Analysis

  • max time kernel
    120s
  • max time network
    137s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    19-01-2024 15:46

General

  • Target

    6802fbe648cb671cc6a4f6714f6d1d8b.exe

  • Size

    184KB

  • MD5

    6802fbe648cb671cc6a4f6714f6d1d8b

  • SHA1

    62ca12d74ead5372b1b00122435bc171474345a4

  • SHA256

    dc36bdfa598c97051dc01c6f71157cac6b3fc9363fc2974d4b87e96d70defed3

  • SHA512

    e3438c3b75c18db7796d43ba08e8531e21dc35fca44a8755d8d13600d0173b5a6d96b66d9c616bbc0f3e72b4515e541085ac11de289b5b25a1a45915395f9027

  • SSDEEP

    3072:XokMo/oUPkf0QOUKM3sHve01sscFE9lg4SxK9aSSNlPMpFc:XoXoXS0QqMcHve0/LCNlPMpF

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 64 IoCs
  • Loads dropped DLL 64 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\6802fbe648cb671cc6a4f6714f6d1d8b.exe
    "C:\Users\Admin\AppData\Local\Temp\6802fbe648cb671cc6a4f6714f6d1d8b.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2144
    • C:\Users\Admin\AppData\Local\Temp\Unicorn-39240.exe
      C:\Users\Admin\AppData\Local\Temp\Unicorn-39240.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2716
      • C:\Users\Admin\AppData\Local\Temp\Unicorn-40439.exe
        C:\Users\Admin\AppData\Local\Temp\Unicorn-40439.exe
        3⤵
        • Executes dropped EXE
        • Suspicious use of SetWindowsHookEx
        PID:2740
        • C:\Users\Admin\AppData\Local\Temp\Unicorn-40288.exe
          C:\Users\Admin\AppData\Local\Temp\Unicorn-40288.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          PID:788
          • C:\Users\Admin\AppData\Local\Temp\Unicorn-44154.exe
            C:\Users\Admin\AppData\Local\Temp\Unicorn-44154.exe
            5⤵
              PID:364
          • C:\Users\Admin\AppData\Local\Temp\Unicorn-38652.exe
            C:\Users\Admin\AppData\Local\Temp\Unicorn-38652.exe
            4⤵
              PID:2676
        • C:\Users\Admin\AppData\Local\Temp\Unicorn-8321.exe
          C:\Users\Admin\AppData\Local\Temp\Unicorn-8321.exe
          2⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3004
          • C:\Users\Admin\AppData\Local\Temp\Unicorn-41290.exe
            C:\Users\Admin\AppData\Local\Temp\Unicorn-41290.exe
            3⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2808
            • C:\Users\Admin\AppData\Local\Temp\Unicorn-33480.exe
              C:\Users\Admin\AppData\Local\Temp\Unicorn-33480.exe
              4⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:2132
              • C:\Users\Admin\AppData\Local\Temp\Unicorn-10174.exe
                C:\Users\Admin\AppData\Local\Temp\Unicorn-10174.exe
                5⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:2964
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-24622.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-24622.exe
                  6⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:2172
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-8799.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-8799.exe
                    7⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of SetWindowsHookEx
                    PID:2248
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-62743.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-62743.exe
                      8⤵
                      • Executes dropped EXE
                      • Suspicious use of SetWindowsHookEx
                      PID:1772
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-10885.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-10885.exe
                        9⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:2616
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-19375.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-19375.exe
                          10⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:1576
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-56557.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-56557.exe
                      8⤵
                      • Executes dropped EXE
                      • Suspicious use of SetWindowsHookEx
                      PID:2804
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-10354.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-10354.exe
                        9⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:768
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-44180.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-44180.exe
                          10⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:1064
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-3121.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-3121.exe
                            11⤵
                              PID:2524
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-48793.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-48793.exe
                            10⤵
                              PID:2236
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-26541.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-26541.exe
                        7⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:2404
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-18753.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-18753.exe
                          8⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:672
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-38134.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-38134.exe
                      6⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Suspicious use of SetWindowsHookEx
                      PID:2472
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-25795.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-25795.exe
                        7⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:2232
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-18753.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-18753.exe
                          8⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:2600
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-6738.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-6738.exe
                            9⤵
                              PID:628
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-62301.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-62301.exe
                                10⤵
                                  PID:796
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-1211.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-1211.exe
                                9⤵
                                  PID:908
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-64424.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-64424.exe
                              7⤵
                              • Executes dropped EXE
                              • Suspicious use of SetWindowsHookEx
                              PID:2096
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-15399.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-15399.exe
                                8⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                PID:2308
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-3121.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-3121.exe
                                  9⤵
                                    PID:2856
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-24288.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-24288.exe
                                  8⤵
                                    PID:2420
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-58041.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-58041.exe
                              5⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • Suspicious use of SetWindowsHookEx
                              PID:2912
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-57424.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-57424.exe
                                6⤵
                                • Executes dropped EXE
                                • Loads dropped DLL
                                • Suspicious use of SetWindowsHookEx
                                PID:1104
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-42515.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-42515.exe
                                  7⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetWindowsHookEx
                                  PID:1988
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-18753.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-18753.exe
                                    8⤵
                                    • Executes dropped EXE
                                    • Suspicious use of SetWindowsHookEx
                                    PID:1924
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-1221.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-1221.exe
                                      9⤵
                                      • Executes dropped EXE
                                      • Suspicious use of SetWindowsHookEx
                                      PID:2228
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-6738.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-6738.exe
                                        10⤵
                                        • Suspicious use of SetWindowsHookEx
                                        PID:1836
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-49665.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-49665.exe
                                          11⤵
                                            PID:1584
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-13463.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-13463.exe
                                          10⤵
                                            PID:548
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-45312.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-45312.exe
                                      7⤵
                                      • Executes dropped EXE
                                      • Suspicious use of SetWindowsHookEx
                                      PID:2844
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-7921.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-7921.exe
                                        8⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetWindowsHookEx
                                        PID:2632
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-2955.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-2955.exe
                                          9⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetWindowsHookEx
                                          PID:2364
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-16033.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-16033.exe
                                            10⤵
                                              PID:2788
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-25907.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-25907.exe
                                            9⤵
                                              PID:2836
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-2037.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-2037.exe
                                        6⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetWindowsHookEx
                                        PID:1712
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-18753.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-18753.exe
                                          7⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetWindowsHookEx
                                          PID:324
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-60132.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-60132.exe
                                            8⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetWindowsHookEx
                                            PID:1840
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-48638.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-48638.exe
                                    4⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • Suspicious use of SetWindowsHookEx
                                    • Suspicious use of WriteProcessMemory
                                    PID:2312
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-16646.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-16646.exe
                                      5⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Suspicious use of SetWindowsHookEx
                                      PID:2112
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-45172.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-45172.exe
                                        6⤵
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        • Suspicious use of SetWindowsHookEx
                                        PID:1928
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-43091.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-43091.exe
                                          7⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetWindowsHookEx
                                          PID:2868
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-62892.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-62892.exe
                                            8⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetWindowsHookEx
                                            PID:1244
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-49997.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-49997.exe
                                              9⤵
                                              • Executes dropped EXE
                                              • Suspicious use of SetWindowsHookEx
                                              PID:2988
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-29524.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-29524.exe
                                                10⤵
                                                  PID:920
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-7293.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-7293.exe
                                                9⤵
                                                • Executes dropped EXE
                                                PID:2092
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-45773.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-45773.exe
                                                  10⤵
                                                    PID:2812
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-59982.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-59982.exe
                                            6⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetWindowsHookEx
                                            PID:3008
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-61107.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-61107.exe
                                              7⤵
                                              • Executes dropped EXE
                                              • Suspicious use of SetWindowsHookEx
                                              PID:1904
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-6738.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-6738.exe
                                                8⤵
                                                  PID:1580
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-50963.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-50963.exe
                                            5⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            • Suspicious use of SetWindowsHookEx
                                            PID:2320
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-14310.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-14310.exe
                                              6⤵
                                              • Executes dropped EXE
                                              • Suspicious use of SetWindowsHookEx
                                              PID:2212
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-56888.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-56888.exe
                                                7⤵
                                                • Executes dropped EXE
                                                • Suspicious use of SetWindowsHookEx
                                                PID:1952
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-18093.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-18093.exe
                                                  8⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:1444
                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-27159.exe
                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-27159.exe
                                                    9⤵
                                                      PID:2700
                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-42216.exe
                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-42216.exe
                                                        10⤵
                                                          PID:2040
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-9530.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-9530.exe
                                            3⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            • Suspicious use of SetWindowsHookEx
                                            • Suspicious use of WriteProcessMemory
                                            PID:2280
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-48083.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-48083.exe
                                              4⤵
                                              • Executes dropped EXE
                                              • Loads dropped DLL
                                              • Suspicious use of SetWindowsHookEx
                                              • Suspicious use of WriteProcessMemory
                                              PID:1952
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-15769.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-15769.exe
                                                5⤵
                                                • Executes dropped EXE
                                                • Loads dropped DLL
                                                • Suspicious use of SetWindowsHookEx
                                                PID:796
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-57616.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-57616.exe
                                                  6⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:548
                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-42214.exe
                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-42214.exe
                                                    7⤵
                                                    • Executes dropped EXE
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:2968
                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-23910.exe
                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-23910.exe
                                                      8⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:108
                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-52540.exe
                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-52540.exe
                                                        9⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:884
                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-43067.exe
                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-43067.exe
                                                          10⤵
                                                            PID:1732
                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-1736.exe
                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-1736.exe
                                                    6⤵
                                                    • Executes dropped EXE
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:2620
                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-64792.exe
                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-64792.exe
                                                      7⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:700
                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-44154.exe
                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-44154.exe
                                                        8⤵
                                                          PID:1596
                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-38652.exe
                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-38652.exe
                                                        7⤵
                                                          PID:2480
                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-802.exe
                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-802.exe
                                                      5⤵
                                                      • Executes dropped EXE
                                                      • Loads dropped DLL
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:952
                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-2058.exe
                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-2058.exe
                                                        6⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:2788
                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-13018.exe
                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-13018.exe
                                                          7⤵
                                                          • Executes dropped EXE
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:1976
                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-23376.exe
                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-23376.exe
                                                            8⤵
                                                            • Executes dropped EXE
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:1380
                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-58518.exe
                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-58518.exe
                                                              9⤵
                                                                PID:2116
                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-38652.exe
                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-38652.exe
                                                              8⤵
                                                                PID:2172
                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-62317.exe
                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-62317.exe
                                                        4⤵
                                                        • Executes dropped EXE
                                                        • Loads dropped DLL
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:1424
                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-45172.exe
                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-45172.exe
                                                          5⤵
                                                          • Executes dropped EXE
                                                          • Loads dropped DLL
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:1832
                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-64087.exe
                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-64087.exe
                                                            6⤵
                                                            • Executes dropped EXE
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:1620
                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-64461.exe
                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-64461.exe
                                                              7⤵
                                                              • Executes dropped EXE
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:1248
                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-11357.exe
                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-11357.exe
                                                          5⤵
                                                          • Executes dropped EXE
                                                          PID:2376

                                                Network

                                                MITRE ATT&CK Matrix

                                                Replay Monitor

                                                Loading Replay Monitor...

                                                Downloads

                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-10174.exe

                                                  Filesize

                                                  184KB

                                                  MD5

                                                  49f208649f0741ec345f6b683fb638c4

                                                  SHA1

                                                  7240296a46fe0c7d4f46244d097be860f0673312

                                                  SHA256

                                                  0caed9963e2ec9301b5b4b8ef1b339c4a4f5b421e08634ac76a5a5ef38fc4aa2

                                                  SHA512

                                                  7a9d0f5948d8df8379a9681a7357d7d673f3f9cf58efa78c68c453ae841d1952fd4cce6f5098a38c54fe90de3cc59f37d599442fa20d9b0e98523689d7be641e

                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-24622.exe

                                                  Filesize

                                                  184KB

                                                  MD5

                                                  6f7cb578a827d2b58eba0219ef59a570

                                                  SHA1

                                                  5837396a7b476aa1b90a9d87388c0da35cbe1190

                                                  SHA256

                                                  62386a08c32ade097836f4ef82a4a1f0a54ef416a3a65765f652ba06b967ad34

                                                  SHA512

                                                  45e73b81712eda75ed34decfa6a6722e8e9fab35a7556a49db11003297e3647a015726b7734786288eba7c857261f46cf5a59f1b053fbbc350929b31ed13a1c2

                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-33480.exe

                                                  Filesize

                                                  184KB

                                                  MD5

                                                  f4994d757fb0e46164fc13814097605a

                                                  SHA1

                                                  6b274b24f2d30797430deb66e69261e3abeb380c

                                                  SHA256

                                                  ced5e080bca14c65143b23012fd215a215e6e71fa95e034ca95091bc0d5a39ce

                                                  SHA512

                                                  f3a1b7ab316189aebb32b5085bebb20d718da72d302b5202025f1dfffd722e6d8119e896aa7e634cdc50dabe44a4a412c1bf8e41de1a714fb62ed303d6e79ffb

                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-48638.exe

                                                  Filesize

                                                  184KB

                                                  MD5

                                                  650aa867aab005e3b08d202360500c6a

                                                  SHA1

                                                  97d7f47f4fcd40e52bd174a7d1493bf5e8c43d0e

                                                  SHA256

                                                  baa5678cdbdbe1e58998a1071a98da4fa1728cdc1d84ebdd1d7bf91b9696b22a

                                                  SHA512

                                                  f4e8fe3ffa0813b5fad8afaca76ec64916ceacb30026527d68420168ead9307274137de230dff486877823e3aaf10988f950187775cb6b18272f88f0f89c834c

                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-57424.exe

                                                  Filesize

                                                  184KB

                                                  MD5

                                                  5462e875fb656c97e4da951828bccde8

                                                  SHA1

                                                  e7339afb4846f8eab18811c3f2239b2a682b9e01

                                                  SHA256

                                                  3aa94c4b6924007d900309e2781699e8da161d81a0f1b24040041af1cab85493

                                                  SHA512

                                                  542c7002a881443cc42db4cb6133c7ef58f4f8a0eded880d4cd20df6f3bda8c7c5b685c5434272cdacf5eb3c4f99a99a1486a1505575318425da036f3870d2e1

                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-62301.exe

                                                  Filesize

                                                  184KB

                                                  MD5

                                                  9fd008fd053696fb689b11770f5f0951

                                                  SHA1

                                                  6cbb12d75c041d64902b8c4afc1f91ee0bcaad09

                                                  SHA256

                                                  adb559db38d7f84692ccb69f4ef231df78e174e05480a359853b0ae92ecbb796

                                                  SHA512

                                                  b3058195d8c4c8514ddc5b6c58a4b74345d406f0ff7a5244c2f54d38cfbe707ec9395f8be6fa1f634b8395b8feb4766b2f6d729f6d03997eefe15957d1ad438a

                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-62317.exe

                                                  Filesize

                                                  184KB

                                                  MD5

                                                  821b7118d04422dc9294bb918ae6b5a7

                                                  SHA1

                                                  89ee47d0e53fd6c62c682315c1338edf3a27c0f3

                                                  SHA256

                                                  87285b57c562e3829e53be565cd4f67b1adc691865a68a44df7a4fdab382a660

                                                  SHA512

                                                  8d20b7c7c0721f6e82d71007b8e5de9ba82ab82a12179e9785b902df09c5f943e4c4eedcf07070809587344cdc5ffb0620db85191746b52eb570d6703e0421c4

                                                • \Users\Admin\AppData\Local\Temp\Unicorn-15769.exe

                                                  Filesize

                                                  184KB

                                                  MD5

                                                  bd3a04b7da2fbd74b0f47ed6f4a3844e

                                                  SHA1

                                                  e926a78309e837b9bc8b8f94d2632ccb6339c812

                                                  SHA256

                                                  c9a31779d22a7c909b57e62bfb65a546b6e1d9e950683bc2f205a85a6e45c8f0

                                                  SHA512

                                                  b213bd126683901dd144769ede6dcc542bc1d68f38a331b5443d2dbf3ed6de2bb49d6c1e7719131af75e6f811a7e54f219d14780cef3ec01a534e39d3cba9f7c

                                                • \Users\Admin\AppData\Local\Temp\Unicorn-16646.exe

                                                  Filesize

                                                  184KB

                                                  MD5

                                                  7ed58647f79268298cf75635b6a61ad0

                                                  SHA1

                                                  a7d856aba236c394ea260528ffaec2d04ffdbbd6

                                                  SHA256

                                                  56631183c73af5d17a0f6f8fc72c4676ee97936ccc3e07c99e1df0f701d72db9

                                                  SHA512

                                                  1d7d732ab1b97a5eba7613e8550513086fecb92f0c35135e6dbd1063da212d69a8b25db5779f5f5b3299db733ae6ad9f97c312a61c99635b4b8c88ade7906895

                                                • \Users\Admin\AppData\Local\Temp\Unicorn-38134.exe

                                                  Filesize

                                                  184KB

                                                  MD5

                                                  9c5f6751bda04310dd3b604b67e32369

                                                  SHA1

                                                  e3b10fcd257a296c4a18bb2bd17bc7cf33544f72

                                                  SHA256

                                                  548aeb58712879656eb476ad7f0423ac4a0147f41d45c53bb3608c349de93111

                                                  SHA512

                                                  bca999eb4ae0011891144de62cf63bc1b03e161d2bf8842ee2931fc79d850b3c126bd9f21bd010ef9605481205f5d8c213ee16dcdddb5250a1655370661b2499

                                                • \Users\Admin\AppData\Local\Temp\Unicorn-39240.exe

                                                  Filesize

                                                  184KB

                                                  MD5

                                                  6de0e408099db62a26ab2f3149bb0bcb

                                                  SHA1

                                                  a682449c9da801b4b5671633677f9dae632ffcb7

                                                  SHA256

                                                  f4c41abf3dbb725445af455a2ada50224a2be7596fcd99cfaeb5ac681283f085

                                                  SHA512

                                                  81c5c9670824c96f8b9a05dc0e65bdf854a93478d0ebf12c13f5ba55890ab9f0647f999b1293899267ff93e583ec7d05923998a5222f65148f3096ef3515e659

                                                • \Users\Admin\AppData\Local\Temp\Unicorn-40439.exe

                                                  Filesize

                                                  184KB

                                                  MD5

                                                  5c205752257d3c78e3316f3f4821ab62

                                                  SHA1

                                                  4bfbfe7653da776fda0f1406db6b3ba7d03fb9f3

                                                  SHA256

                                                  6f4bd32344ecee250bd992b9b3ae76a46eb6dd276332291a5a067d9f2a7516fc

                                                  SHA512

                                                  10a87ac04b99292c5a4f2ec4af869d9f32f0469b95fb288a72b1618fb216bb33789aeaa8b49689f8c11b85ed17c8b76e01d635ec7bb72e494a5210d0b46e8a04

                                                • \Users\Admin\AppData\Local\Temp\Unicorn-41290.exe

                                                  Filesize

                                                  184KB

                                                  MD5

                                                  78b3b8dcae188005f676821e1fc2c273

                                                  SHA1

                                                  f46661e4e3c6ff97edc75720865647d1dd0a2738

                                                  SHA256

                                                  ee406610f6eb28d9366788013ff2d34cce232866515906134cf9a608a2a72f41

                                                  SHA512

                                                  a119a9b59641e6ca053911b084eee025b991d095f528120ae15b0b6d4321faf77c0b7d4b84875bca09f81bc80b53122bf37d98341d74dda93d9e48712f9a95eb

                                                • \Users\Admin\AppData\Local\Temp\Unicorn-48083.exe

                                                  Filesize

                                                  184KB

                                                  MD5

                                                  6bf8f8a5800d26a1ed2e59ed7d280dff

                                                  SHA1

                                                  f6bf7833f1da0543f6601f5f3eed90870e19f6ce

                                                  SHA256

                                                  bad822771923a3989af424477321af7bc0b05314d28aeed9b845ba0274f47c52

                                                  SHA512

                                                  8fa267aa9547c407ebd79449e7b9619996671cbca53ef0b64b68e469bc7a2a5547ad2fb6118ac5ef5e53c42bfbf302eda42dacf10d20c834cb42e379b5865e5f

                                                • \Users\Admin\AppData\Local\Temp\Unicorn-57616.exe

                                                  Filesize

                                                  184KB

                                                  MD5

                                                  4aa203eb6cc0912abb00e5715747a453

                                                  SHA1

                                                  ca2662abc1ef7d06f55ee209a5b3abdc383c729e

                                                  SHA256

                                                  711aaf9b397bff6a2d51bb049c7bbc1d8ba896f2fb0293bc954607883704359e

                                                  SHA512

                                                  c04f1c11e01d68da5c081ba89c8531815b8b5cfac2959274459559805238af887c4d41b2a1a8925d837960605e35118e9d9d8318553b1bb46dab4e63e4ba4cc1

                                                • \Users\Admin\AppData\Local\Temp\Unicorn-58041.exe

                                                  Filesize

                                                  184KB

                                                  MD5

                                                  8090da052f4367b83113e87946988631

                                                  SHA1

                                                  23a01cc145d2b38b619d083f2bd11ffb3b6651f5

                                                  SHA256

                                                  199e7155bc399b89d4ac66f51a097ab797e416785683bdeb9ed6329c06a9555a

                                                  SHA512

                                                  ff20b9262c03a7a2ae2573a1b302da10f4f243da173e905e5a2d4f9916e3ea30d55ec363e6e2f38254a5b9ef5b70e3a528a89faa52930976bf92aa7818a2c4c9

                                                • \Users\Admin\AppData\Local\Temp\Unicorn-8321.exe

                                                  Filesize

                                                  184KB

                                                  MD5

                                                  1586ee8799f615c7b00897def60c8f97

                                                  SHA1

                                                  d3626bf7a0626f2e782e6670395b925d9ba47360

                                                  SHA256

                                                  cfa3cbb63576b108b4922263b492f459afdea922410b6450f638aa84669e8dc0

                                                  SHA512

                                                  06c4812ac4b23845f88bb37701a9dee065ea1193861d62a73469f0beafbe2922bd93a83d454fcb66e3b142af2c796e663a1b0367a7312580038bf35c7949943d

                                                • \Users\Admin\AppData\Local\Temp\Unicorn-8799.exe

                                                  Filesize

                                                  184KB

                                                  MD5

                                                  54b4236be34984e567b48fafc8944703

                                                  SHA1

                                                  9728b2e885c2727a59eceb84c0f4ed2fea092a06

                                                  SHA256

                                                  9e2314964f9d9d1694eac5ee91de7b565c4230e53a0dce11648aae8ad9a999ca

                                                  SHA512

                                                  daf8976cf38f6426b44af3f156f524b6d107b732b7abda6ff3d6a7b2c4deea29cd48cd764e29fb00bedbc11d5fbdc91b2790ef1ebc2061accfb6a9957a943414

                                                • \Users\Admin\AppData\Local\Temp\Unicorn-9530.exe

                                                  Filesize

                                                  184KB

                                                  MD5

                                                  e1c694aeee8fc9ef564192c467a3fda6

                                                  SHA1

                                                  6eb2f8fc1bf58ed79150b619b859a1018d456a98

                                                  SHA256

                                                  f1b01f3479b9d67a0f03cb1439344681bcffe80f68a12dd8868308bb8970293a

                                                  SHA512

                                                  dca3bcc8363dc1c4991be7d038d6f3d50d11b1d4dcc99f761c0f614253ba61a8d227e27b4b7330e4dd5dcfa962e8ad1fb84659dc287ad9901adf8a7dab8fe1c8