Executes dropped EXE
                      • Suspicious use of SetWindowsHookEx
                      PID:2464
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-48117.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-48117.exe
                        7⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:1716
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-31815.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-31815.exe
                          8⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:1828
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-14552.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-14552.exe
                            9⤵
                              PID:1720
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-58771.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-58771.exe
                            8⤵
                              PID:1592
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-22714.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-22714.exe
                          6⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:1712
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-7585.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-7585.exe
                            7⤵
                            • Executes dropped EXE
                            PID:2544
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-55739.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-55739.exe
                      4⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Suspicious use of SetWindowsHookEx
                      • Suspicious use of WriteProcessMemory
                      PID:2480
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-37795.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-37795.exe
                        5⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Suspicious use of SetWindowsHookEx
                        PID:1656
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-597.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-597.exe
                          6⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:1788
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-15637.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-15637.exe
                            7⤵
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            PID:2812
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-62115.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-62115.exe
                              8⤵
                              • Executes dropped EXE
                              • Suspicious use of SetWindowsHookEx
                              PID:2572
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-9889.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-9889.exe
                                9⤵
                                  PID:2736
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-44972.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-44972.exe
                            6⤵
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            PID:2816
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-62605.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-62605.exe
                          5⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:2520
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-31397.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-31397.exe
                            6⤵
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            PID:2776
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-48245.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-48245.exe
                              7⤵
                              • Executes dropped EXE
                              • Suspicious use of SetWindowsHookEx
                              PID:2376
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-46848.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-46848.exe
                                8⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                PID:2556
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-59474.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-59474.exe
                                  9⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetWindowsHookEx
                                  PID:108
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-30448.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-30448.exe
                                    10⤵
                                      PID:3044
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-18751.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-18751.exe
                        3⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Suspicious use of SetWindowsHookEx
                        • Suspicious use of WriteProcessMemory
                        PID:2608
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-42164.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-42164.exe
                          4⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Suspicious use of SetWindowsHookEx
                          PID:1692
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-53939.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-53939.exe
                            5⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Suspicious use of SetWindowsHookEx
                            PID:1312
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-22025.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-22025.exe
                              6⤵
                              • Executes dropped EXE
                              • Suspicious use of SetWindowsHookEx
                              PID:1156
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-48823.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-48823.exe
                                7⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                PID:2644
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-41301.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-41301.exe
                                  8⤵
                                    PID:1152
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-9289.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-9289.exe
                                      9⤵
                                        PID:3032
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-28957.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-28957.exe
                                  6⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetWindowsHookEx
                                  PID:2016
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-61150.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-61150.exe
                                    7⤵
                                    • Executes dropped EXE
                                    • Suspicious use of SetWindowsHookEx
                                    PID:2072
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-47225.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-47225.exe
                                      8⤵
                                        PID:2164
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-62654.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-62654.exe
                                          9⤵
                                            PID:2624
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-56814.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-56814.exe
                                              10⤵
                                                PID:1540
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-1583.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-1583.exe
                                      5⤵
                                      • Executes dropped EXE
                                      • Suspicious use of SetWindowsHookEx
                                      PID:3048
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-48823.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-48823.exe
                                        6⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetWindowsHookEx
                                        PID:328
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-41410.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-41410.exe
                                          7⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetWindowsHookEx
                                          PID:1704
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-14552.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-14552.exe
                                            8⤵
                                              PID:1036
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-9461.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-9461.exe
                                            7⤵
                                              PID:2976
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-53617.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-53617.exe
                                        4⤵
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        • Suspicious use of SetWindowsHookEx
                                        PID:996
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-21449.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-21449.exe
                                          5⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetWindowsHookEx
                                          PID:3044
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-48823.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-48823.exe
                                            6⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetWindowsHookEx
                                            PID:1700
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-28957.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-28957.exe
                                          5⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetWindowsHookEx
                                          PID:1724
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-64756.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-64756.exe
                                            6⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetWindowsHookEx
                                            PID:2596
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-9588.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-9588.exe
                                              7⤵
                                                PID:1580
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-33561.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-33561.exe
                                      2⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Suspicious use of SetWindowsHookEx
                                      • Suspicious use of WriteProcessMemory
                                      PID:2844
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-23350.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-23350.exe
                                        3⤵
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        • Suspicious use of SetWindowsHookEx
                                        • Suspicious use of WriteProcessMemory
                                        PID:2180
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-9491.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-9491.exe
                                          4⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          • Suspicious use of SetWindowsHookEx
                                          • Suspicious use of WriteProcessMemory
                                          PID:2168
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-21075.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-21075.exe
                                            5⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            • Suspicious use of SetWindowsHookEx
                                            PID:2924
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-23478.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-23478.exe
                                              6⤵
                                              • Executes dropped EXE
                                              • Suspicious use of SetWindowsHookEx
                                              PID:2380
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-48823.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-48823.exe
                                                7⤵
                                                • Executes dropped EXE
                                                • Suspicious use of SetWindowsHookEx
                                                PID:2008
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-24990.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-24990.exe
                                                  8⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:408
                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-8545.exe
                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-8545.exe
                                                    9⤵
                                                    • Executes dropped EXE
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:1444
                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-14552.exe
                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-14552.exe
                                                      10⤵
                                                        PID:1348
                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-32720.exe
                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-32720.exe
                                                          11⤵
                                                            PID:2764
                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-43202.exe
                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-43202.exe
                                                        9⤵
                                                          PID:2212
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-19071.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-19071.exe
                                                  5⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:2256
                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-26418.exe
                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-26418.exe
                                                    6⤵
                                                      PID:652
                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-29253.exe
                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-29253.exe
                                                        7⤵
                                                          PID:704
                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-34073.exe
                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-34073.exe
                                                    4⤵
                                                    • Executes dropped EXE
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:2284
                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 2284 -s 240
                                                      5⤵
                                                      • Loads dropped DLL
                                                      • Program crash
                                                      PID:1384
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-21613.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-21613.exe
                                                  3⤵
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  • Suspicious use of SetWindowsHookEx
                                                  • Suspicious use of WriteProcessMemory
                                                  PID:1824
                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-8329.exe
                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-8329.exe
                                                    4⤵
                                                    • Executes dropped EXE
                                                    • Loads dropped DLL
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:2288
                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-39321.exe
                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-39321.exe
                                                      5⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:108
                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-42964.exe
                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-42964.exe
                                                        6⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:2580
                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-47909.exe
                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-47909.exe
                                                          7⤵
                                                          • Executes dropped EXE
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:1784
                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-25733.exe
                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-25733.exe
                                                            8⤵
                                                              PID:1076
                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-15891.exe
                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-15891.exe
                                                                9⤵
                                                                  PID:1636
                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-38474.exe
                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-38474.exe
                                                          5⤵
                                                          • Executes dropped EXE
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:1052
                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-27824.exe
                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-27824.exe
                                                            6⤵
                                                            • Executes dropped EXE
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:2588
                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-58213.exe
                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-58213.exe
                                                              7⤵
                                                                PID:2960
                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-1967.exe
                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-1967.exe
                                                          4⤵
                                                          • Executes dropped EXE
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:1688
                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-42004.exe
                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-42004.exe
                                                            5⤵
                                                            • Executes dropped EXE
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:2788

                                                  Network

                                                        MITRE ATT&CK Matrix

                                                        Replay Monitor

                                                        Loading Replay Monitor...

                                                        Downloads

                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-21075.exe

                                                          Filesize

                                                          62KB

                                                          MD5

                                                          508fadda3beb814cb0c0d9ed18c7dc91

                                                          SHA1

                                                          0e0c2cdd6e96db6078f6daee515f4a98710104ab

                                                          SHA256

                                                          9cb7e36ba6326d09e5da9f9197ce65c493b01c1954de06964252fd907b6eecd9

                                                          SHA512

                                                          ddeb6e27e36749dad096477143c2dc6d4e0140bc74e36b2caf91c1d25419a4035f2ee19bef7556675e33088b542a863b370a2b614cc2ef1b084215690a0323b7

                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-21613.exe

                                                          Filesize

                                                          184KB

                                                          MD5

                                                          fd6dcfa33c8fa375a886ab053768b8f1

                                                          SHA1

                                                          34cf410484e4a99b959cdb67baab4684075f75f2

                                                          SHA256

                                                          d765e8ae9c99f212d64670fa9d604555fc66da115327e15834e7b9082be6b438

                                                          SHA512

                                                          28705f1548923de6841a6590af8498fad713483c2893d19046b0cebeb3296d71e575caf0c838321aea3f86bbfc6a8553ff19c28e1b3e6df71cff4ddca950d588

                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-23350.exe

                                                          Filesize

                                                          184KB

                                                          MD5

                                                          56b17bdf03da0ba377bcbdafef85f3ea

                                                          SHA1

                                                          f8d7c2a9a215619e5fb1f0a940f1c1eb31f8c401

                                                          SHA256

                                                          afcffdb8079f9e3c1f37e0fb74a29ca172606251b2f15c8110964874d239fe96

                                                          SHA512

                                                          2b99fb9105822decdf442e87663098c4e6774388571b4e6ff12578819bb8d4d84ef0af170b626c103c6405c9f7505d00ebac5104c8aa300cf2499378fc5c0000

                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-28295.exe

                                                          Filesize

                                                          82KB

                                                          MD5

                                                          22507c9f1cafac2203bc3d540471e4b1

                                                          SHA1

                                                          bcb3d25526478aaea28a41c6deaa3f7ed1a992ae

                                                          SHA256

                                                          18c0031d260953973061230957b389550846b016f6593e1331cb5c81f4658708

                                                          SHA512

                                                          e2e06f32ac7036ef3de5f3f2b2245e885cf84aa2298d68165da294a2e5e008a63b3dcf05070bb92932999fc7db9b9b3ce772dab4b71d6112dd84f538f6d49a57

                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-34073.exe

                                                          Filesize

                                                          89KB

                                                          MD5

                                                          3bcc9c4fff4ef5f255871eb7ec26298f

                                                          SHA1

                                                          feffac11170979701128d5ce038a9de1c2c01c84

                                                          SHA256

                                                          a7f954faad3927f940385decf4d5d7897fd27843e211f1b9c7757c3a5cf7b1c5

                                                          SHA512

                                                          5eac4277137de8d2d68c79fa70d498c2d4e9e4a7b7974fed957bc886a45da59eebfe58e1c727a097743aa7756551bd76e1075cddf0b1f7ee77a246bb61dcb6ea

                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-37795.exe

                                                          Filesize

                                                          143KB

                                                          MD5

                                                          936c5855789e399cfa2936c5f5aec4ca

                                                          SHA1

                                                          ab1c1784ea16222867b2ee86349a006bdde57eab

                                                          SHA256

                                                          b1ca4d49eabdfaf9418d7e78eab4bc1d159c731c81e081c671cdd874c1c9fa04

                                                          SHA512

                                                          89b98ca4afc80f7664ca524361d6f650575e9845f1decb4bed41dde7cbab3c33f18f13c25aa88a88e7661fc87c4c500894909859682163ac49e0b3a50a4b6362

                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-42164.exe

                                                          Filesize

                                                          64KB

                                                          MD5

                                                          531c967b442782fae8ebd33877d0cbcb

                                                          SHA1

                                                          73c28a444124fcb94826692a010fbb1303823e25

                                                          SHA256

                                                          880e4f4faf3b9fa7af226f7191c49e19b0e2c3f8c570e728ffc496ae61fdb0f0

                                                          SHA512

                                                          18fd65f231a4c17e46868709d8a99e299d2e17b8a7e00e3cc86af77305f195d8004befc0516781af4d098320947d98f290b5fc5faa9a0bac4fa657af54f89a05

                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-55739.exe

                                                          Filesize

                                                          184KB

                                                          MD5

                                                          a303dfd0beab9a1c137cf75391e231f9

                                                          SHA1

                                                          b97e331b7b111dc06cc226b4ee81c152a6a516c0

                                                          SHA256

                                                          a20315dfdc3e85ec2f61c27ac90c420da2e4958645183837c89885416d1c134f

                                                          SHA512

                                                          bdb79f432c436acb4c6128d68db6bfbd4394d4bd3444cf8279700da290663e6deac4645e0ed1c37c09ed96c00cb65df87d29090f85cbd4b0b230800c947dc5d8

                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-8329.exe

                                                          Filesize

                                                          105KB

                                                          MD5

                                                          d58ce6d108ff28c136a0cb4c4c05aebe

                                                          SHA1

                                                          e247245760f5d1d61c42f2190f5221a5f70dd778

                                                          SHA256

                                                          5e9ff2a8042d5f8982ba9b5883ccb5aa26da38a96e449481058266aee91cc14b

                                                          SHA512

                                                          c1d6ee4aee37383ee43cc9ca3ca5be3bbb22bc2cc294133c483cdd1709802a347a895a3c921060256208a70d67affe21be2c5349cde2a8689d20ba1b6974a05b

                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-9491.exe

                                                          Filesize

                                                          184KB

                                                          MD5

                                                          b37528d153ddb87760de12583160d2e4

                                                          SHA1

                                                          d3c59012fe6faad0a9747518ebedc62377314fa1

                                                          SHA256

                                                          760c5e196f963047930a4533b20af6c3f2a00709374a88f4e1f1f90f15bafd53

                                                          SHA512

                                                          30635e7720461281a5bbdc974ab17b6f211ff1e92b0fd4897236917be550141fa8a2eba967ef3a2a5ea665ef737bfc31d92744c2e027528c5352566f90c953e2

                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-9491.exe

                                                          Filesize

                                                          144KB

                                                          MD5

                                                          a28e482654355f13bf86e1c690f068c7

                                                          SHA1

                                                          9588dff31d3a8c59843b236163c036c285b9c515

                                                          SHA256

                                                          fddae276837699d686b89e6c51833f3f1b48aa0b019dbb68906da8d8162ff7e3

                                                          SHA512

                                                          2eb8645c33053d0a716bef58ce1b046170beea1dbbc0411583a88a30a3e60c8bfbd1faacad31ad3b33151575a51bfd661b9ca9dec7b8107b2ab9619439d984f4

                                                        • \Users\Admin\AppData\Local\Temp\Unicorn-15220.exe

                                                          Filesize

                                                          184KB

                                                          MD5

                                                          1958456b7132c18c2f81000312e6824b

                                                          SHA1

                                                          d298749347b4da82a253093bf38de6eec643081f

                                                          SHA256

                                                          a6edfeff2d84a4a2112d690812668d854fba0e0e1ff5af9ef83bae4968d088ad

                                                          SHA512

                                                          08ca99e553e8a8c92c3c7e0dfcde7693aa0ac8a2b23e4d46c7c544bb5ff27707a94a78ed1aabde100f1028ba543bc13577d04f4d2c97b511a99b1ef424b3db7f

                                                        • \Users\Admin\AppData\Local\Temp\Unicorn-1593.exe

                                                          Filesize

                                                          184KB

                                                          MD5

                                                          cefcf3bb75cf48ae890efb2c82c47cb4

                                                          SHA1

                                                          68321363984b1c56f17759595ef071e8388b2b9e

                                                          SHA256

                                                          6fe562de420fb300396bfce1f2f5759305e50841026bf472a2b87c018baddb80

                                                          SHA512

                                                          001f843da8939e5a8974343d26a3f4456f8367c8471c1b3c206e9c4d078dfc1039feb3734e1c2e024ee8a29cb1045380d90108042fbe5e10f387c4ba23beeb76

                                                        • \Users\Admin\AppData\Local\Temp\Unicorn-18751.exe

                                                          Filesize

                                                          184KB

                                                          MD5

                                                          a1af2bd56fbee664e4aed26fe80854b8

                                                          SHA1

                                                          32403dc84f08d078216d668f4115f8cf72608501

                                                          SHA256

                                                          85cd7a29156b0ce31e1c9c7a1a829af44ccf1996eea07ef758af27cd4d7cb5cf

                                                          SHA512

                                                          5c48d82941c16beafc03b473512f1f0caf7ba87291ecf65c6714e1d1570c0e258c1be03e94c55d1b91ba08ea7b1e34a0fde6c5155b09b0cdcb42d8012629e2a6

                                                        • \Users\Admin\AppData\Local\Temp\Unicorn-21075.exe

                                                          Filesize

                                                          93KB

                                                          MD5

                                                          7a8de5e98af713cf022e750936f3a9f1

                                                          SHA1

                                                          da30e184220989115396d8e49dda38f5f09772d6

                                                          SHA256

                                                          9c28db63ee4ba7ce66d7880d9dae1d5b532ae41f94fc9e137522c79d9bc84b16

                                                          SHA512

                                                          08c15672edfb7e49eb0fe4cf671e6a991b54c60b024214209af34eddcd521798ff05f7f7153ed8eb96016388b4492bb6bf527048d1f210f7622e146d6e0537e5

                                                        • \Users\Admin\AppData\Local\Temp\Unicorn-21075.exe

                                                          Filesize

                                                          109KB

                                                          MD5

                                                          83692096cdc839cd892873c4ec377201

                                                          SHA1

                                                          f1be1a289ac3aee866d93b33c853abe4a1091cab

                                                          SHA256

                                                          259b1cfa2abf950a105ed1e0e916503f967841fa37139ba894d86ef84b15ac57

                                                          SHA512

                                                          ab3dba223071683eaa1d04dae7e4de15c72e4fb674a9bd8f3dfc52eba668907cf4db9453d5b69b211bea471a91e9429229524e37dba4e0cdd616189a5865025a

                                                        • \Users\Admin\AppData\Local\Temp\Unicorn-22089.exe

                                                          Filesize

                                                          184KB

                                                          MD5

                                                          76cf09bad991f67c3dfa6344db93093f

                                                          SHA1

                                                          f72abc15dce95c431cc082fd252165adb31e830e

                                                          SHA256

                                                          9909124d7ccebb2a7e4267e9dd1bdd545169da87b72f3ec79fe31d1bc15597c9

                                                          SHA512

                                                          e33652bb781c1b58f61827b37e1ba3579bfb549e75385bd5ed6e4d55cbbe87c9b53d1f5d005bd514278093c8b99d12657f30906c03d704ae92777d9508568c5f

                                                        • \Users\Admin\AppData\Local\Temp\Unicorn-23578.exe

                                                          Filesize

                                                          184KB

                                                          MD5

                                                          474149e29d0e1b520731fe32114865d7

                                                          SHA1

                                                          0bc37a43472737fc6cd331c3617ca0eaa55a3498

                                                          SHA256

                                                          7721beb992ca5cd1ef9d83a8ce1e95a331d19aea05d5df830c815255a875a36c

                                                          SHA512

                                                          3407191b296596243d9b90b312dc7d3e832a7a3d12dbfdd65dcf772d3dc20fd40305d97281c84f90fd3c8a78fbd0be6f394bc3e490a5d1111942f7928ac82c02

                                                        • \Users\Admin\AppData\Local\Temp\Unicorn-28295.exe

                                                          Filesize

                                                          184KB

                                                          MD5

                                                          37b1264c0b4aa7ea6bf9609157f07ac1

                                                          SHA1

                                                          a43aa19e1816a11578380ffe8ac174893dcd8d30

                                                          SHA256

                                                          704d86b10003328fa7baba0b4feb84827d555d07266788dc5d4b09b8a5514c03

                                                          SHA512

                                                          a8e7de66c0f3d8af93d0dafa716ed5d17419232beaded3c6fd781bc1af1c4e8750623958c45ddf1330b03d3d74d21b97422c8ae4ade7e238b63eb37fd0fbb131

                                                        • \Users\Admin\AppData\Local\Temp\Unicorn-33561.exe

                                                          Filesize

                                                          184KB

                                                          MD5

                                                          c918cd8f525034669af39fb15f12764a

                                                          SHA1

                                                          a7774ca8d9bb514ae239ba786241ec695543b760

                                                          SHA256

                                                          2b1067df8e21b523acc8b38733cb1df6574020a9c28a81d8f2c788a1801c1e66

                                                          SHA512

                                                          29cf2250e4f8dd5e4cf02241975f7c384ba0142020a722b80f0af52ccc7965be725537e3c44a0e6a20dbb36a4a6d501a9bdaed277c6b168b79a17987979e8af1

                                                        • \Users\Admin\AppData\Local\Temp\Unicorn-34073.exe

                                                          Filesize

                                                          81KB

                                                          MD5

                                                          d2bccb7606ae29c85799ba0468402bd4

                                                          SHA1

                                                          3cccea598f72237d2c97d6c2a48e704e8203e500

                                                          SHA256

                                                          daa74bbbc40adabaa8d3517e2e700b3b1258a924121e07db69b43bdb5f9fdc92

                                                          SHA512

                                                          771db50a282cfc9493a016a7da326da0a98a91a52efc02e1bfae8066e48d678ced0515e0d08c8a7d5ef70f73cd29162bd2ba443ea890fce1ddf2c0e1ae3b3c93

                                                        • \Users\Admin\AppData\Local\Temp\Unicorn-34073.exe

                                                          Filesize

                                                          41KB

                                                          MD5

                                                          07e9653698359f0061a07a52e396ef15

                                                          SHA1

                                                          29a61ddcd234ad90a34038b436e147300774294d

                                                          SHA256

                                                          ccd24cdc857f2c123fdaae4764dc1ce608f9db6b0ec62ebbf64d79d5c08c399f

                                                          SHA512

                                                          1aad3a5292f9ab71571125080efd32c880cf052f81a1aa92c7cd3cffb909b4c2579a93c2b56d7cbee6eece3b747bb9a0abcb06cd5d74a1e0861c4b3e7f3f4966

                                                        • \Users\Admin\AppData\Local\Temp\Unicorn-37795.exe

                                                          Filesize

                                                          69KB

                                                          MD5

                                                          1a0ece266b6f7aa7ae987d52f21303c6

                                                          SHA1

                                                          e94db04366ffb6fb0dc3d45e44e05e48a9142838

                                                          SHA256

                                                          0521e46b640761a9cf66a68d6db5817a8e90824e924ba593790eacb2d0f0d33f

                                                          SHA512

                                                          d51c115ee39b0579f73b32cb36a106e5ab9347d3e61b299ba16b7cd66d4abb2c5f1545943020097e956db87e86fd4a4caa9f237790457418e33b7b778081e06f

                                                        • \Users\Admin\AppData\Local\Temp\Unicorn-37795.exe

                                                          Filesize

                                                          157KB

                                                          MD5

                                                          5aa1db7bf734d2900edc88cce21bc151

                                                          SHA1

                                                          4ee7f0bad31490a990894050995611c96dfa1163

                                                          SHA256

                                                          a25008ef6364b4dff4369008a9c8dee51a424fd0c68c5db7ff60f652df942ec6

                                                          SHA512

                                                          421c329b347a21c35eca909fe0c9c0a59dd6d3621422c664acd04330466fdea58625add7015646a0871bd7c7988c4c63713c32dda8e5d5806aae7e1fe7ad0a10

                                                        • \Users\Admin\AppData\Local\Temp\Unicorn-38371.exe

                                                          Filesize

                                                          184KB

                                                          MD5

                                                          30a7cdab66698c92636ed085f7f85ecb

                                                          SHA1

                                                          f82c000439c9f0a74f6254208e6184df6cc613c5

                                                          SHA256

                                                          e24d9b62ed5c877739281b9e6d3ba500ec4dcd9aaf8e25078241cd118dc6db6c

                                                          SHA512

                                                          e74bf02a611e776819cea265c1658aecdcc43ddd69415a57e03b1682f8a2f6b9c2023ac3d275dee6353fb80f7ad5e7a13eb99a5489d12a4c142d3b68ee0d2e02

                                                        • \Users\Admin\AppData\Local\Temp\Unicorn-42164.exe

                                                          Filesize

                                                          184KB

                                                          MD5

                                                          350aece31dcb6ef005c9e777af233836

                                                          SHA1

                                                          b63aca7ee502a27c750e6355155a799f2ad38d2c

                                                          SHA256

                                                          2c52bd68f006e86eefe1d86a9ace14e84cb49be3aee6484616de7e835df29f78

                                                          SHA512

                                                          e08c5dd13221e6c5e81a11662e9389fff8cee2f1ab59bc5f70060ac02e87ef0ef71dfefbf2b82c8315e3c5ccf5b5c4023d3f69c08639b1c8afa57df886726e4d

                                                        • \Users\Admin\AppData\Local\Temp\Unicorn-53939.exe

                                                          Filesize

                                                          61KB

                                                          MD5

                                                          793242fcc4453d52c593a8c07804d28f

                                                          SHA1

                                                          cb83dd76137b8c67db0d0e93e1083eda3148cd5d

                                                          SHA256

                                                          f215931f80677bfcb9ffbfdde93a1b2404656312ef4f4c0cb6fd243aab33ee78

                                                          SHA512

                                                          8e02d5c60b16aa122f1545413c8cc25b5601378e506c2237f4aa3fe32c79ecc527456438d42305dc96ea887c17bad3f34a93b614982b6cfc0544edb1be92367b

                                                        • \Users\Admin\AppData\Local\Temp\Unicorn-53939.exe

                                                          Filesize

                                                          49KB

                                                          MD5

                                                          efe61e305cd0650a58a4294a2db76200

                                                          SHA1

                                                          f64219544c633a083802867cc2ef50ed70b02bbf

                                                          SHA256

                                                          c3e6d8b55c9debe523cb4f9b8e759421f0927d6f57b91ea2931d5199289836e5

                                                          SHA512

                                                          20ec68f9cb8ac87f5773e08a57ced65fbe312e9389adfc6db7586f561936d54d4e558ce55cf7dced847d7f786f4d39298d5951052d397dab6744459d9b9ebfe4

                                                        • \Users\Admin\AppData\Local\Temp\Unicorn-8329.exe

                                                          Filesize

                                                          184KB

                                                          MD5

                                                          43e8cf655022027364521c79cc68eede

                                                          SHA1

                                                          6ccc148f75b93a0ac8d465033b6e6a3c75b9744d

                                                          SHA256

                                                          42cc4acde7fb2367a306a67402d4275db743a964f7739b27c2c689553343cfde

                                                          SHA512

                                                          a23d21e2ea860b157244db5817503891a58f1b82199e42cd17bd8eb72e238afda9c764a3b2adb1a34e0346b742d37e98adc4f6aa3dd245bc36992d1c46091672

                                                        • \Users\Admin\AppData\Local\Temp\Unicorn-8329.exe

                                                          Filesize

                                                          116KB

                                                          MD5

                                                          9b7576348df7d195b6f42de444fd44b6

                                                          SHA1

                                                          9871f17a5914ea7855ae26e938b557b53ee5b351

                                                          SHA256

                                                          4ef2a10e0baab0737ba180574ec032c0fa7ed39688835b1ae490b6e2e69b102f

                                                          SHA512

                                                          fc7f541a94757ba39f216122035f913a83777da8f2e3e4ae58b48ea812e24a418950328fc2c9dccca29043ef4aeec37ab7f12879fecf1e9b8a6a033f84b238d7