Analysis

  • max time kernel
    149s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    26-01-2024 09:53

General

  • Target

    770ad0a2a0dd4fda56129076821b1dda.exe

  • Size

    184KB

  • MD5

    770ad0a2a0dd4fda56129076821b1dda

  • SHA1

    0a5fe4721276f39e64274476a0be7cf2af62a8fe

  • SHA256

    0f4cc2300bbee84c79658d471d1f06bcbfca4ac47d539e5eeb47ca459a509fa7

  • SHA512

    7ce62acbf39410497ec70fbdd727c8fe74431bc30308e7a0fd1ca271453338bdd32a25974a94282cf2a33ba2d6ff933d07ca7ebd7de09e52caa2c6063e409056

  • SSDEEP

    3072:Ws6DoVbmVWAG4ePiHaLHJPcX8sJJMPFnlhQjxKVLE+WlP6pFV:Wsqoe7G4hH2JPcIlFJWlP6pF

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 64 IoCs
  • Loads dropped DLL 64 IoCs
  • Program crash 2 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\770ad0a2a0dd4fda56129076821b1dda.exe
    "C:\Users\Admin\AppData\Local\Temp\770ad0a2a0dd4fda56129076821b1dda.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1628
    • C:\Users\Admin\AppData\Local\Temp\Unicorn-14097.exe
      C:\Users\Admin\AppData\Local\Temp\Unicorn-14097.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2088
      • C:\Users\Admin\AppData\Local\Temp\Unicorn-41939.exe
        C:\Users\Admin\AppData\Local\Temp\Unicorn-41939.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2684
        • C:\Users\Admin\AppData\Local\Temp\Unicorn-45120.exe
          C:\Users\Admin\AppData\Local\Temp\Unicorn-45120.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2176
          • C:\Users\Admin\AppData\Local\Temp\Unicorn-40974.exe
            C:\Users\Admin\AppData\Local\Temp\Unicorn-40974.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:3028
            • C:\Users\Admin\AppData\Local\Temp\Unicorn-29163.exe
              C:\Users\Admin\AppData\Local\Temp\Unicorn-29163.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              PID:1764
              • C:\Users\Admin\AppData\Local\Temp\Unicorn-28260.exe
                C:\Users\Admin\AppData\Local\Temp\Unicorn-28260.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:2444
              • C:\Users\Admin\AppData\Local\Temp\Unicorn-53449.exe
                C:\Users\Admin\AppData\Local\Temp\Unicorn-53449.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:1088
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-15042.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-15042.exe
                  8⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:2876
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-3183.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-3183.exe
                    9⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:2156
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-13928.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-13928.exe
                      10⤵
                      • Executes dropped EXE
                      • Suspicious use of SetWindowsHookEx
                      PID:2872
            • C:\Users\Admin\AppData\Local\Temp\Unicorn-12478.exe
              C:\Users\Admin\AppData\Local\Temp\Unicorn-12478.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              PID:1944
              • C:\Users\Admin\AppData\Local\Temp\Unicorn-44726.exe
                C:\Users\Admin\AppData\Local\Temp\Unicorn-44726.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:1584
          • C:\Users\Admin\AppData\Local\Temp\Unicorn-62582.exe
            C:\Users\Admin\AppData\Local\Temp\Unicorn-62582.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            PID:1100
            • C:\Users\Admin\AppData\Local\Temp\Unicorn-32344.exe
              C:\Users\Admin\AppData\Local\Temp\Unicorn-32344.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              PID:1808
              • C:\Users\Admin\AppData\Local\Temp\Unicorn-48810.exe
                C:\Users\Admin\AppData\Local\Temp\Unicorn-48810.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:2496
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-51991.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-51991.exe
                  8⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:2028
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-13223.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-13223.exe
                    9⤵
                      PID:2236
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-30157.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-30157.exe
                        10⤵
                          PID:1488
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-30711.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-30711.exe
                        9⤵
                          PID:1872
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-32125.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-32125.exe
                      7⤵
                      • Executes dropped EXE
                      • Suspicious use of SetWindowsHookEx
                      PID:2840
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-30101.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-30101.exe
                        8⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:2728
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-46617.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-46617.exe
                          9⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:2740
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-5055.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-5055.exe
                            10⤵
                              PID:1688
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-26073.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-26073.exe
                                11⤵
                                  PID:1532
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-53449.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-53449.exe
                        6⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:2376
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-10958.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-10958.exe
                          7⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:2884
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-12673.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-12673.exe
                            8⤵
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            PID:1548
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-9331.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-9331.exe
                              9⤵
                                PID:748
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-8428.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-8428.exe
                                  10⤵
                                    PID:604
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-8983.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-8983.exe
                                  9⤵
                                    PID:1976
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-12940.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-12940.exe
                          4⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Suspicious use of SetWindowsHookEx
                          • Suspicious use of WriteProcessMemory
                          PID:2836
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-12634.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-12634.exe
                            5⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Suspicious use of SetWindowsHookEx
                            PID:2856
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-22085.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-22085.exe
                              6⤵
                              • Executes dropped EXE
                              • Suspicious use of SetWindowsHookEx
                              PID:1232
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-8929.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-8929.exe
                                7⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                PID:2812
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-26200.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-26200.exe
                                  8⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetWindowsHookEx
                                  PID:1672
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-33094.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-33094.exe
                                    9⤵
                                    • Executes dropped EXE
                                    • Suspicious use of SetWindowsHookEx
                                    PID:2420
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-1355.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-1355.exe
                                      10⤵
                                        PID:1512
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-53737.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-53737.exe
                                          11⤵
                                            PID:2656
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-33871.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-33871.exe
                                          10⤵
                                            PID:2940
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-6334.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-6334.exe
                                      7⤵
                                      • Executes dropped EXE
                                      • Suspicious use of SetWindowsHookEx
                                      PID:808
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-33988.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-33988.exe
                                    6⤵
                                    • Executes dropped EXE
                                    • Suspicious use of SetWindowsHookEx
                                    PID:2824
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -u -p 2824 -s 244
                                      7⤵
                                      • Program crash
                                      PID:1712
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-59588.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-59588.exe
                                  5⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetWindowsHookEx
                                  PID:1820
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-45675.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-45675.exe
                              3⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • Suspicious use of SetWindowsHookEx
                              • Suspicious use of WriteProcessMemory
                              PID:2724
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-36890.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-36890.exe
                                4⤵
                                • Executes dropped EXE
                                • Loads dropped DLL
                                • Suspicious use of SetWindowsHookEx
                                • Suspicious use of WriteProcessMemory
                                PID:2392
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-382.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-382.exe
                                  5⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Suspicious use of SetWindowsHookEx
                                  PID:1136
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-38421.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-38421.exe
                                    6⤵
                                    • Executes dropped EXE
                                    • Suspicious use of SetWindowsHookEx
                                    PID:604
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-16906.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-16906.exe
                                      7⤵
                                      • Executes dropped EXE
                                      • Suspicious use of SetWindowsHookEx
                                      PID:2560
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-50364.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-50364.exe
                                        8⤵
                                          PID:3004
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-41293.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-41293.exe
                                            9⤵
                                              PID:1636
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-41847.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-41847.exe
                                            8⤵
                                              PID:2596
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-9292.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-9292.exe
                                          6⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetWindowsHookEx
                                          PID:2624
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-6511.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-6511.exe
                                            7⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetWindowsHookEx
                                            PID:1704
                                            • C:\Windows\SysWOW64\WerFault.exe
                                              C:\Windows\SysWOW64\WerFault.exe -u -p 1704 -s 244
                                              8⤵
                                              • Program crash
                                              PID:1800
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-30807.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-30807.exe
                                        5⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetWindowsHookEx
                                        PID:3060
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-25441.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-25441.exe
                                      4⤵
                                      • Executes dropped EXE
                                      • Suspicious use of SetWindowsHookEx
                                      PID:2080
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-42493.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-42493.exe
                                  2⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Suspicious use of SetWindowsHookEx
                                  • Suspicious use of WriteProcessMemory
                                  PID:2764
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-28784.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-28784.exe
                                    3⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • Suspicious use of SetWindowsHookEx
                                    • Suspicious use of WriteProcessMemory
                                    PID:2716
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-32806.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-32806.exe
                                      4⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Suspicious use of SetWindowsHookEx
                                      PID:2900
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-45307.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-45307.exe
                                        5⤵
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        • Suspicious use of SetWindowsHookEx
                                        PID:2308
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-34337.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-34337.exe
                                          6⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetWindowsHookEx
                                          PID:2004
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-49578.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-49578.exe
                                            7⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetWindowsHookEx
                                            PID:3024
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-32903.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-32903.exe
                                              8⤵
                                              • Executes dropped EXE
                                              • Suspicious use of SetWindowsHookEx
                                              PID:1676
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-48506.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-48506.exe
                                                9⤵
                                                • Executes dropped EXE
                                                • Suspicious use of SetWindowsHookEx
                                                PID:1188
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-17500.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-17500.exe
                                                  10⤵
                                                    PID:1652
                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-26265.exe
                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-26265.exe
                                                      11⤵
                                                        PID:2052
                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-22735.exe
                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-22735.exe
                                                      10⤵
                                                        PID:2312
                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-63171.exe
                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-63171.exe
                                                      9⤵
                                                        PID:2916
                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-17905.exe
                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-17905.exe
                                                          10⤵
                                                            PID:1972
                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-29712.exe
                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-29712.exe
                                                    6⤵
                                                    • Executes dropped EXE
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:2636
                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-24742.exe
                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-24742.exe
                                                      7⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:2748
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-14471.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-14471.exe
                                                  5⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:240
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-17024.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-17024.exe
                                              3⤵
                                              • Executes dropped EXE
                                              • Loads dropped DLL
                                              • Suspicious use of SetWindowsHookEx
                                              • Suspicious use of WriteProcessMemory
                                              PID:1548
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-12634.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-12634.exe
                                                4⤵
                                                • Executes dropped EXE
                                                • Loads dropped DLL
                                                • Suspicious use of SetWindowsHookEx
                                                PID:2648
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-24861.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-24861.exe
                                                  5⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:836
                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-13205.exe
                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-13205.exe
                                                    6⤵
                                                    • Executes dropped EXE
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:2712
                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-49614.exe
                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-49614.exe
                                                    6⤵
                                                    • Executes dropped EXE
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:624
                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-28818.exe
                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-28818.exe
                                                      7⤵
                                                      • Executes dropped EXE
                                                      PID:2900
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-17844.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-17844.exe
                                                  5⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:2688
                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-62572.exe
                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-62572.exe
                                                    6⤵
                                                    • Executes dropped EXE
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:2968
                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-44541.exe
                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-44541.exe
                                                      7⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:2764
                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-51656.exe
                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-51656.exe
                                                        8⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:1156
                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-46088.exe
                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-46088.exe
                                                          9⤵
                                                            PID:1380
                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-46685.exe
                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-46685.exe
                                                              10⤵
                                                                PID:112
                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-26819.exe
                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-26819.exe
                                                              9⤵
                                                                PID:2308
                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-29499.exe
                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-29499.exe
                                                      4⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:1680
                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-25458.exe
                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-25458.exe
                                                        5⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:2696
                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-3942.exe
                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-3942.exe
                                                          6⤵
                                                          • Executes dropped EXE
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:520

                                              Network

                                              MITRE ATT&CK Matrix

                                              Replay Monitor

                                              Loading Replay Monitor...

                                              Downloads

                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-12634.exe

                                                Filesize

                                                184KB

                                                MD5

                                                b5bbc07b36443020df3418dbc7506311

                                                SHA1

                                                7d788e75faadc44b58bd20667b0a44d64781b0f8

                                                SHA256

                                                44f906665732f903e8508f52fb52e394ad42a271e9b567bf38580d65c8c9cf93

                                                SHA512

                                                e6be3d3836275d2e32489823f1f0a6afae7b53e0abcee1c3054a56d0145bbc20c03b8ba50b4dcbf189fa0494a1a7a9b774b798fb8c5394d908025a7a7f309f64

                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-12940.exe

                                                Filesize

                                                184KB

                                                MD5

                                                e16671f12e99f58cf3adc9f016d5314d

                                                SHA1

                                                1f489faf60c8533ddd554ab2612aea590f078689

                                                SHA256

                                                7eabc1383d8dc71fb45be1b736d6a3511cbdf8a5a98a015cb99e8f461f380d44

                                                SHA512

                                                6889abd7e7682f3b09ebb026a8e4e130941d026b648b4ed95a297c0d7ad48cc7f9dbcc041e87c2d9f5ea55712ed05def0622d48698d47a167d80b958008db82c

                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-32806.exe

                                                Filesize

                                                128KB

                                                MD5

                                                090a50c8ac059a4e3e142911275161ec

                                                SHA1

                                                d90df6afee9132c6e7e6582d0ef06e28c3fa6f92

                                                SHA256

                                                b28959199a0f322dd0941dedd83ad537c3284ae499ea6161ce4824f07fd0ea28

                                                SHA512

                                                e54b61210b93d0466e399981e78f15d2f5c5712299e18e0e46738dca882b56c2413abb4fbe87f2591517f40fb37f1598fb631dd0af23b241cc5d1c9469cbd0e8

                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-36890.exe

                                                Filesize

                                                64KB

                                                MD5

                                                84ee27bb4c52be851c395b015e9db335

                                                SHA1

                                                0ee51e09a63d3ffb040510b0d627ad7e761b4703

                                                SHA256

                                                6468cbeb7faa2ae93da5ff2dae4d9926a7130fc61b899b82a691389f28caa02b

                                                SHA512

                                                13e0c625dff5ad2d1b58a5350d12a7f4dd543d086b1eaaadcdb3f0579c02ccade613e3593f906b720eb361e7b71e376341e06ee6d757a9a5d11ffc5fc4d40bc0

                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-6511.exe

                                                Filesize

                                                184KB

                                                MD5

                                                9ac53d8a5f0e92fe3eebf202965bd1e6

                                                SHA1

                                                681dfcbb12016ebba958fa72bb6cd91de8de3e84

                                                SHA256

                                                dffad7977eec5e844e383dd476a9ebcddd53814e26a03c760ffbb8a71112c093

                                                SHA512

                                                63c5fa438eecd7da30ba21470b5c63f3f9118e6f719706ef4c0bd01deec01e2e06832d29652f1a2bba5100be13347b963d60c07281338db42705c74e313c1c71

                                              • \Users\Admin\AppData\Local\Temp\Unicorn-14097.exe

                                                Filesize

                                                184KB

                                                MD5

                                                815d5e952163f9273c2de41a9dbb4000

                                                SHA1

                                                44ba6414427dce1ef35e0dcbf6aa3a3db61a5f9d

                                                SHA256

                                                805a7623af9e4eab4715315ffe48bcf347e61693663ac5ab88525441831d04f7

                                                SHA512

                                                7a6825a10436190c4903053361b6487209ab665768e461c241b0ec8419a1a7fe8e3fac0e78e399e61a80f62d8d2a87db91c134a5f2170fca2bc7b958c8b717dd

                                              • \Users\Admin\AppData\Local\Temp\Unicorn-17024.exe

                                                Filesize

                                                184KB

                                                MD5

                                                8d78c38d4f37eba960d0bda249d39e77

                                                SHA1

                                                7f5bc75903c19886cc0d540915468e7fe6de652b

                                                SHA256

                                                d5bc5602bf0ccd5f0c54196c138cb47d1f69dc3c9ab34ed5ca87d69e1b6a152d

                                                SHA512

                                                65f8183c93ef367c508927f999f5fbe89d6775697df4004865c2d5db6f327d76c97d09637c200a6bbb0a54ff3b0a7423d3229d2a06700ee11bcc96ad353c0606

                                              • \Users\Admin\AppData\Local\Temp\Unicorn-25441.exe

                                                Filesize

                                                184KB

                                                MD5

                                                8d889a558e4a65d2a8a598973242e312

                                                SHA1

                                                823a364fdfcb87cbf83bd788c0432b584ddae9ee

                                                SHA256

                                                f4a11bd0f8171a7cd4075760a51381e40517c20928d3a8a382ad97a6c8ee501d

                                                SHA512

                                                7c2d7c4f77f6066d5a2cacd49fb48bb1aced53fc815e1de3f9fb461b5b4e403abee3db20b16350d07f0b649e2252faf192ecd9452d0ce98fa8ccc402f64dc315

                                              • \Users\Admin\AppData\Local\Temp\Unicorn-28784.exe

                                                Filesize

                                                184KB

                                                MD5

                                                3cc53d6d27d88a75d36292b6ccda3fe1

                                                SHA1

                                                e0eede547e684a084ddec930ac7fceaa62479a42

                                                SHA256

                                                0ce0bd5d27825ff05efd354d80174c4e6f3fa9d4274f6ea720c5d23ca5267102

                                                SHA512

                                                c369735829e99780b9d7af1d3fc05bedfb7cc92e050c7d54bf8ccf3f0e374efaf69f038687d7996cbb55b575b478d9ee8d0fe9491ebd8d87afa1ba52198b1804

                                              • \Users\Admin\AppData\Local\Temp\Unicorn-29163.exe

                                                Filesize

                                                184KB

                                                MD5

                                                ddd969d3a8dcf1adeca493340f7e0335

                                                SHA1

                                                3755ac415723c32db09520e5a57a0e6ab2efd588

                                                SHA256

                                                d4909e2b82ad19e9f46822629d7609cd49f772564359aec50a115bce3bc177ec

                                                SHA512

                                                869fff3be137f047286a53234c98ca55aa4c170e1eecff0fdcb447976615290771a00a19b864d3cdb2c18bf592e62a1088857994437d991c8e31193632041fd5

                                              • \Users\Admin\AppData\Local\Temp\Unicorn-32806.exe

                                                Filesize

                                                184KB

                                                MD5

                                                2cf9063e5919d5897abafc0bedc2ade9

                                                SHA1

                                                a215a5b661697231fb937a3dbd95376a2d8aa672

                                                SHA256

                                                f4987d9a44fd83e97b993ba2a131642e110bce6cd5a344f31938c72194bc030c

                                                SHA512

                                                3a6ab11557953a6804b7c2a46e1386222daa29493bc6dfd6ddadb492405e5d470075e2ad45353f3ee737ba3c51caa056cdef96176aa2b8e152290e24cd0a1924

                                              • \Users\Admin\AppData\Local\Temp\Unicorn-32806.exe

                                                Filesize

                                                64KB

                                                MD5

                                                13b38013225aa0ceb3b8a1be5d63b8bf

                                                SHA1

                                                96320ee0cd903e908577537fc96f582b96fca9b9

                                                SHA256

                                                4ac9d7140c0c722f3f0ca3c064fb38309b036623b17ad9f173683cd8e34ce796

                                                SHA512

                                                782e90638b2b8671df42a6d45e13d2cd8ca09dc0effd1d59556870c8e1d5b6764dd9bc7124ad42b2c18cf2c55b3e0de058cf1437419e11a123cc1330cb076133

                                              • \Users\Admin\AppData\Local\Temp\Unicorn-36890.exe

                                                Filesize

                                                184KB

                                                MD5

                                                70536c76d37359deb0f0fa10148cea5a

                                                SHA1

                                                28d654d38fede54250dae86181fd156d5cf9f6ad

                                                SHA256

                                                84152a33f07e0f077e4d94d703849f22037b48e0114b91d0a579e4c0cfddac47

                                                SHA512

                                                b22855251d9a336d69dc461d3eb87a75373d0445189e6afadbc20d5f6852305c3bb528f29c507e968545de6ce6751e0188695a5e9b452a4fbab53dfe97918ab3

                                              • \Users\Admin\AppData\Local\Temp\Unicorn-382.exe

                                                Filesize

                                                184KB

                                                MD5

                                                ef4c4cb2b48f2e8af3863141c16e88d3

                                                SHA1

                                                3e70b11e340da194e7b1be874d7541d14feebee6

                                                SHA256

                                                93f6a113efb08e19d67b4c3d7c19955d6c6d6fae6883a031fb22851dc31cf6b2

                                                SHA512

                                                81270bc5aa7ce601fad493345c4347bfb87260a8e1db06910c6e4e6956f86f48e32b06e6ca41f0b13b214b0d7c39dcd8d8aa1ec411deff19409837fba7aa1381

                                              • \Users\Admin\AppData\Local\Temp\Unicorn-40974.exe

                                                Filesize

                                                184KB

                                                MD5

                                                7707462a41ac11f66191ff5a9ba55ddf

                                                SHA1

                                                df0baa4b4b1cfe366ca629e678fbd3b79f438deb

                                                SHA256

                                                7ab1c4123ffd4633debea042eb5069001b58a9f6964a870d8cbc5c89f88f5514

                                                SHA512

                                                edcfce0432360c725904d51b23f7b30fc5a13b62aa14173105affbd0b0015ba44868091aab6896e87a1c8ede3a7e909371c21716eed55e4107ed6d384a16dcea

                                              • \Users\Admin\AppData\Local\Temp\Unicorn-41939.exe

                                                Filesize

                                                184KB

                                                MD5

                                                a94718276984f8ce2db37b327710d812

                                                SHA1

                                                244ebb04f76f21ff0383e5d25a88d09f21dcec7f

                                                SHA256

                                                d4af1ee9306fdd4f50fe5952fd9787ff3a6d5cafd27faf7cfb185a7c72529243

                                                SHA512

                                                57cdaef9ddd724105a68cdd6d24749a915c09753a91709a689879105c72ff1b2cb3e79df7f4421e230dd23c6db6c62de74f43946de47ef01b0ed65f3365e4a07

                                              • \Users\Admin\AppData\Local\Temp\Unicorn-42493.exe

                                                Filesize

                                                184KB

                                                MD5

                                                318b20e92a5aff6cd52beb6332b89187

                                                SHA1

                                                4f01afdfc2b98fd032354897c00594220d34044d

                                                SHA256

                                                b3d436cda5042d661b5bc9cdb7c53fc922944ba7506f714f2dd090aaaebb6396

                                                SHA512

                                                fbc5fda7296ea9293a35651e21049c1fde9839e9edaf5c3dfbc809feae8597e430e118c6c581f469b02512bea2a4fb101305dc458d9e1cfb242a2d62f6644ffd

                                              • \Users\Admin\AppData\Local\Temp\Unicorn-45120.exe

                                                Filesize

                                                184KB

                                                MD5

                                                19d2f686d9cdf99e7f6e143f93024097

                                                SHA1

                                                51f0a25f64a592d12e9f855b2f339fc04d79abe1

                                                SHA256

                                                93f3ef8b887918ef2c245f9bed4d13019f3d948bc18cc0c89dd1d0e5c4307738

                                                SHA512

                                                a4f52f52572e5030a658a8cfe1d666a017fb28b701a39fbf06dae68e107f21226b76ae7f9a2c4043506a6f64d1905c1fda2f754537842512e4a4277c8f0d2292

                                              • \Users\Admin\AppData\Local\Temp\Unicorn-45307.exe

                                                Filesize

                                                184KB

                                                MD5

                                                6e12d690076e7817f9ad11bd84362e70

                                                SHA1

                                                1b33400f1c38de5f0c7f6d751dbba60f95408644

                                                SHA256

                                                32051bdbadd2f3d93caffbd3ca49cd70820c7a2844bae97bbd70516057337849

                                                SHA512

                                                492715a5f43ace5a7729a0af5cedb36303148d91d6160874f3faf586975d771863cad0314661e5571e56dafbad713f8daf0f10f44da7cd237543f743f8545d77

                                              • \Users\Admin\AppData\Local\Temp\Unicorn-45675.exe

                                                Filesize

                                                184KB

                                                MD5

                                                1fdd8cc154c6bd2eef52e9cf11856354

                                                SHA1

                                                51e1de40c10461a740772ca41809ef9761d9516b

                                                SHA256

                                                f97dddf2677cd7c4fc22a0a4f29a62b605cfac93803be75d310516d176780a9f

                                                SHA512

                                                0a7c49bbca3022c70e8e7566e31cecc9334cedbafe63fe58268fcab8df8e6bc7da49e1fd9b4cb24dc89126c77d3560c45561447ac0eb3e3e06f24267ba3ef868

                                              • \Users\Admin\AppData\Local\Temp\Unicorn-62582.exe

                                                Filesize

                                                184KB

                                                MD5

                                                5755f23dcabc896e34ad6a16f395943b

                                                SHA1

                                                96397944ab8bf78f2fc1ce15cdd955f37de84f45

                                                SHA256

                                                d11e863242714f22377a04933fcb3b953b8048db87a7519adc9acd494a524d70

                                                SHA512

                                                4addcd7dcebc69fd838e9d04764b9ad1e1010fb56a36fdfcfc64a5f61658bb423a7786790640566d80cf1cb1c98767b984a8375c86e40a261638dfcbbf62bb27