Analysis

  • max time kernel
    68s
  • max time network
    139s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    27/01/2024, 10:52

General

  • Target

    7a0a665737bd6eb4b6907a9c0dfe9469.exe

  • Size

    184KB

  • MD5

    7a0a665737bd6eb4b6907a9c0dfe9469

  • SHA1

    51125013a1b4effc2d8811565de335e88d17a50e

  • SHA256

    4a55e8d15584deeae1044aaca377b9729d0cdd9edf5b1b2d7936164bff8694c6

  • SHA512

    cd28437a043557a865826cc0b27e15fe1987dd068742182ed719c288a2c9a1c481cdc9c430dd0e4136dc38d5424d84da055f4a4c952ae71900583996ca3fad62

  • SSDEEP

    3072:C8HFoz/Pf/A0uyjndli0H8FF2sd6ONf1kDEx89PgQNlPvpFZ:C8lojI0uIdo0H8ddQLNlPvpF

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 64 IoCs
  • Loads dropped DLL 64 IoCs
  • Program crash 1 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7a0a665737bd6eb4b6907a9c0dfe9469.exe
    "C:\Users\Admin\AppData\Local\Temp\7a0a665737bd6eb4b6907a9c0dfe9469.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2880
    • C:\Users\Admin\AppData\Local\Temp\Unicorn-50937.exe
      C:\Users\Admin\AppData\Local\Temp\Unicorn-50937.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2488
      • C:\Users\Admin\AppData\Local\Temp\Unicorn-30958.exe
        C:\Users\Admin\AppData\Local\Temp\Unicorn-30958.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2752
        • C:\Users\Admin\AppData\Local\Temp\Unicorn-10667.exe
          C:\Users\Admin\AppData\Local\Temp\Unicorn-10667.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2848
          • C:\Users\Admin\AppData\Local\Temp\Unicorn-13848.exe
            C:\Users\Admin\AppData\Local\Temp\Unicorn-13848.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1924
            • C:\Users\Admin\AppData\Local\Temp\Unicorn-51539.exe
              C:\Users\Admin\AppData\Local\Temp\Unicorn-51539.exe
              6⤵
              • Executes dropped EXE
              PID:2520
          • C:\Users\Admin\AppData\Local\Temp\Unicorn-15145.exe
            C:\Users\Admin\AppData\Local\Temp\Unicorn-15145.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            PID:1204
            • C:\Users\Admin\AppData\Local\Temp\Unicorn-51560.exe
              C:\Users\Admin\AppData\Local\Temp\Unicorn-51560.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:936
              • C:\Users\Admin\AppData\Local\Temp\Unicorn-22946.exe
                C:\Users\Admin\AppData\Local\Temp\Unicorn-22946.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:2616
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-48815.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-48815.exe
                  8⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:2472
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-11285.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-11285.exe
                    9⤵
                    • Executes dropped EXE
                    PID:2628
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-33792.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-33792.exe
                      10⤵
                        PID:2088
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-13734.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-13734.exe
                      9⤵
                        PID:2808
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-169.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-169.exe
                    7⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:1340
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-57362.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-57362.exe
                      8⤵
                        PID:1940
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-45852.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-45852.exe
                          9⤵
                            PID:1336
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-57144.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-57144.exe
                          8⤵
                            PID:2728
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-40028.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-40028.exe
                        6⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:2300
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-44513.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-44513.exe
                          7⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:2840
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-17264.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-17264.exe
                            8⤵
                              PID:1560
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-51160.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-51160.exe
                      4⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Suspicious use of SetWindowsHookEx
                      PID:2664
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-48763.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-48763.exe
                        5⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Suspicious use of SetWindowsHookEx
                        PID:2208
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-51368.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-51368.exe
                          6⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:1556
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-20206.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-20206.exe
                            7⤵
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            PID:2768
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-65125.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-65125.exe
                              8⤵
                              • Executes dropped EXE
                              • Suspicious use of SetWindowsHookEx
                              PID:1696
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-63283.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-63283.exe
                                9⤵
                                  PID:344
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-22805.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-22805.exe
                                8⤵
                                  PID:2348
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-33012.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-33012.exe
                              6⤵
                              • Executes dropped EXE
                              • Suspicious use of SetWindowsHookEx
                              PID:2580
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-6495.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-6495.exe
                                7⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                PID:896
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-30419.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-30419.exe
                                  8⤵
                                    PID:2508
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-35460.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-35460.exe
                                      9⤵
                                        PID:2368
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-174.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-174.exe
                                5⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                PID:2088
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-11653.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-11653.exe
                                  6⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetWindowsHookEx
                                  PID:2036
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-19816.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-19816.exe
                                    7⤵
                                    • Suspicious use of SetWindowsHookEx
                                    PID:1016
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-11472.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-11472.exe
                                      8⤵
                                        PID:2736
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-60088.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-60088.exe
                                          9⤵
                                            PID:2336
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-48171.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-48171.exe
                                3⤵
                                • Executes dropped EXE
                                • Loads dropped DLL
                                • Suspicious use of SetWindowsHookEx
                                • Suspicious use of WriteProcessMemory
                                PID:2772
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-54689.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-54689.exe
                                  4⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Suspicious use of SetWindowsHookEx
                                  • Suspicious use of WriteProcessMemory
                                  PID:2644
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-27035.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-27035.exe
                                    5⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • Suspicious use of SetWindowsHookEx
                                    PID:320
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-47668.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-47668.exe
                                      6⤵
                                      • Executes dropped EXE
                                      • Suspicious use of SetWindowsHookEx
                                      PID:1100
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-43750.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-43750.exe
                                        7⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetWindowsHookEx
                                        PID:2852
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-61041.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-61041.exe
                                          8⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetWindowsHookEx
                                          PID:2584
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-10574.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-10574.exe
                                            9⤵
                                              PID:1504
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-11632.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-11632.exe
                                        6⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetWindowsHookEx
                                        PID:2760
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-2546.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-2546.exe
                                          7⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetWindowsHookEx
                                          PID:1928
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-31379.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-31379.exe
                                            8⤵
                                              PID:2984
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-7382.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-7382.exe
                                        5⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetWindowsHookEx
                                        PID:1772
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-2717.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-2717.exe
                                          6⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetWindowsHookEx
                                          PID:2788
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-2546.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-2546.exe
                                            7⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetWindowsHookEx
                                            PID:308
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-31187.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-31187.exe
                                              8⤵
                                                PID:2120
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-48218.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-48218.exe
                                            6⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetWindowsHookEx
                                            PID:2204
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-11861.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-11861.exe
                                              7⤵
                                                PID:240
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-56178.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-56178.exe
                                          4⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          • Suspicious use of SetWindowsHookEx
                                          PID:1480
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-47860.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-47860.exe
                                            5⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            • Suspicious use of SetWindowsHookEx
                                            PID:1744
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-26537.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-26537.exe
                                              6⤵
                                              • Executes dropped EXE
                                              • Suspicious use of SetWindowsHookEx
                                              PID:2832
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-9982.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-9982.exe
                                                7⤵
                                                • Executes dropped EXE
                                                • Suspicious use of SetWindowsHookEx
                                                PID:940
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-58623.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-58623.exe
                                                  8⤵
                                                    PID:2080
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-2333.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-2333.exe
                                                6⤵
                                                • Executes dropped EXE
                                                • Suspicious use of SetWindowsHookEx
                                                PID:2408
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-11472.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-11472.exe
                                                  7⤵
                                                    PID:868
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-55872.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-55872.exe
                                                5⤵
                                                • Executes dropped EXE
                                                • Suspicious use of SetWindowsHookEx
                                                PID:2732
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-18307.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-18307.exe
                                                  6⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:2292
                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-24306.exe
                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-24306.exe
                                                    7⤵
                                                      PID:1476
                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-24166.exe
                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-24166.exe
                                                        8⤵
                                                          PID:2988
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-2924.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-2924.exe
                                              2⤵
                                              • Executes dropped EXE
                                              • Loads dropped DLL
                                              • Suspicious use of SetWindowsHookEx
                                              • Suspicious use of WriteProcessMemory
                                              PID:2844
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-47424.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-47424.exe
                                                3⤵
                                                • Executes dropped EXE
                                                • Loads dropped DLL
                                                • Suspicious use of SetWindowsHookEx
                                                • Suspicious use of WriteProcessMemory
                                                PID:2992
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-42245.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-42245.exe
                                                  4⤵
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  • Suspicious use of SetWindowsHookEx
                                                  • Suspicious use of WriteProcessMemory
                                                  PID:1828
                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-51539.exe
                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-51539.exe
                                                    5⤵
                                                    • Executes dropped EXE
                                                    • Loads dropped DLL
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:1648
                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-65156.exe
                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-65156.exe
                                                      6⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:2924
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 2924 -s 240
                                                        7⤵
                                                        • Program crash
                                                        PID:1020
                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-33936.exe
                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-33936.exe
                                                      6⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:2888
                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-41206.exe
                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-41206.exe
                                                    5⤵
                                                    • Executes dropped EXE
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:2164
                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-40242.exe
                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-40242.exe
                                                      6⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:1920
                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-20393.exe
                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-20393.exe
                                                        7⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:1044
                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-19703.exe
                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-19703.exe
                                                          8⤵
                                                            PID:444
                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-6977.exe
                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-6977.exe
                                                    4⤵
                                                    • Executes dropped EXE
                                                    • Loads dropped DLL
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:992
                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-61072.exe
                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-61072.exe
                                                      5⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:1144
                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-37082.exe
                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-37082.exe
                                                        6⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:2528
                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-16309.exe
                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-16309.exe
                                                          7⤵
                                                          • Executes dropped EXE
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:296
                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-26335.exe
                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-26335.exe
                                                            8⤵
                                                              PID:1540
                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-53453.exe
                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-53453.exe
                                                                9⤵
                                                                  PID:832
                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-59370.exe
                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-59370.exe
                                                              7⤵
                                                                PID:1780
                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-33552.exe
                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-33552.exe
                                                            5⤵
                                                            • Executes dropped EXE
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:1368
                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-1959.exe
                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-1959.exe
                                                        3⤵
                                                        • Executes dropped EXE
                                                        • Loads dropped DLL
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:2252
                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-48763.exe
                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-48763.exe
                                                          4⤵
                                                          • Executes dropped EXE
                                                          • Loads dropped DLL
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:1852
                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-37253.exe
                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-37253.exe
                                                            5⤵
                                                            • Executes dropped EXE
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:2196
                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-49718.exe
                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-49718.exe
                                                              6⤵
                                                              • Executes dropped EXE
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:2028
                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-63091.exe
                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-63091.exe
                                                                7⤵
                                                                  PID:1736
                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-13132.exe
                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-13132.exe
                                                              5⤵
                                                              • Executes dropped EXE
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:2360
                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-65125.exe
                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-65125.exe
                                                                6⤵
                                                                • Executes dropped EXE
                                                                • Suspicious use of SetWindowsHookEx
                                                                PID:1828
                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-51607.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-51607.exe
                                                                  7⤵
                                                                    PID:2112
                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-11321.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-11321.exe
                                                                  6⤵
                                                                    PID:1656
                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-19494.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-19494.exe
                                                                      7⤵
                                                                        PID:340
                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-54336.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-54336.exe
                                                                  4⤵
                                                                  • Executes dropped EXE
                                                                  • Suspicious use of SetWindowsHookEx
                                                                  PID:2968
                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-60662.exe
                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-60662.exe
                                                                    5⤵
                                                                    • Executes dropped EXE
                                                                    • Suspicious use of SetWindowsHookEx
                                                                    PID:1456
                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-12992.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-12992.exe
                                                                      6⤵
                                                                      • Executes dropped EXE
                                                                      • Suspicious use of SetWindowsHookEx
                                                                      PID:2836
                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-62707.exe
                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-62707.exe
                                                                        7⤵
                                                                          PID:992
                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-27849.exe
                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-27849.exe
                                                                        6⤵
                                                                          PID:2224
                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-24277.exe
                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-24277.exe
                                                                            7⤵
                                                                              PID:2452

                                                                Network

                                                                      MITRE ATT&CK Matrix

                                                                      Replay Monitor

                                                                      Loading Replay Monitor...

                                                                      Downloads

                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-13848.exe

                                                                        Filesize

                                                                        184KB

                                                                        MD5

                                                                        1babc6a41cebc3eef50dcec651b085bc

                                                                        SHA1

                                                                        b2ee2e388d58650e754a2c4c187df91284a62868

                                                                        SHA256

                                                                        c8dda5d428e3125da2c0b70ac8169736881dff219739caa84bc4af78b6ed9abf

                                                                        SHA512

                                                                        035d19044cc01aeb04b3128e4e857326de90cf582eba3ea5e7209731e88eb8bb018431314657a9b5d019db6aca9c229ea5f987a036e4eb9cf6bc6e4a3bf1a1a2

                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-15145.exe

                                                                        Filesize

                                                                        184KB

                                                                        MD5

                                                                        82652d60fe921eab70cfef5287c3dba4

                                                                        SHA1

                                                                        91eeaff800421ddbe7124e9d98f48bdd74d067b6

                                                                        SHA256

                                                                        054b099604cbd3ff787aee590a27ae3f23d3c3eecdb3ed77450e1f8ccd10e3df

                                                                        SHA512

                                                                        f2ecba52325ddf776911da0a03639783ce8e37ce9d3cec9237ba3d73051bf73ceaf4c0d6c8e72d22cdc73beb5c3ffb0ac2c4843507faadd7812773ad20f522db

                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-42245.exe

                                                                        Filesize

                                                                        184KB

                                                                        MD5

                                                                        a385f0cef5fc9f5a815a16de8ad69195

                                                                        SHA1

                                                                        99e34b8fd6a48e7b67d706f08c2754037da68cd0

                                                                        SHA256

                                                                        322ef5091a9fae302330e074b68ed97386539fc0fd744edfe0ac0a06269feb70

                                                                        SHA512

                                                                        7ba88c9a070a3085712261c45cb6bd7786e0a653b34cc616b2ea39e345358662f5421945aae9df858e62d185d25653b365825ce05c156811928e4a1837d12bad

                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-47424.exe

                                                                        Filesize

                                                                        184KB

                                                                        MD5

                                                                        67fe0cc0c42f0d3910c76aaf380ed1c4

                                                                        SHA1

                                                                        644a33f7f45df8af4ea94d86f5e73543fe6ed538

                                                                        SHA256

                                                                        b1f1e7c3204739a418cbd1427a98b45f8d8137af1edaad2946bf056d7086ae87

                                                                        SHA512

                                                                        3a7e90d370e91a5b4001aa0eaf17d38e100eb7cdb1224cfc08ba84f1caa74b44cb847dbfa7122ae9282877c8574754843431229130f8ec87889078cd0c5acf27

                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-51539.exe

                                                                        Filesize

                                                                        184KB

                                                                        MD5

                                                                        6815673e193a4591e8d8d8e5587842e2

                                                                        SHA1

                                                                        c899142edea80217cf35fcc8514909ad8dd08c17

                                                                        SHA256

                                                                        7f46cd484255426daa38f2f4023a523f6a1709ed9855adff323ee361f54779f4

                                                                        SHA512

                                                                        78268dc27784fda088e09bfd903c8877e4ddb8193509e460269e388524920daac26c9183e03c4997502d152d1dc1351b548da71909a2121d2292a3842c7fcccd

                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-54689.exe

                                                                        Filesize

                                                                        184KB

                                                                        MD5

                                                                        d507fb4cb8b95ab85314140e3fb095f4

                                                                        SHA1

                                                                        1400bba60504e865103ac26d4dd5179db1917b69

                                                                        SHA256

                                                                        b9932b376f7b4d2a8983388bf10a15de77506d2e36667a868f5ba6172ccf9ae2

                                                                        SHA512

                                                                        9e6217e4d8a4f6743f3ab4af3f5aa210ac74d65f70f72af16e07fbe5ecb82451091be6442645a73d2c7c1fbd4c52fd39aea1ea12e959573e00535d483f3a1299

                                                                      • \Users\Admin\AppData\Local\Temp\Unicorn-10667.exe

                                                                        Filesize

                                                                        184KB

                                                                        MD5

                                                                        fd75e9d55c0328c073ab6c11cf2c4d6b

                                                                        SHA1

                                                                        16c88d1151368bd5276c60ffab44e16b0a379c9d

                                                                        SHA256

                                                                        81624dd4e6e3dfde3ef480dcc4cac2b900ed024be205d82098dd377178ca6574

                                                                        SHA512

                                                                        3718baf2f74e978941ababa4f4c93db356bb81ee41b57c49e520eb0ba29656435f9c1c9cac9ecd1c2d618f41819372e2cb3e1e69f5db8032982e80cccd8afcb1

                                                                      • \Users\Admin\AppData\Local\Temp\Unicorn-1959.exe

                                                                        Filesize

                                                                        184KB

                                                                        MD5

                                                                        eb0ea89bf3fd648569d0c0db7124ce7a

                                                                        SHA1

                                                                        22b752830a851293e4aa27348029c8f441e6927d

                                                                        SHA256

                                                                        11a4f9345a6cdb622d70d47f2c223f6baeed2d7ad79faf8a3bf9ad004e52fe30

                                                                        SHA512

                                                                        047f4c2cb299ac1d843203dc812cede312047b6bd49ca53bdc5106f58707298a154e47aecced5c14ab62dcd07e099dfb680f926951b86a0292ae56fd18850cf4

                                                                      • \Users\Admin\AppData\Local\Temp\Unicorn-27035.exe

                                                                        Filesize

                                                                        184KB

                                                                        MD5

                                                                        a5b7cb54be7d0c3b5d09ddd02dad8018

                                                                        SHA1

                                                                        6f0ed34cec3e0308347b51c6977c1424c7d2d3a0

                                                                        SHA256

                                                                        82dac5622aa7c7eff73a475259ed66e067a5ea4153c84d5b3445afca6d00fbd6

                                                                        SHA512

                                                                        301379aed46f1217575b706aac6b26c0a3d84d5a7fb821eecc019f0a5f0eb5315addc5bc70632e9a5caa5fe12e63b04cba19d9af83a8f4c5ee34680f7fcb7f7d

                                                                      • \Users\Admin\AppData\Local\Temp\Unicorn-2924.exe

                                                                        Filesize

                                                                        184KB

                                                                        MD5

                                                                        57cc137522c2924712dc7dbb2b762d9c

                                                                        SHA1

                                                                        6871367fd3daaa0e022a50e49ace5c7ea6aff2cf

                                                                        SHA256

                                                                        57efadd6af28c9ded59ddd563bca4366d2acf0a645edfe768eb09a3067e509e0

                                                                        SHA512

                                                                        4cd223bb22e9d781fa89f8fbb2b2972eeb9af3908cf96bfeea46e80fcf8eefb560b24c584861caacd57554352209abbcbad588764654c7c302c2a62e2743c998

                                                                      • \Users\Admin\AppData\Local\Temp\Unicorn-30958.exe

                                                                        Filesize

                                                                        184KB

                                                                        MD5

                                                                        eb61debd127367a49fba8de345e226bf

                                                                        SHA1

                                                                        7107aa2cb9e4da791c3be49f6e55c61a073d391b

                                                                        SHA256

                                                                        6a822d1ff317fc439aa58a414850767165f91840f16fff3c13372b8e5837418c

                                                                        SHA512

                                                                        788678e9c88703c6e82b56875bdc99bf6f44ebf332cb069f1e06dea649fa0d30ab679ae64fe8ae20194a6b497eb260ec446b49e267f2a66da655eccef5e85819

                                                                      • \Users\Admin\AppData\Local\Temp\Unicorn-48171.exe

                                                                        Filesize

                                                                        184KB

                                                                        MD5

                                                                        0bdae6a51c20c84f692e083a59f277f3

                                                                        SHA1

                                                                        84131e77246753ffd27d2387200dd7f671a6a581

                                                                        SHA256

                                                                        aeb40c82913f9f9f5e207febce6980ff58c49dfdb12f3ca3a5cb1d43b430e22e

                                                                        SHA512

                                                                        bb02b81c93173091edb4e29b0e1dab3a81f15f5e28d1f6bbc713d0e5a72fe6ff28793de0d7a090af0c49e44a5338213eb702fbdc5a52f0cb34623d11c7df77b8

                                                                      • \Users\Admin\AppData\Local\Temp\Unicorn-48763.exe

                                                                        Filesize

                                                                        184KB

                                                                        MD5

                                                                        02207df29b3f1160820a7ee67271d96c

                                                                        SHA1

                                                                        976f47f7383532117bf345d960e115aa21164391

                                                                        SHA256

                                                                        ea687722e1bd88484b2182f4602b8960d6ae6d87022ddc1fba957dedfda67c4d

                                                                        SHA512

                                                                        ccfdd82ab1d0e4b37f2fe5c913300f3b23d70f80ee86665732b71081ff7a53b2878db437acd4c36c6ea4008fc821427fd59eeb50fe1358e5c34f0fcf3e81ec9e

                                                                      • \Users\Admin\AppData\Local\Temp\Unicorn-50937.exe

                                                                        Filesize

                                                                        184KB

                                                                        MD5

                                                                        3b15871877855e9a45b6a978d8dfbaec

                                                                        SHA1

                                                                        9bbb0653a3a139dc156b9f89e92b15e0064cd542

                                                                        SHA256

                                                                        e7800bd1c83257ec74cb7974c4f3b5f492f66e07711ba1be0d941bede37998f4

                                                                        SHA512

                                                                        569a4ce8998bdefbabbd10dcdedacd22559cc0609a5909e4d9dae22ba33c38102f9a0a3169fef476f0de982e2dc248a994d1173a33da546e506a5356b4565b84

                                                                      • \Users\Admin\AppData\Local\Temp\Unicorn-51160.exe

                                                                        Filesize

                                                                        184KB

                                                                        MD5

                                                                        4d1cf5d2a3965b69c550198043fed0fc

                                                                        SHA1

                                                                        241d577d174a9130d3741a147253996963247f2e

                                                                        SHA256

                                                                        f4b49106bc89da6232201f20adb7ecf1f3c416cb3b7069a1a744d4b0e3ec048c

                                                                        SHA512

                                                                        bf7e17d5393940d2773acc8d78ab45fe2867c8cc81bb1ec047ee0ee6f93d369adf6ca3daaa00893229905ab6e9c0166e698fc277ad372565cfe0258455484e9d

                                                                      • \Users\Admin\AppData\Local\Temp\Unicorn-56178.exe

                                                                        Filesize

                                                                        184KB

                                                                        MD5

                                                                        4806df31823c779aecb54ec6edc4a0fc

                                                                        SHA1

                                                                        c56653d919555233622e12adc55cc1a4763187aa

                                                                        SHA256

                                                                        6745a6f4771bc794d8938b00be40b4f38cd53751fb791296bb30c53c87934a80

                                                                        SHA512

                                                                        d496c4fa4a851046c2bca5ceecabc549305aae4ea7126a2aec6e5d1eba0f65e9b3277668817ecb4b50ee831ae7a46e5403d3c768fea8389ec147ee9af191b0db