Analysis
-
max time kernel
149s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
26-01-2024 09:53
Static task
static1
Behavioral task
behavioral1
Sample
770ad0a2a0dd4fda56129076821b1dda.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
770ad0a2a0dd4fda56129076821b1dda.exe
Resource
win10v2004-20231215-en
General
-
Target
770ad0a2a0dd4fda56129076821b1dda.exe
-
Size
184KB
-
MD5
770ad0a2a0dd4fda56129076821b1dda
-
SHA1
0a5fe4721276f39e64274476a0be7cf2af62a8fe
-
SHA256
0f4cc2300bbee84c79658d471d1f06bcbfca4ac47d539e5eeb47ca459a509fa7
-
SHA512
7ce62acbf39410497ec70fbdd727c8fe74431bc30308e7a0fd1ca271453338bdd32a25974a94282cf2a33ba2d6ff933d07ca7ebd7de09e52caa2c6063e409056
-
SSDEEP
3072:Ws6DoVbmVWAG4ePiHaLHJPcX8sJJMPFnlhQjxKVLE+WlP6pFV:Wsqoe7G4hH2JPcIlFJWlP6pF
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2088 Unicorn-14097.exe 2684 Unicorn-41939.exe 2764 Unicorn-42493.exe 2716 Unicorn-28784.exe 2176 Unicorn-45120.exe 2724 Unicorn-45675.exe 3028 Unicorn-40974.exe 2900 Unicorn-32806.exe 2836 Unicorn-12940.exe 2392 Unicorn-36890.exe 1548 Unicorn-17024.exe 1764 Unicorn-29163.exe 1100 Unicorn-62582.exe 2648 Unicorn-12634.exe 1136 Unicorn-382.exe 2308 Unicorn-45307.exe 2856 Unicorn-12634.exe 2080 Unicorn-25441.exe 2444 Unicorn-28260.exe 1944 Unicorn-12478.exe 1808 Unicorn-32344.exe 836 Unicorn-24861.exe 1680 Unicorn-29499.exe 1232 Unicorn-22085.exe 1820 Unicorn-59588.exe 240 Unicorn-14471.exe 2004 Unicorn-34337.exe 604 Unicorn-38421.exe 3060 Unicorn-30807.exe 1584 Unicorn-44726.exe 2496 Unicorn-48810.exe 2376 Unicorn-53449.exe 1088 Unicorn-53449.exe 2696 Unicorn-25458.exe 2712 Unicorn-13205.exe 2688 Unicorn-17844.exe 2812 Unicorn-8929.exe 2824 Unicorn-33988.exe 2560 Unicorn-16906.exe 2624 Unicorn-9292.exe 2636 Unicorn-29712.exe 3024 Unicorn-49578.exe 2840 Unicorn-32125.exe 2884 Unicorn-10958.exe 2028 Unicorn-51991.exe 2876 Unicorn-15042.exe 624 Unicorn-49614.exe 520 Unicorn-3942.exe 808 Unicorn-6334.exe 1672 Unicorn-26200.exe 1704 Unicorn-6511.exe 2968 Unicorn-62572.exe 2748 Unicorn-24742.exe 1676 Unicorn-32903.exe 2156 Unicorn-3183.exe 2728 Unicorn-30101.exe 2872 Unicorn-13928.exe 2764 Unicorn-44541.exe 2740 Unicorn-46617.exe 1156 Unicorn-51656.exe 1188 Unicorn-48506.exe 1548 Unicorn-12673.exe 2420 Unicorn-33094.exe 2900 Unicorn-28818.exe -
Loads dropped DLL 64 IoCs
pid Process 1628 770ad0a2a0dd4fda56129076821b1dda.exe 1628 770ad0a2a0dd4fda56129076821b1dda.exe 2088 Unicorn-14097.exe 1628 770ad0a2a0dd4fda56129076821b1dda.exe 2088 Unicorn-14097.exe 1628 770ad0a2a0dd4fda56129076821b1dda.exe 2764 Unicorn-42493.exe 2764 Unicorn-42493.exe 2684 Unicorn-41939.exe 2088 Unicorn-14097.exe 2684 Unicorn-41939.exe 2088 Unicorn-14097.exe 2176 Unicorn-45120.exe 2176 Unicorn-45120.exe 2684 Unicorn-41939.exe 2716 Unicorn-28784.exe 2716 Unicorn-28784.exe 2724 Unicorn-45675.exe 2684 Unicorn-41939.exe 2724 Unicorn-45675.exe 2764 Unicorn-42493.exe 2764 Unicorn-42493.exe 3028 Unicorn-40974.exe 3028 Unicorn-40974.exe 2176 Unicorn-45120.exe 2176 Unicorn-45120.exe 1548 Unicorn-17024.exe 1548 Unicorn-17024.exe 2836 Unicorn-12940.exe 2392 Unicorn-36890.exe 2392 Unicorn-36890.exe 2900 Unicorn-32806.exe 2836 Unicorn-12940.exe 2724 Unicorn-45675.exe 2900 Unicorn-32806.exe 2724 Unicorn-45675.exe 1764 Unicorn-29163.exe 1100 Unicorn-62582.exe 1764 Unicorn-29163.exe 1100 Unicorn-62582.exe 3028 Unicorn-40974.exe 3028 Unicorn-40974.exe 2648 Unicorn-12634.exe 2648 Unicorn-12634.exe 1548 Unicorn-17024.exe 1548 Unicorn-17024.exe 2856 Unicorn-12634.exe 2856 Unicorn-12634.exe 2836 Unicorn-12940.exe 2836 Unicorn-12940.exe 2900 Unicorn-32806.exe 2900 Unicorn-32806.exe 2308 Unicorn-45307.exe 2308 Unicorn-45307.exe 1136 Unicorn-382.exe 1136 Unicorn-382.exe 2392 Unicorn-36890.exe 2392 Unicorn-36890.exe 1944 Unicorn-12478.exe 1944 Unicorn-12478.exe 1808 Unicorn-32344.exe 1808 Unicorn-32344.exe 1100 Unicorn-62582.exe 1764 Unicorn-29163.exe -
Program crash 2 IoCs
pid pid_target Process procid_target 1712 2824 WerFault.exe 65 1800 1704 WerFault.exe 79 -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1628 770ad0a2a0dd4fda56129076821b1dda.exe 2088 Unicorn-14097.exe 2764 Unicorn-42493.exe 2684 Unicorn-41939.exe 2176 Unicorn-45120.exe 2716 Unicorn-28784.exe 2724 Unicorn-45675.exe 3028 Unicorn-40974.exe 1548 Unicorn-17024.exe 2392 Unicorn-36890.exe 2836 Unicorn-12940.exe 2900 Unicorn-32806.exe 1764 Unicorn-29163.exe 1100 Unicorn-62582.exe 1136 Unicorn-382.exe 2648 Unicorn-12634.exe 2308 Unicorn-45307.exe 2080 Unicorn-25441.exe 2856 Unicorn-12634.exe 2444 Unicorn-28260.exe 1944 Unicorn-12478.exe 1808 Unicorn-32344.exe 836 Unicorn-24861.exe 1680 Unicorn-29499.exe 1232 Unicorn-22085.exe 1820 Unicorn-59588.exe 240 Unicorn-14471.exe 3060 Unicorn-30807.exe 604 Unicorn-38421.exe 2004 Unicorn-34337.exe 1584 Unicorn-44726.exe 2496 Unicorn-48810.exe 1088 Unicorn-53449.exe 2376 Unicorn-53449.exe 2696 Unicorn-25458.exe 2712 Unicorn-13205.exe 2688 Unicorn-17844.exe 2812 Unicorn-8929.exe 2824 Unicorn-33988.exe 2624 Unicorn-9292.exe 2636 Unicorn-29712.exe 3024 Unicorn-49578.exe 2876 Unicorn-15042.exe 520 Unicorn-3942.exe 2840 Unicorn-32125.exe 2028 Unicorn-51991.exe 2968 Unicorn-62572.exe 2884 Unicorn-10958.exe 1672 Unicorn-26200.exe 624 Unicorn-49614.exe 808 Unicorn-6334.exe 1704 Unicorn-6511.exe 2748 Unicorn-24742.exe 1676 Unicorn-32903.exe 2156 Unicorn-3183.exe 2728 Unicorn-30101.exe 2872 Unicorn-13928.exe 2764 Unicorn-44541.exe 2740 Unicorn-46617.exe 2560 Unicorn-16906.exe 1548 Unicorn-12673.exe 1188 Unicorn-48506.exe 1156 Unicorn-51656.exe 2420 Unicorn-33094.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1628 wrote to memory of 2088 1628 770ad0a2a0dd4fda56129076821b1dda.exe 28 PID 1628 wrote to memory of 2088 1628 770ad0a2a0dd4fda56129076821b1dda.exe 28 PID 1628 wrote to memory of 2088 1628 770ad0a2a0dd4fda56129076821b1dda.exe 28 PID 1628 wrote to memory of 2088 1628 770ad0a2a0dd4fda56129076821b1dda.exe 28 PID 2088 wrote to memory of 2684 2088 Unicorn-14097.exe 30 PID 2088 wrote to memory of 2684 2088 Unicorn-14097.exe 30 PID 2088 wrote to memory of 2684 2088 Unicorn-14097.exe 30 PID 2088 wrote to memory of 2684 2088 Unicorn-14097.exe 30 PID 1628 wrote to memory of 2764 1628 770ad0a2a0dd4fda56129076821b1dda.exe 29 PID 1628 wrote to memory of 2764 1628 770ad0a2a0dd4fda56129076821b1dda.exe 29 PID 1628 wrote to memory of 2764 1628 770ad0a2a0dd4fda56129076821b1dda.exe 29 PID 1628 wrote to memory of 2764 1628 770ad0a2a0dd4fda56129076821b1dda.exe 29 PID 2764 wrote to memory of 2716 2764 Unicorn-42493.exe 31 PID 2764 wrote to memory of 2716 2764 Unicorn-42493.exe 31 PID 2764 wrote to memory of 2716 2764 Unicorn-42493.exe 31 PID 2764 wrote to memory of 2716 2764 Unicorn-42493.exe 31 PID 2684 wrote to memory of 2176 2684 Unicorn-41939.exe 32 PID 2684 wrote to memory of 2176 2684 Unicorn-41939.exe 32 PID 2684 wrote to memory of 2176 2684 Unicorn-41939.exe 32 PID 2684 wrote to memory of 2176 2684 Unicorn-41939.exe 32 PID 2088 wrote to memory of 2724 2088 Unicorn-14097.exe 33 PID 2088 wrote to memory of 2724 2088 Unicorn-14097.exe 33 PID 2088 wrote to memory of 2724 2088 Unicorn-14097.exe 33 PID 2088 wrote to memory of 2724 2088 Unicorn-14097.exe 33 PID 2176 wrote to memory of 3028 2176 Unicorn-45120.exe 34 PID 2176 wrote to memory of 3028 2176 Unicorn-45120.exe 34 PID 2176 wrote to memory of 3028 2176 Unicorn-45120.exe 34 PID 2176 wrote to memory of 3028 2176 Unicorn-45120.exe 34 PID 2716 wrote to memory of 2900 2716 Unicorn-28784.exe 35 PID 2716 wrote to memory of 2900 2716 Unicorn-28784.exe 35 PID 2716 wrote to memory of 2900 2716 Unicorn-28784.exe 35 PID 2716 wrote to memory of 2900 2716 Unicorn-28784.exe 35 PID 2684 wrote to memory of 2836 2684 Unicorn-41939.exe 38 PID 2684 wrote to memory of 2836 2684 Unicorn-41939.exe 38 PID 2684 wrote to memory of 2836 2684 Unicorn-41939.exe 38 PID 2684 wrote to memory of 2836 2684 Unicorn-41939.exe 38 PID 2724 wrote to memory of 2392 2724 Unicorn-45675.exe 37 PID 2724 wrote to memory of 2392 2724 Unicorn-45675.exe 37 PID 2724 wrote to memory of 2392 2724 Unicorn-45675.exe 37 PID 2724 wrote to memory of 2392 2724 Unicorn-45675.exe 37 PID 2764 wrote to memory of 1548 2764 Unicorn-42493.exe 36 PID 2764 wrote to memory of 1548 2764 Unicorn-42493.exe 36 PID 2764 wrote to memory of 1548 2764 Unicorn-42493.exe 36 PID 2764 wrote to memory of 1548 2764 Unicorn-42493.exe 36 PID 3028 wrote to memory of 1764 3028 Unicorn-40974.exe 39 PID 3028 wrote to memory of 1764 3028 Unicorn-40974.exe 39 PID 3028 wrote to memory of 1764 3028 Unicorn-40974.exe 39 PID 3028 wrote to memory of 1764 3028 Unicorn-40974.exe 39 PID 2176 wrote to memory of 1100 2176 Unicorn-45120.exe 40 PID 2176 wrote to memory of 1100 2176 Unicorn-45120.exe 40 PID 2176 wrote to memory of 1100 2176 Unicorn-45120.exe 40 PID 2176 wrote to memory of 1100 2176 Unicorn-45120.exe 40 PID 1548 wrote to memory of 2648 1548 Unicorn-17024.exe 42 PID 1548 wrote to memory of 2648 1548 Unicorn-17024.exe 42 PID 1548 wrote to memory of 2648 1548 Unicorn-17024.exe 42 PID 1548 wrote to memory of 2648 1548 Unicorn-17024.exe 42 PID 2392 wrote to memory of 1136 2392 Unicorn-36890.exe 43 PID 2392 wrote to memory of 1136 2392 Unicorn-36890.exe 43 PID 2392 wrote to memory of 1136 2392 Unicorn-36890.exe 43 PID 2392 wrote to memory of 1136 2392 Unicorn-36890.exe 43 PID 2836 wrote to memory of 2856 2836 Unicorn-12940.exe 41 PID 2836 wrote to memory of 2856 2836 Unicorn-12940.exe 41 PID 2836 wrote to memory of 2856 2836 Unicorn-12940.exe 41 PID 2836 wrote to memory of 2856 2836 Unicorn-12940.exe 41
Processes
-
C:\Users\Admin\AppData\Local\Temp\770ad0a2a0dd4fda56129076821b1dda.exe"C:\Users\Admin\AppData\Local\Temp\770ad0a2a0dd4fda56129076821b1dda.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14097.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14097.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-41939.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41939.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45120.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45120.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40974.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40974.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-29163.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29163.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1764 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-28260.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28260.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2444
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53449.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53449.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1088 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15042.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15042.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2876 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3183.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3183.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2156 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13928.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13928.exe10⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2872
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12478.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12478.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44726.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44726.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1584
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62582.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62582.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1100 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-32344.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32344.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48810.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48810.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51991.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51991.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13223.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13223.exe9⤵PID:2236
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30157.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30157.exe10⤵PID:1488
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30711.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30711.exe9⤵PID:1872
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32125.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32125.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30101.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30101.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46617.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46617.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5055.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5055.exe10⤵PID:1688
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26073.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26073.exe11⤵PID:1532
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53449.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53449.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10958.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10958.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12673.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12673.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9331.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9331.exe9⤵PID:748
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8428.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8428.exe10⤵PID:604
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8983.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8983.exe9⤵PID:1976
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12940.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12940.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12634.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12634.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22085.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22085.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1232 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-8929.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8929.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2812 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26200.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26200.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1672 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-33094.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33094.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-1355.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1355.exe10⤵PID:1512
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53737.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53737.exe11⤵PID:2656
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33871.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33871.exe10⤵PID:2940
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6334.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6334.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:808
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33988.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33988.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2824 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2824 -s 2447⤵
- Program crash
PID:1712
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59588.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59588.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1820
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45675.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45675.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-36890.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36890.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-382.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-382.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1136 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38421.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38421.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:604 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16906.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16906.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50364.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50364.exe8⤵PID:3004
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41293.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41293.exe9⤵PID:1636
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41847.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41847.exe8⤵PID:2596
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9292.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9292.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2624 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6511.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6511.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1704 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1704 -s 2448⤵
- Program crash
PID:1800
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30807.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30807.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3060
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25441.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25441.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2080
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42493.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42493.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-28784.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28784.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-32806.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32806.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2900 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45307.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45307.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2308 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34337.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34337.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49578.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49578.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-32903.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32903.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48506.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48506.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1188 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17500.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17500.exe10⤵PID:1652
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26265.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26265.exe11⤵PID:2052
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22735.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22735.exe10⤵PID:2312
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63171.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63171.exe9⤵PID:2916
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17905.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17905.exe10⤵PID:1972
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29712.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29712.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-24742.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24742.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2748
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14471.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14471.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:240
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17024.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17024.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1548 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12634.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12634.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-24861.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24861.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:836 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13205.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13205.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2712
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49614.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49614.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:624 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-28818.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28818.exe7⤵
- Executes dropped EXE
PID:2900
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17844.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17844.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2688 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62572.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62572.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44541.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44541.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51656.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51656.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1156 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46088.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46088.exe9⤵PID:1380
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46685.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46685.exe10⤵PID:112
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26819.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26819.exe9⤵PID:2308
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29499.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29499.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-25458.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25458.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3942.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3942.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:520
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD5b5bbc07b36443020df3418dbc7506311
SHA17d788e75faadc44b58bd20667b0a44d64781b0f8
SHA25644f906665732f903e8508f52fb52e394ad42a271e9b567bf38580d65c8c9cf93
SHA512e6be3d3836275d2e32489823f1f0a6afae7b53e0abcee1c3054a56d0145bbc20c03b8ba50b4dcbf189fa0494a1a7a9b774b798fb8c5394d908025a7a7f309f64
-
Filesize
184KB
MD5e16671f12e99f58cf3adc9f016d5314d
SHA11f489faf60c8533ddd554ab2612aea590f078689
SHA2567eabc1383d8dc71fb45be1b736d6a3511cbdf8a5a98a015cb99e8f461f380d44
SHA5126889abd7e7682f3b09ebb026a8e4e130941d026b648b4ed95a297c0d7ad48cc7f9dbcc041e87c2d9f5ea55712ed05def0622d48698d47a167d80b958008db82c
-
Filesize
128KB
MD5090a50c8ac059a4e3e142911275161ec
SHA1d90df6afee9132c6e7e6582d0ef06e28c3fa6f92
SHA256b28959199a0f322dd0941dedd83ad537c3284ae499ea6161ce4824f07fd0ea28
SHA512e54b61210b93d0466e399981e78f15d2f5c5712299e18e0e46738dca882b56c2413abb4fbe87f2591517f40fb37f1598fb631dd0af23b241cc5d1c9469cbd0e8
-
Filesize
64KB
MD584ee27bb4c52be851c395b015e9db335
SHA10ee51e09a63d3ffb040510b0d627ad7e761b4703
SHA2566468cbeb7faa2ae93da5ff2dae4d9926a7130fc61b899b82a691389f28caa02b
SHA51213e0c625dff5ad2d1b58a5350d12a7f4dd543d086b1eaaadcdb3f0579c02ccade613e3593f906b720eb361e7b71e376341e06ee6d757a9a5d11ffc5fc4d40bc0
-
Filesize
184KB
MD59ac53d8a5f0e92fe3eebf202965bd1e6
SHA1681dfcbb12016ebba958fa72bb6cd91de8de3e84
SHA256dffad7977eec5e844e383dd476a9ebcddd53814e26a03c760ffbb8a71112c093
SHA51263c5fa438eecd7da30ba21470b5c63f3f9118e6f719706ef4c0bd01deec01e2e06832d29652f1a2bba5100be13347b963d60c07281338db42705c74e313c1c71
-
Filesize
184KB
MD5815d5e952163f9273c2de41a9dbb4000
SHA144ba6414427dce1ef35e0dcbf6aa3a3db61a5f9d
SHA256805a7623af9e4eab4715315ffe48bcf347e61693663ac5ab88525441831d04f7
SHA5127a6825a10436190c4903053361b6487209ab665768e461c241b0ec8419a1a7fe8e3fac0e78e399e61a80f62d8d2a87db91c134a5f2170fca2bc7b958c8b717dd
-
Filesize
184KB
MD58d78c38d4f37eba960d0bda249d39e77
SHA17f5bc75903c19886cc0d540915468e7fe6de652b
SHA256d5bc5602bf0ccd5f0c54196c138cb47d1f69dc3c9ab34ed5ca87d69e1b6a152d
SHA51265f8183c93ef367c508927f999f5fbe89d6775697df4004865c2d5db6f327d76c97d09637c200a6bbb0a54ff3b0a7423d3229d2a06700ee11bcc96ad353c0606
-
Filesize
184KB
MD58d889a558e4a65d2a8a598973242e312
SHA1823a364fdfcb87cbf83bd788c0432b584ddae9ee
SHA256f4a11bd0f8171a7cd4075760a51381e40517c20928d3a8a382ad97a6c8ee501d
SHA5127c2d7c4f77f6066d5a2cacd49fb48bb1aced53fc815e1de3f9fb461b5b4e403abee3db20b16350d07f0b649e2252faf192ecd9452d0ce98fa8ccc402f64dc315
-
Filesize
184KB
MD53cc53d6d27d88a75d36292b6ccda3fe1
SHA1e0eede547e684a084ddec930ac7fceaa62479a42
SHA2560ce0bd5d27825ff05efd354d80174c4e6f3fa9d4274f6ea720c5d23ca5267102
SHA512c369735829e99780b9d7af1d3fc05bedfb7cc92e050c7d54bf8ccf3f0e374efaf69f038687d7996cbb55b575b478d9ee8d0fe9491ebd8d87afa1ba52198b1804
-
Filesize
184KB
MD5ddd969d3a8dcf1adeca493340f7e0335
SHA13755ac415723c32db09520e5a57a0e6ab2efd588
SHA256d4909e2b82ad19e9f46822629d7609cd49f772564359aec50a115bce3bc177ec
SHA512869fff3be137f047286a53234c98ca55aa4c170e1eecff0fdcb447976615290771a00a19b864d3cdb2c18bf592e62a1088857994437d991c8e31193632041fd5
-
Filesize
184KB
MD52cf9063e5919d5897abafc0bedc2ade9
SHA1a215a5b661697231fb937a3dbd95376a2d8aa672
SHA256f4987d9a44fd83e97b993ba2a131642e110bce6cd5a344f31938c72194bc030c
SHA5123a6ab11557953a6804b7c2a46e1386222daa29493bc6dfd6ddadb492405e5d470075e2ad45353f3ee737ba3c51caa056cdef96176aa2b8e152290e24cd0a1924
-
Filesize
64KB
MD513b38013225aa0ceb3b8a1be5d63b8bf
SHA196320ee0cd903e908577537fc96f582b96fca9b9
SHA2564ac9d7140c0c722f3f0ca3c064fb38309b036623b17ad9f173683cd8e34ce796
SHA512782e90638b2b8671df42a6d45e13d2cd8ca09dc0effd1d59556870c8e1d5b6764dd9bc7124ad42b2c18cf2c55b3e0de058cf1437419e11a123cc1330cb076133
-
Filesize
184KB
MD570536c76d37359deb0f0fa10148cea5a
SHA128d654d38fede54250dae86181fd156d5cf9f6ad
SHA25684152a33f07e0f077e4d94d703849f22037b48e0114b91d0a579e4c0cfddac47
SHA512b22855251d9a336d69dc461d3eb87a75373d0445189e6afadbc20d5f6852305c3bb528f29c507e968545de6ce6751e0188695a5e9b452a4fbab53dfe97918ab3
-
Filesize
184KB
MD5ef4c4cb2b48f2e8af3863141c16e88d3
SHA13e70b11e340da194e7b1be874d7541d14feebee6
SHA25693f6a113efb08e19d67b4c3d7c19955d6c6d6fae6883a031fb22851dc31cf6b2
SHA51281270bc5aa7ce601fad493345c4347bfb87260a8e1db06910c6e4e6956f86f48e32b06e6ca41f0b13b214b0d7c39dcd8d8aa1ec411deff19409837fba7aa1381
-
Filesize
184KB
MD57707462a41ac11f66191ff5a9ba55ddf
SHA1df0baa4b4b1cfe366ca629e678fbd3b79f438deb
SHA2567ab1c4123ffd4633debea042eb5069001b58a9f6964a870d8cbc5c89f88f5514
SHA512edcfce0432360c725904d51b23f7b30fc5a13b62aa14173105affbd0b0015ba44868091aab6896e87a1c8ede3a7e909371c21716eed55e4107ed6d384a16dcea
-
Filesize
184KB
MD5a94718276984f8ce2db37b327710d812
SHA1244ebb04f76f21ff0383e5d25a88d09f21dcec7f
SHA256d4af1ee9306fdd4f50fe5952fd9787ff3a6d5cafd27faf7cfb185a7c72529243
SHA51257cdaef9ddd724105a68cdd6d24749a915c09753a91709a689879105c72ff1b2cb3e79df7f4421e230dd23c6db6c62de74f43946de47ef01b0ed65f3365e4a07
-
Filesize
184KB
MD5318b20e92a5aff6cd52beb6332b89187
SHA14f01afdfc2b98fd032354897c00594220d34044d
SHA256b3d436cda5042d661b5bc9cdb7c53fc922944ba7506f714f2dd090aaaebb6396
SHA512fbc5fda7296ea9293a35651e21049c1fde9839e9edaf5c3dfbc809feae8597e430e118c6c581f469b02512bea2a4fb101305dc458d9e1cfb242a2d62f6644ffd
-
Filesize
184KB
MD519d2f686d9cdf99e7f6e143f93024097
SHA151f0a25f64a592d12e9f855b2f339fc04d79abe1
SHA25693f3ef8b887918ef2c245f9bed4d13019f3d948bc18cc0c89dd1d0e5c4307738
SHA512a4f52f52572e5030a658a8cfe1d666a017fb28b701a39fbf06dae68e107f21226b76ae7f9a2c4043506a6f64d1905c1fda2f754537842512e4a4277c8f0d2292
-
Filesize
184KB
MD56e12d690076e7817f9ad11bd84362e70
SHA11b33400f1c38de5f0c7f6d751dbba60f95408644
SHA25632051bdbadd2f3d93caffbd3ca49cd70820c7a2844bae97bbd70516057337849
SHA512492715a5f43ace5a7729a0af5cedb36303148d91d6160874f3faf586975d771863cad0314661e5571e56dafbad713f8daf0f10f44da7cd237543f743f8545d77
-
Filesize
184KB
MD51fdd8cc154c6bd2eef52e9cf11856354
SHA151e1de40c10461a740772ca41809ef9761d9516b
SHA256f97dddf2677cd7c4fc22a0a4f29a62b605cfac93803be75d310516d176780a9f
SHA5120a7c49bbca3022c70e8e7566e31cecc9334cedbafe63fe58268fcab8df8e6bc7da49e1fd9b4cb24dc89126c77d3560c45561447ac0eb3e3e06f24267ba3ef868
-
Filesize
184KB
MD55755f23dcabc896e34ad6a16f395943b
SHA196397944ab8bf78f2fc1ce15cdd955f37de84f45
SHA256d11e863242714f22377a04933fcb3b953b8048db87a7519adc9acd494a524d70
SHA5124addcd7dcebc69fd838e9d04764b9ad1e1010fb56a36fdfcfc64a5f61658bb423a7786790640566d80cf1cb1c98767b984a8375c86e40a261638dfcbbf62bb27