Analysis
-
max time kernel
120s -
max time network
137s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
19-01-2024 15:46
Static task
static1
Behavioral task
behavioral1
Sample
6802fbe648cb671cc6a4f6714f6d1d8b.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
6802fbe648cb671cc6a4f6714f6d1d8b.exe
Resource
win10v2004-20231215-en
General
-
Target
6802fbe648cb671cc6a4f6714f6d1d8b.exe
-
Size
184KB
-
MD5
6802fbe648cb671cc6a4f6714f6d1d8b
-
SHA1
62ca12d74ead5372b1b00122435bc171474345a4
-
SHA256
dc36bdfa598c97051dc01c6f71157cac6b3fc9363fc2974d4b87e96d70defed3
-
SHA512
e3438c3b75c18db7796d43ba08e8531e21dc35fca44a8755d8d13600d0173b5a6d96b66d9c616bbc0f3e72b4515e541085ac11de289b5b25a1a45915395f9027
-
SSDEEP
3072:XokMo/oUPkf0QOUKM3sHve01sscFE9lg4SxK9aSSNlPMpFc:XoXoXS0QqMcHve0/LCNlPMpF
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2716 Unicorn-39240.exe 2740 Unicorn-40439.exe 3004 Unicorn-8321.exe 2808 Unicorn-41290.exe 2280 Unicorn-9530.exe 2132 Unicorn-33480.exe 2964 Unicorn-10174.exe 2312 Unicorn-48638.exe 1952 Unicorn-48083.exe 2172 Unicorn-24622.exe 2912 Unicorn-58041.exe 796 Unicorn-15769.exe 1424 Unicorn-62317.exe 2112 Unicorn-16646.exe 2248 Unicorn-8799.exe 2472 Unicorn-38134.exe 1104 Unicorn-57424.exe 548 Unicorn-57616.exe 1832 Unicorn-45172.exe 1928 Unicorn-45172.exe 952 Unicorn-802.exe 2320 Unicorn-50963.exe 1772 Unicorn-62743.exe 2232 Unicorn-25795.exe 2404 Unicorn-26541.exe 1712 Unicorn-2037.exe 1988 Unicorn-42515.exe 1620 Unicorn-64087.exe 2376 Unicorn-11357.exe 2788 Unicorn-2058.exe 2868 Unicorn-43091.exe 3008 Unicorn-59982.exe 2212 Unicorn-14310.exe 2620 Unicorn-1736.exe 2968 Unicorn-42214.exe 2804 Unicorn-56557.exe 2616 Unicorn-10885.exe 1924 Unicorn-18753.exe 2600 Unicorn-18753.exe 672 Unicorn-18753.exe 324 Unicorn-18753.exe 2096 Unicorn-64424.exe 2844 Unicorn-45312.exe 1976 Unicorn-13018.exe 1248 Unicorn-64461.exe 768 Unicorn-10354.exe 1952 Unicorn-56888.exe 1244 Unicorn-62892.exe 2228 Unicorn-1221.exe 108 Unicorn-23910.exe 1904 Unicorn-61107.exe 2632 Unicorn-7921.exe 2988 Unicorn-49997.exe 1444 Unicorn-18093.exe 1064 Unicorn-44180.exe 2308 Unicorn-15399.exe 788 Unicorn-40288.exe 700 Unicorn-64792.exe 884 Unicorn-52540.exe 1380 Unicorn-23376.exe 1840 Unicorn-60132.exe 2364 Unicorn-2955.exe 1576 Unicorn-19375.exe 2092 Unicorn-7293.exe -
Loads dropped DLL 64 IoCs
pid Process 2144 6802fbe648cb671cc6a4f6714f6d1d8b.exe 2144 6802fbe648cb671cc6a4f6714f6d1d8b.exe 2716 Unicorn-39240.exe 2716 Unicorn-39240.exe 2144 6802fbe648cb671cc6a4f6714f6d1d8b.exe 2144 6802fbe648cb671cc6a4f6714f6d1d8b.exe 3004 Unicorn-8321.exe 3004 Unicorn-8321.exe 2808 Unicorn-41290.exe 2808 Unicorn-41290.exe 3004 Unicorn-8321.exe 3004 Unicorn-8321.exe 2132 Unicorn-33480.exe 2132 Unicorn-33480.exe 2808 Unicorn-41290.exe 2808 Unicorn-41290.exe 2280 Unicorn-9530.exe 2280 Unicorn-9530.exe 2964 Unicorn-10174.exe 2964 Unicorn-10174.exe 2132 Unicorn-33480.exe 2132 Unicorn-33480.exe 1952 Unicorn-48083.exe 1952 Unicorn-48083.exe 2280 Unicorn-9530.exe 2280 Unicorn-9530.exe 2312 Unicorn-48638.exe 2312 Unicorn-48638.exe 2172 Unicorn-24622.exe 2172 Unicorn-24622.exe 2964 Unicorn-10174.exe 2964 Unicorn-10174.exe 2912 Unicorn-58041.exe 2912 Unicorn-58041.exe 796 Unicorn-15769.exe 796 Unicorn-15769.exe 2112 Unicorn-16646.exe 1424 Unicorn-62317.exe 1424 Unicorn-62317.exe 2112 Unicorn-16646.exe 1952 Unicorn-48083.exe 1952 Unicorn-48083.exe 2312 Unicorn-48638.exe 2312 Unicorn-48638.exe 2248 Unicorn-8799.exe 2248 Unicorn-8799.exe 2172 Unicorn-24622.exe 2472 Unicorn-38134.exe 2172 Unicorn-24622.exe 2472 Unicorn-38134.exe 2912 Unicorn-58041.exe 2912 Unicorn-58041.exe 1104 Unicorn-57424.exe 1104 Unicorn-57424.exe 1832 Unicorn-45172.exe 1832 Unicorn-45172.exe 1424 Unicorn-62317.exe 1424 Unicorn-62317.exe 952 Unicorn-802.exe 952 Unicorn-802.exe 1928 Unicorn-45172.exe 1928 Unicorn-45172.exe 2320 Unicorn-50963.exe 2320 Unicorn-50963.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2144 6802fbe648cb671cc6a4f6714f6d1d8b.exe 2716 Unicorn-39240.exe 3004 Unicorn-8321.exe 2808 Unicorn-41290.exe 2132 Unicorn-33480.exe 2280 Unicorn-9530.exe 2964 Unicorn-10174.exe 2312 Unicorn-48638.exe 1952 Unicorn-48083.exe 2172 Unicorn-24622.exe 2912 Unicorn-58041.exe 796 Unicorn-15769.exe 1424 Unicorn-62317.exe 2112 Unicorn-16646.exe 2248 Unicorn-8799.exe 2472 Unicorn-38134.exe 1104 Unicorn-57424.exe 1832 Unicorn-45172.exe 1928 Unicorn-45172.exe 952 Unicorn-802.exe 548 Unicorn-57616.exe 2320 Unicorn-50963.exe 1772 Unicorn-62743.exe 2404 Unicorn-26541.exe 2232 Unicorn-25795.exe 1712 Unicorn-2037.exe 1988 Unicorn-42515.exe 1620 Unicorn-64087.exe 2788 Unicorn-2058.exe 2868 Unicorn-43091.exe 3008 Unicorn-59982.exe 2212 Unicorn-14310.exe 2804 Unicorn-56557.exe 2968 Unicorn-42214.exe 1924 Unicorn-18753.exe 2844 Unicorn-45312.exe 2616 Unicorn-10885.exe 2620 Unicorn-1736.exe 2600 Unicorn-18753.exe 2096 Unicorn-64424.exe 672 Unicorn-18753.exe 324 Unicorn-18753.exe 1976 Unicorn-13018.exe 1248 Unicorn-64461.exe 768 Unicorn-10354.exe 1952 Unicorn-56888.exe 1244 Unicorn-62892.exe 108 Unicorn-23910.exe 2228 Unicorn-1221.exe 2740 Unicorn-40439.exe 2632 Unicorn-7921.exe 1904 Unicorn-61107.exe 2988 Unicorn-49997.exe 1444 Unicorn-18093.exe 1064 Unicorn-44180.exe 2308 Unicorn-15399.exe 788 Unicorn-40288.exe 700 Unicorn-64792.exe 884 Unicorn-52540.exe 1380 Unicorn-23376.exe 1840 Unicorn-60132.exe 1576 Unicorn-19375.exe 2364 Unicorn-2955.exe 1836 Unicorn-6738.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2144 wrote to memory of 2716 2144 6802fbe648cb671cc6a4f6714f6d1d8b.exe 28 PID 2144 wrote to memory of 2716 2144 6802fbe648cb671cc6a4f6714f6d1d8b.exe 28 PID 2144 wrote to memory of 2716 2144 6802fbe648cb671cc6a4f6714f6d1d8b.exe 28 PID 2144 wrote to memory of 2716 2144 6802fbe648cb671cc6a4f6714f6d1d8b.exe 28 PID 2716 wrote to memory of 2740 2716 Unicorn-39240.exe 29 PID 2716 wrote to memory of 2740 2716 Unicorn-39240.exe 29 PID 2716 wrote to memory of 2740 2716 Unicorn-39240.exe 29 PID 2716 wrote to memory of 2740 2716 Unicorn-39240.exe 29 PID 2144 wrote to memory of 3004 2144 6802fbe648cb671cc6a4f6714f6d1d8b.exe 30 PID 2144 wrote to memory of 3004 2144 6802fbe648cb671cc6a4f6714f6d1d8b.exe 30 PID 2144 wrote to memory of 3004 2144 6802fbe648cb671cc6a4f6714f6d1d8b.exe 30 PID 2144 wrote to memory of 3004 2144 6802fbe648cb671cc6a4f6714f6d1d8b.exe 30 PID 3004 wrote to memory of 2808 3004 Unicorn-8321.exe 31 PID 3004 wrote to memory of 2808 3004 Unicorn-8321.exe 31 PID 3004 wrote to memory of 2808 3004 Unicorn-8321.exe 31 PID 3004 wrote to memory of 2808 3004 Unicorn-8321.exe 31 PID 2808 wrote to memory of 2132 2808 Unicorn-41290.exe 33 PID 2808 wrote to memory of 2132 2808 Unicorn-41290.exe 33 PID 2808 wrote to memory of 2132 2808 Unicorn-41290.exe 33 PID 2808 wrote to memory of 2132 2808 Unicorn-41290.exe 33 PID 3004 wrote to memory of 2280 3004 Unicorn-8321.exe 32 PID 3004 wrote to memory of 2280 3004 Unicorn-8321.exe 32 PID 3004 wrote to memory of 2280 3004 Unicorn-8321.exe 32 PID 3004 wrote to memory of 2280 3004 Unicorn-8321.exe 32 PID 2132 wrote to memory of 2964 2132 Unicorn-33480.exe 36 PID 2132 wrote to memory of 2964 2132 Unicorn-33480.exe 36 PID 2132 wrote to memory of 2964 2132 Unicorn-33480.exe 36 PID 2132 wrote to memory of 2964 2132 Unicorn-33480.exe 36 PID 2808 wrote to memory of 2312 2808 Unicorn-41290.exe 37 PID 2808 wrote to memory of 2312 2808 Unicorn-41290.exe 37 PID 2808 wrote to memory of 2312 2808 Unicorn-41290.exe 37 PID 2808 wrote to memory of 2312 2808 Unicorn-41290.exe 37 PID 2280 wrote to memory of 1952 2280 Unicorn-9530.exe 38 PID 2280 wrote to memory of 1952 2280 Unicorn-9530.exe 38 PID 2280 wrote to memory of 1952 2280 Unicorn-9530.exe 38 PID 2280 wrote to memory of 1952 2280 Unicorn-9530.exe 38 PID 2964 wrote to memory of 2172 2964 Unicorn-10174.exe 39 PID 2964 wrote to memory of 2172 2964 Unicorn-10174.exe 39 PID 2964 wrote to memory of 2172 2964 Unicorn-10174.exe 39 PID 2964 wrote to memory of 2172 2964 Unicorn-10174.exe 39 PID 2132 wrote to memory of 2912 2132 Unicorn-33480.exe 40 PID 2132 wrote to memory of 2912 2132 Unicorn-33480.exe 40 PID 2132 wrote to memory of 2912 2132 Unicorn-33480.exe 40 PID 2132 wrote to memory of 2912 2132 Unicorn-33480.exe 40 PID 1952 wrote to memory of 796 1952 Unicorn-48083.exe 41 PID 1952 wrote to memory of 796 1952 Unicorn-48083.exe 41 PID 1952 wrote to memory of 796 1952 Unicorn-48083.exe 41 PID 1952 wrote to memory of 796 1952 Unicorn-48083.exe 41 PID 2280 wrote to memory of 1424 2280 Unicorn-9530.exe 43 PID 2280 wrote to memory of 1424 2280 Unicorn-9530.exe 43 PID 2280 wrote to memory of 1424 2280 Unicorn-9530.exe 43 PID 2280 wrote to memory of 1424 2280 Unicorn-9530.exe 43 PID 2312 wrote to memory of 2112 2312 Unicorn-48638.exe 42 PID 2312 wrote to memory of 2112 2312 Unicorn-48638.exe 42 PID 2312 wrote to memory of 2112 2312 Unicorn-48638.exe 42 PID 2312 wrote to memory of 2112 2312 Unicorn-48638.exe 42 PID 2172 wrote to memory of 2248 2172 Unicorn-24622.exe 44 PID 2172 wrote to memory of 2248 2172 Unicorn-24622.exe 44 PID 2172 wrote to memory of 2248 2172 Unicorn-24622.exe 44 PID 2172 wrote to memory of 2248 2172 Unicorn-24622.exe 44 PID 2964 wrote to memory of 2472 2964 Unicorn-10174.exe 45 PID 2964 wrote to memory of 2472 2964 Unicorn-10174.exe 45 PID 2964 wrote to memory of 2472 2964 Unicorn-10174.exe 45 PID 2964 wrote to memory of 2472 2964 Unicorn-10174.exe 45
Processes
-
C:\Users\Admin\AppData\Local\Temp\6802fbe648cb671cc6a4f6714f6d1d8b.exe"C:\Users\Admin\AppData\Local\Temp\6802fbe648cb671cc6a4f6714f6d1d8b.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-39240.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39240.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40439.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40439.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40288.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40288.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:788 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44154.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44154.exe5⤵PID:364
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38652.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38652.exe4⤵PID:2676
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8321.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8321.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3004 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-41290.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41290.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-33480.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33480.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10174.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10174.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-24622.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24622.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-8799.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8799.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2248 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62743.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62743.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1772 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10885.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10885.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-19375.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19375.exe10⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1576
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56557.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56557.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10354.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10354.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:768 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44180.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44180.exe10⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1064 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3121.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3121.exe11⤵PID:2524
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48793.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48793.exe10⤵PID:2236
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26541.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26541.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18753.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18753.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:672
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38134.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38134.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2472 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-25795.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25795.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18753.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18753.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2600 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6738.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6738.exe9⤵PID:628
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62301.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62301.exe10⤵PID:796
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1211.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1211.exe9⤵PID:908
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64424.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64424.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15399.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15399.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3121.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3121.exe9⤵PID:2856
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24288.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24288.exe8⤵PID:2420
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58041.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58041.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-57424.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57424.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1104 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-42515.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42515.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18753.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18753.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-1221.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1221.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6738.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6738.exe10⤵
- Suspicious use of SetWindowsHookEx
PID:1836 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49665.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49665.exe11⤵PID:1584
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13463.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13463.exe10⤵PID:548
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45312.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45312.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-7921.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7921.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-2955.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2955.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16033.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16033.exe10⤵PID:2788
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25907.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25907.exe9⤵PID:2836
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2037.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2037.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1712 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18753.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18753.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:324 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60132.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60132.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1840
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48638.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48638.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16646.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16646.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2112 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45172.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45172.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1928 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-43091.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43091.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2868 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62892.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62892.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1244 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49997.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49997.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-29524.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29524.exe10⤵PID:920
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7293.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7293.exe9⤵
- Executes dropped EXE
PID:2092 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45773.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45773.exe10⤵PID:2812
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59982.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59982.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61107.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61107.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1904 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6738.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6738.exe8⤵PID:1580
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50963.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50963.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14310.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14310.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2212 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-56888.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56888.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18093.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18093.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27159.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27159.exe9⤵PID:2700
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42216.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42216.exe10⤵PID:2040
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9530.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9530.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48083.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48083.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15769.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15769.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:796 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-57616.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57616.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:548 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-42214.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42214.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23910.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23910.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:108 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-52540.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52540.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:884 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-43067.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43067.exe10⤵PID:1732
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1736.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1736.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2620 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-64792.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64792.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:700 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44154.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44154.exe8⤵PID:1596
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38652.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38652.exe7⤵PID:2480
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-802.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-802.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:952 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-2058.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2058.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13018.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13018.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23376.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23376.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1380 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58518.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58518.exe9⤵PID:2116
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38652.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38652.exe8⤵PID:2172
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62317.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62317.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1424 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45172.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45172.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1832 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-64087.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64087.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1620 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-64461.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64461.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1248
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11357.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11357.exe5⤵
- Executes dropped EXE
PID:2376
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD549f208649f0741ec345f6b683fb638c4
SHA17240296a46fe0c7d4f46244d097be860f0673312
SHA2560caed9963e2ec9301b5b4b8ef1b339c4a4f5b421e08634ac76a5a5ef38fc4aa2
SHA5127a9d0f5948d8df8379a9681a7357d7d673f3f9cf58efa78c68c453ae841d1952fd4cce6f5098a38c54fe90de3cc59f37d599442fa20d9b0e98523689d7be641e
-
Filesize
184KB
MD56f7cb578a827d2b58eba0219ef59a570
SHA15837396a7b476aa1b90a9d87388c0da35cbe1190
SHA25662386a08c32ade097836f4ef82a4a1f0a54ef416a3a65765f652ba06b967ad34
SHA51245e73b81712eda75ed34decfa6a6722e8e9fab35a7556a49db11003297e3647a015726b7734786288eba7c857261f46cf5a59f1b053fbbc350929b31ed13a1c2
-
Filesize
184KB
MD5f4994d757fb0e46164fc13814097605a
SHA16b274b24f2d30797430deb66e69261e3abeb380c
SHA256ced5e080bca14c65143b23012fd215a215e6e71fa95e034ca95091bc0d5a39ce
SHA512f3a1b7ab316189aebb32b5085bebb20d718da72d302b5202025f1dfffd722e6d8119e896aa7e634cdc50dabe44a4a412c1bf8e41de1a714fb62ed303d6e79ffb
-
Filesize
184KB
MD5650aa867aab005e3b08d202360500c6a
SHA197d7f47f4fcd40e52bd174a7d1493bf5e8c43d0e
SHA256baa5678cdbdbe1e58998a1071a98da4fa1728cdc1d84ebdd1d7bf91b9696b22a
SHA512f4e8fe3ffa0813b5fad8afaca76ec64916ceacb30026527d68420168ead9307274137de230dff486877823e3aaf10988f950187775cb6b18272f88f0f89c834c
-
Filesize
184KB
MD55462e875fb656c97e4da951828bccde8
SHA1e7339afb4846f8eab18811c3f2239b2a682b9e01
SHA2563aa94c4b6924007d900309e2781699e8da161d81a0f1b24040041af1cab85493
SHA512542c7002a881443cc42db4cb6133c7ef58f4f8a0eded880d4cd20df6f3bda8c7c5b685c5434272cdacf5eb3c4f99a99a1486a1505575318425da036f3870d2e1
-
Filesize
184KB
MD59fd008fd053696fb689b11770f5f0951
SHA16cbb12d75c041d64902b8c4afc1f91ee0bcaad09
SHA256adb559db38d7f84692ccb69f4ef231df78e174e05480a359853b0ae92ecbb796
SHA512b3058195d8c4c8514ddc5b6c58a4b74345d406f0ff7a5244c2f54d38cfbe707ec9395f8be6fa1f634b8395b8feb4766b2f6d729f6d03997eefe15957d1ad438a
-
Filesize
184KB
MD5821b7118d04422dc9294bb918ae6b5a7
SHA189ee47d0e53fd6c62c682315c1338edf3a27c0f3
SHA25687285b57c562e3829e53be565cd4f67b1adc691865a68a44df7a4fdab382a660
SHA5128d20b7c7c0721f6e82d71007b8e5de9ba82ab82a12179e9785b902df09c5f943e4c4eedcf07070809587344cdc5ffb0620db85191746b52eb570d6703e0421c4
-
Filesize
184KB
MD5bd3a04b7da2fbd74b0f47ed6f4a3844e
SHA1e926a78309e837b9bc8b8f94d2632ccb6339c812
SHA256c9a31779d22a7c909b57e62bfb65a546b6e1d9e950683bc2f205a85a6e45c8f0
SHA512b213bd126683901dd144769ede6dcc542bc1d68f38a331b5443d2dbf3ed6de2bb49d6c1e7719131af75e6f811a7e54f219d14780cef3ec01a534e39d3cba9f7c
-
Filesize
184KB
MD57ed58647f79268298cf75635b6a61ad0
SHA1a7d856aba236c394ea260528ffaec2d04ffdbbd6
SHA25656631183c73af5d17a0f6f8fc72c4676ee97936ccc3e07c99e1df0f701d72db9
SHA5121d7d732ab1b97a5eba7613e8550513086fecb92f0c35135e6dbd1063da212d69a8b25db5779f5f5b3299db733ae6ad9f97c312a61c99635b4b8c88ade7906895
-
Filesize
184KB
MD59c5f6751bda04310dd3b604b67e32369
SHA1e3b10fcd257a296c4a18bb2bd17bc7cf33544f72
SHA256548aeb58712879656eb476ad7f0423ac4a0147f41d45c53bb3608c349de93111
SHA512bca999eb4ae0011891144de62cf63bc1b03e161d2bf8842ee2931fc79d850b3c126bd9f21bd010ef9605481205f5d8c213ee16dcdddb5250a1655370661b2499
-
Filesize
184KB
MD56de0e408099db62a26ab2f3149bb0bcb
SHA1a682449c9da801b4b5671633677f9dae632ffcb7
SHA256f4c41abf3dbb725445af455a2ada50224a2be7596fcd99cfaeb5ac681283f085
SHA51281c5c9670824c96f8b9a05dc0e65bdf854a93478d0ebf12c13f5ba55890ab9f0647f999b1293899267ff93e583ec7d05923998a5222f65148f3096ef3515e659
-
Filesize
184KB
MD55c205752257d3c78e3316f3f4821ab62
SHA14bfbfe7653da776fda0f1406db6b3ba7d03fb9f3
SHA2566f4bd32344ecee250bd992b9b3ae76a46eb6dd276332291a5a067d9f2a7516fc
SHA51210a87ac04b99292c5a4f2ec4af869d9f32f0469b95fb288a72b1618fb216bb33789aeaa8b49689f8c11b85ed17c8b76e01d635ec7bb72e494a5210d0b46e8a04
-
Filesize
184KB
MD578b3b8dcae188005f676821e1fc2c273
SHA1f46661e4e3c6ff97edc75720865647d1dd0a2738
SHA256ee406610f6eb28d9366788013ff2d34cce232866515906134cf9a608a2a72f41
SHA512a119a9b59641e6ca053911b084eee025b991d095f528120ae15b0b6d4321faf77c0b7d4b84875bca09f81bc80b53122bf37d98341d74dda93d9e48712f9a95eb
-
Filesize
184KB
MD56bf8f8a5800d26a1ed2e59ed7d280dff
SHA1f6bf7833f1da0543f6601f5f3eed90870e19f6ce
SHA256bad822771923a3989af424477321af7bc0b05314d28aeed9b845ba0274f47c52
SHA5128fa267aa9547c407ebd79449e7b9619996671cbca53ef0b64b68e469bc7a2a5547ad2fb6118ac5ef5e53c42bfbf302eda42dacf10d20c834cb42e379b5865e5f
-
Filesize
184KB
MD54aa203eb6cc0912abb00e5715747a453
SHA1ca2662abc1ef7d06f55ee209a5b3abdc383c729e
SHA256711aaf9b397bff6a2d51bb049c7bbc1d8ba896f2fb0293bc954607883704359e
SHA512c04f1c11e01d68da5c081ba89c8531815b8b5cfac2959274459559805238af887c4d41b2a1a8925d837960605e35118e9d9d8318553b1bb46dab4e63e4ba4cc1
-
Filesize
184KB
MD58090da052f4367b83113e87946988631
SHA123a01cc145d2b38b619d083f2bd11ffb3b6651f5
SHA256199e7155bc399b89d4ac66f51a097ab797e416785683bdeb9ed6329c06a9555a
SHA512ff20b9262c03a7a2ae2573a1b302da10f4f243da173e905e5a2d4f9916e3ea30d55ec363e6e2f38254a5b9ef5b70e3a528a89faa52930976bf92aa7818a2c4c9
-
Filesize
184KB
MD51586ee8799f615c7b00897def60c8f97
SHA1d3626bf7a0626f2e782e6670395b925d9ba47360
SHA256cfa3cbb63576b108b4922263b492f459afdea922410b6450f638aa84669e8dc0
SHA51206c4812ac4b23845f88bb37701a9dee065ea1193861d62a73469f0beafbe2922bd93a83d454fcb66e3b142af2c796e663a1b0367a7312580038bf35c7949943d
-
Filesize
184KB
MD554b4236be34984e567b48fafc8944703
SHA19728b2e885c2727a59eceb84c0f4ed2fea092a06
SHA2569e2314964f9d9d1694eac5ee91de7b565c4230e53a0dce11648aae8ad9a999ca
SHA512daf8976cf38f6426b44af3f156f524b6d107b732b7abda6ff3d6a7b2c4deea29cd48cd764e29fb00bedbc11d5fbdc91b2790ef1ebc2061accfb6a9957a943414
-
Filesize
184KB
MD5e1c694aeee8fc9ef564192c467a3fda6
SHA16eb2f8fc1bf58ed79150b619b859a1018d456a98
SHA256f1b01f3479b9d67a0f03cb1439344681bcffe80f68a12dd8868308bb8970293a
SHA512dca3bcc8363dc1c4991be7d038d6f3d50d11b1d4dcc99f761c0f614253ba61a8d227e27b4b7330e4dd5dcfa962e8ad1fb84659dc287ad9901adf8a7dab8fe1c8