Analysis
-
max time kernel
68s -
max time network
139s -
platform
windows7_x64 -
resource
win7-20231215-en -
resource tags
arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system -
submitted
27/01/2024, 10:52
Static task
static1
Behavioral task
behavioral1
Sample
7a0a665737bd6eb4b6907a9c0dfe9469.exe
Resource
win7-20231215-en
Behavioral task
behavioral2
Sample
7a0a665737bd6eb4b6907a9c0dfe9469.exe
Resource
win10v2004-20231215-en
General
-
Target
7a0a665737bd6eb4b6907a9c0dfe9469.exe
-
Size
184KB
-
MD5
7a0a665737bd6eb4b6907a9c0dfe9469
-
SHA1
51125013a1b4effc2d8811565de335e88d17a50e
-
SHA256
4a55e8d15584deeae1044aaca377b9729d0cdd9edf5b1b2d7936164bff8694c6
-
SHA512
cd28437a043557a865826cc0b27e15fe1987dd068742182ed719c288a2c9a1c481cdc9c430dd0e4136dc38d5424d84da055f4a4c952ae71900583996ca3fad62
-
SSDEEP
3072:C8HFoz/Pf/A0uyjndli0H8FF2sd6ONf1kDEx89PgQNlPvpFZ:C8lojI0uIdo0H8ddQLNlPvpF
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2488 Unicorn-50937.exe 2752 Unicorn-30958.exe 2844 Unicorn-2924.exe 2848 Unicorn-10667.exe 2772 Unicorn-48171.exe 2992 Unicorn-47424.exe 2644 Unicorn-54689.exe 2664 Unicorn-51160.exe 1828 Unicorn-42245.exe 1924 Unicorn-13848.exe 2252 Unicorn-1959.exe 320 Unicorn-27035.exe 1480 Unicorn-56178.exe 2520 Unicorn-51539.exe 1648 Unicorn-51539.exe 1204 Unicorn-15145.exe 1852 Unicorn-48763.exe 2208 Unicorn-48763.exe 992 Unicorn-6977.exe 1744 Unicorn-47860.exe 1100 Unicorn-47668.exe 1772 Unicorn-7382.exe 936 Unicorn-51560.exe 1556 Unicorn-51368.exe 2088 Unicorn-174.exe 2924 Unicorn-65156.exe 2164 Unicorn-41206.exe 1144 Unicorn-61072.exe 2196 Unicorn-37253.exe 2968 Unicorn-54336.exe 2832 Unicorn-26537.exe 2732 Unicorn-55872.exe 2852 Unicorn-43750.exe 2760 Unicorn-11632.exe 2788 Unicorn-2717.exe 2616 Unicorn-22946.exe 2768 Unicorn-20206.exe 2580 Unicorn-33012.exe 2300 Unicorn-40028.exe 1920 Unicorn-40242.exe 2036 Unicorn-11653.exe 1456 Unicorn-60662.exe 2028 Unicorn-49718.exe 2888 Unicorn-33936.exe 2528 Unicorn-37082.exe 2360 Unicorn-13132.exe 1368 Unicorn-33552.exe 2292 Unicorn-18307.exe 2408 Unicorn-2333.exe 2204 Unicorn-48218.exe 308 Unicorn-2546.exe 1928 Unicorn-2546.exe 2472 Unicorn-48815.exe 1340 Unicorn-169.exe 940 Unicorn-9982.exe 896 Unicorn-6495.exe 1044 Unicorn-20393.exe 296 Unicorn-16309.exe 2584 Unicorn-61041.exe 1696 Unicorn-65125.exe 1828 Unicorn-65125.exe 2836 Unicorn-12992.exe 2628 Unicorn-11285.exe 2840 Unicorn-44513.exe -
Loads dropped DLL 64 IoCs
pid Process 2880 7a0a665737bd6eb4b6907a9c0dfe9469.exe 2880 7a0a665737bd6eb4b6907a9c0dfe9469.exe 2488 Unicorn-50937.exe 2488 Unicorn-50937.exe 2880 7a0a665737bd6eb4b6907a9c0dfe9469.exe 2880 7a0a665737bd6eb4b6907a9c0dfe9469.exe 2752 Unicorn-30958.exe 2488 Unicorn-50937.exe 2752 Unicorn-30958.exe 2488 Unicorn-50937.exe 2844 Unicorn-2924.exe 2844 Unicorn-2924.exe 2752 Unicorn-30958.exe 2848 Unicorn-10667.exe 2772 Unicorn-48171.exe 2752 Unicorn-30958.exe 2848 Unicorn-10667.exe 2772 Unicorn-48171.exe 2992 Unicorn-47424.exe 2992 Unicorn-47424.exe 2844 Unicorn-2924.exe 2844 Unicorn-2924.exe 2644 Unicorn-54689.exe 2644 Unicorn-54689.exe 2772 Unicorn-48171.exe 2772 Unicorn-48171.exe 1828 Unicorn-42245.exe 1924 Unicorn-13848.exe 1828 Unicorn-42245.exe 1924 Unicorn-13848.exe 2848 Unicorn-10667.exe 2848 Unicorn-10667.exe 2252 Unicorn-1959.exe 2252 Unicorn-1959.exe 2664 Unicorn-51160.exe 2664 Unicorn-51160.exe 2992 Unicorn-47424.exe 2992 Unicorn-47424.exe 1480 Unicorn-56178.exe 1480 Unicorn-56178.exe 320 Unicorn-27035.exe 320 Unicorn-27035.exe 2644 Unicorn-54689.exe 2644 Unicorn-54689.exe 1204 Unicorn-15145.exe 1204 Unicorn-15145.exe 2208 Unicorn-48763.exe 2208 Unicorn-48763.exe 2664 Unicorn-51160.exe 2664 Unicorn-51160.exe 1648 Unicorn-51539.exe 1648 Unicorn-51539.exe 1828 Unicorn-42245.exe 1828 Unicorn-42245.exe 992 Unicorn-6977.exe 992 Unicorn-6977.exe 1852 Unicorn-48763.exe 1852 Unicorn-48763.exe 2252 Unicorn-1959.exe 2252 Unicorn-1959.exe 1744 Unicorn-47860.exe 1744 Unicorn-47860.exe 1480 Unicorn-56178.exe 1480 Unicorn-56178.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1020 2924 WerFault.exe 54 -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2880 7a0a665737bd6eb4b6907a9c0dfe9469.exe 2488 Unicorn-50937.exe 2752 Unicorn-30958.exe 2844 Unicorn-2924.exe 2848 Unicorn-10667.exe 2772 Unicorn-48171.exe 2992 Unicorn-47424.exe 1828 Unicorn-42245.exe 2644 Unicorn-54689.exe 1924 Unicorn-13848.exe 2664 Unicorn-51160.exe 2252 Unicorn-1959.exe 320 Unicorn-27035.exe 1480 Unicorn-56178.exe 1204 Unicorn-15145.exe 1648 Unicorn-51539.exe 1852 Unicorn-48763.exe 992 Unicorn-6977.exe 2208 Unicorn-48763.exe 1744 Unicorn-47860.exe 1100 Unicorn-47668.exe 1772 Unicorn-7382.exe 936 Unicorn-51560.exe 1556 Unicorn-51368.exe 2088 Unicorn-174.exe 2164 Unicorn-41206.exe 1144 Unicorn-61072.exe 2924 Unicorn-65156.exe 2196 Unicorn-37253.exe 2968 Unicorn-54336.exe 2832 Unicorn-26537.exe 2732 Unicorn-55872.exe 2788 Unicorn-2717.exe 2760 Unicorn-11632.exe 2616 Unicorn-22946.exe 2852 Unicorn-43750.exe 2768 Unicorn-20206.exe 2580 Unicorn-33012.exe 2300 Unicorn-40028.exe 2360 Unicorn-13132.exe 1920 Unicorn-40242.exe 1456 Unicorn-60662.exe 2888 Unicorn-33936.exe 2036 Unicorn-11653.exe 2528 Unicorn-37082.exe 1368 Unicorn-33552.exe 2028 Unicorn-49718.exe 2292 Unicorn-18307.exe 2408 Unicorn-2333.exe 2204 Unicorn-48218.exe 1928 Unicorn-2546.exe 308 Unicorn-2546.exe 2472 Unicorn-48815.exe 1340 Unicorn-169.exe 896 Unicorn-6495.exe 940 Unicorn-9982.exe 296 Unicorn-16309.exe 1044 Unicorn-20393.exe 1696 Unicorn-65125.exe 2584 Unicorn-61041.exe 1828 Unicorn-65125.exe 2836 Unicorn-12992.exe 1016 Unicorn-19816.exe 2840 Unicorn-44513.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2880 wrote to memory of 2488 2880 7a0a665737bd6eb4b6907a9c0dfe9469.exe 27 PID 2880 wrote to memory of 2488 2880 7a0a665737bd6eb4b6907a9c0dfe9469.exe 27 PID 2880 wrote to memory of 2488 2880 7a0a665737bd6eb4b6907a9c0dfe9469.exe 27 PID 2880 wrote to memory of 2488 2880 7a0a665737bd6eb4b6907a9c0dfe9469.exe 27 PID 2488 wrote to memory of 2752 2488 Unicorn-50937.exe 28 PID 2488 wrote to memory of 2752 2488 Unicorn-50937.exe 28 PID 2488 wrote to memory of 2752 2488 Unicorn-50937.exe 28 PID 2488 wrote to memory of 2752 2488 Unicorn-50937.exe 28 PID 2880 wrote to memory of 2844 2880 7a0a665737bd6eb4b6907a9c0dfe9469.exe 29 PID 2880 wrote to memory of 2844 2880 7a0a665737bd6eb4b6907a9c0dfe9469.exe 29 PID 2880 wrote to memory of 2844 2880 7a0a665737bd6eb4b6907a9c0dfe9469.exe 29 PID 2880 wrote to memory of 2844 2880 7a0a665737bd6eb4b6907a9c0dfe9469.exe 29 PID 2752 wrote to memory of 2848 2752 Unicorn-30958.exe 30 PID 2752 wrote to memory of 2848 2752 Unicorn-30958.exe 30 PID 2752 wrote to memory of 2848 2752 Unicorn-30958.exe 30 PID 2752 wrote to memory of 2848 2752 Unicorn-30958.exe 30 PID 2488 wrote to memory of 2772 2488 Unicorn-50937.exe 31 PID 2488 wrote to memory of 2772 2488 Unicorn-50937.exe 31 PID 2488 wrote to memory of 2772 2488 Unicorn-50937.exe 31 PID 2488 wrote to memory of 2772 2488 Unicorn-50937.exe 31 PID 2844 wrote to memory of 2992 2844 Unicorn-2924.exe 32 PID 2844 wrote to memory of 2992 2844 Unicorn-2924.exe 32 PID 2844 wrote to memory of 2992 2844 Unicorn-2924.exe 32 PID 2844 wrote to memory of 2992 2844 Unicorn-2924.exe 32 PID 2752 wrote to memory of 2664 2752 Unicorn-30958.exe 34 PID 2752 wrote to memory of 2664 2752 Unicorn-30958.exe 34 PID 2752 wrote to memory of 2664 2752 Unicorn-30958.exe 34 PID 2752 wrote to memory of 2664 2752 Unicorn-30958.exe 34 PID 2848 wrote to memory of 1924 2848 Unicorn-10667.exe 33 PID 2848 wrote to memory of 1924 2848 Unicorn-10667.exe 33 PID 2848 wrote to memory of 1924 2848 Unicorn-10667.exe 33 PID 2848 wrote to memory of 1924 2848 Unicorn-10667.exe 33 PID 2772 wrote to memory of 2644 2772 Unicorn-48171.exe 35 PID 2772 wrote to memory of 2644 2772 Unicorn-48171.exe 35 PID 2772 wrote to memory of 2644 2772 Unicorn-48171.exe 35 PID 2772 wrote to memory of 2644 2772 Unicorn-48171.exe 35 PID 2992 wrote to memory of 1828 2992 Unicorn-47424.exe 38 PID 2992 wrote to memory of 1828 2992 Unicorn-47424.exe 38 PID 2992 wrote to memory of 1828 2992 Unicorn-47424.exe 38 PID 2992 wrote to memory of 1828 2992 Unicorn-47424.exe 38 PID 2844 wrote to memory of 2252 2844 Unicorn-2924.exe 36 PID 2844 wrote to memory of 2252 2844 Unicorn-2924.exe 36 PID 2844 wrote to memory of 2252 2844 Unicorn-2924.exe 36 PID 2844 wrote to memory of 2252 2844 Unicorn-2924.exe 36 PID 2644 wrote to memory of 320 2644 Unicorn-54689.exe 40 PID 2644 wrote to memory of 320 2644 Unicorn-54689.exe 40 PID 2644 wrote to memory of 320 2644 Unicorn-54689.exe 40 PID 2644 wrote to memory of 320 2644 Unicorn-54689.exe 40 PID 2772 wrote to memory of 1480 2772 Unicorn-48171.exe 41 PID 2772 wrote to memory of 1480 2772 Unicorn-48171.exe 41 PID 2772 wrote to memory of 1480 2772 Unicorn-48171.exe 41 PID 2772 wrote to memory of 1480 2772 Unicorn-48171.exe 41 PID 1828 wrote to memory of 1648 1828 Unicorn-42245.exe 44 PID 1924 wrote to memory of 2520 1924 Unicorn-13848.exe 42 PID 1828 wrote to memory of 1648 1828 Unicorn-42245.exe 44 PID 1828 wrote to memory of 1648 1828 Unicorn-42245.exe 44 PID 1828 wrote to memory of 1648 1828 Unicorn-42245.exe 44 PID 1924 wrote to memory of 2520 1924 Unicorn-13848.exe 42 PID 1924 wrote to memory of 2520 1924 Unicorn-13848.exe 42 PID 1924 wrote to memory of 2520 1924 Unicorn-13848.exe 42 PID 2848 wrote to memory of 1204 2848 Unicorn-10667.exe 43 PID 2848 wrote to memory of 1204 2848 Unicorn-10667.exe 43 PID 2848 wrote to memory of 1204 2848 Unicorn-10667.exe 43 PID 2848 wrote to memory of 1204 2848 Unicorn-10667.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\7a0a665737bd6eb4b6907a9c0dfe9469.exe"C:\Users\Admin\AppData\Local\Temp\7a0a665737bd6eb4b6907a9c0dfe9469.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50937.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50937.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2488 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30958.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30958.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10667.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10667.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2848 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13848.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13848.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51539.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51539.exe6⤵
- Executes dropped EXE
PID:2520
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15145.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15145.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1204 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51560.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51560.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:936 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22946.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22946.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48815.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48815.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2472 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11285.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11285.exe9⤵
- Executes dropped EXE
PID:2628 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-33792.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33792.exe10⤵PID:2088
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13734.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13734.exe9⤵PID:2808
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-169.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-169.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1340 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-57362.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57362.exe8⤵PID:1940
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45852.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45852.exe9⤵PID:1336
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57144.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57144.exe8⤵PID:2728
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40028.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40028.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44513.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44513.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17264.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17264.exe8⤵PID:1560
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51160.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51160.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48763.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48763.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51368.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51368.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-20206.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20206.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-65125.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65125.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-63283.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63283.exe9⤵PID:344
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22805.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22805.exe8⤵PID:2348
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33012.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33012.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2580 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6495.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6495.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:896 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30419.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30419.exe8⤵PID:2508
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35460.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35460.exe9⤵PID:2368
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-174.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-174.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11653.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11653.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-19816.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19816.exe7⤵
- Suspicious use of SetWindowsHookEx
PID:1016 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11472.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11472.exe8⤵PID:2736
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60088.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60088.exe9⤵PID:2336
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48171.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48171.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54689.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54689.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27035.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27035.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:320 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47668.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47668.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1100 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-43750.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43750.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61041.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61041.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10574.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10574.exe9⤵PID:1504
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11632.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11632.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-2546.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2546.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1928 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-31379.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31379.exe8⤵PID:2984
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7382.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7382.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1772 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-2717.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2717.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-2546.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2546.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:308 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-31187.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31187.exe8⤵PID:2120
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48218.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48218.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11861.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11861.exe7⤵PID:240
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56178.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56178.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47860.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47860.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26537.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26537.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9982.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9982.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:940 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58623.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58623.exe8⤵PID:2080
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2333.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2333.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11472.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11472.exe7⤵PID:868
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55872.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55872.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18307.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18307.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-24306.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24306.exe7⤵PID:1476
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24166.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24166.exe8⤵PID:2988
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2924.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2924.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47424.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47424.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2992 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-42245.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42245.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1828 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51539.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51539.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1648 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-65156.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65156.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2924 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2924 -s 2407⤵
- Program crash
PID:1020
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33936.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33936.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2888
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41206.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41206.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2164 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40242.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40242.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-20393.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20393.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1044 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-19703.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19703.exe8⤵PID:444
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6977.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6977.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:992 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61072.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61072.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1144 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37082.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37082.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16309.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16309.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:296 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26335.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26335.exe8⤵PID:1540
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53453.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53453.exe9⤵PID:832
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59370.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59370.exe7⤵PID:1780
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33552.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33552.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1368
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1959.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1959.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48763.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48763.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1852 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37253.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37253.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2196 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49718.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49718.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-63091.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63091.exe7⤵PID:1736
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13132.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13132.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-65125.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65125.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1828 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51607.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51607.exe7⤵PID:2112
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11321.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11321.exe6⤵PID:1656
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19494.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19494.exe7⤵PID:340
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54336.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54336.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60662.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60662.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12992.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12992.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62707.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62707.exe7⤵PID:992
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27849.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27849.exe6⤵PID:2224
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24277.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24277.exe7⤵PID:2452
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD51babc6a41cebc3eef50dcec651b085bc
SHA1b2ee2e388d58650e754a2c4c187df91284a62868
SHA256c8dda5d428e3125da2c0b70ac8169736881dff219739caa84bc4af78b6ed9abf
SHA512035d19044cc01aeb04b3128e4e857326de90cf582eba3ea5e7209731e88eb8bb018431314657a9b5d019db6aca9c229ea5f987a036e4eb9cf6bc6e4a3bf1a1a2
-
Filesize
184KB
MD582652d60fe921eab70cfef5287c3dba4
SHA191eeaff800421ddbe7124e9d98f48bdd74d067b6
SHA256054b099604cbd3ff787aee590a27ae3f23d3c3eecdb3ed77450e1f8ccd10e3df
SHA512f2ecba52325ddf776911da0a03639783ce8e37ce9d3cec9237ba3d73051bf73ceaf4c0d6c8e72d22cdc73beb5c3ffb0ac2c4843507faadd7812773ad20f522db
-
Filesize
184KB
MD5a385f0cef5fc9f5a815a16de8ad69195
SHA199e34b8fd6a48e7b67d706f08c2754037da68cd0
SHA256322ef5091a9fae302330e074b68ed97386539fc0fd744edfe0ac0a06269feb70
SHA5127ba88c9a070a3085712261c45cb6bd7786e0a653b34cc616b2ea39e345358662f5421945aae9df858e62d185d25653b365825ce05c156811928e4a1837d12bad
-
Filesize
184KB
MD567fe0cc0c42f0d3910c76aaf380ed1c4
SHA1644a33f7f45df8af4ea94d86f5e73543fe6ed538
SHA256b1f1e7c3204739a418cbd1427a98b45f8d8137af1edaad2946bf056d7086ae87
SHA5123a7e90d370e91a5b4001aa0eaf17d38e100eb7cdb1224cfc08ba84f1caa74b44cb847dbfa7122ae9282877c8574754843431229130f8ec87889078cd0c5acf27
-
Filesize
184KB
MD56815673e193a4591e8d8d8e5587842e2
SHA1c899142edea80217cf35fcc8514909ad8dd08c17
SHA2567f46cd484255426daa38f2f4023a523f6a1709ed9855adff323ee361f54779f4
SHA51278268dc27784fda088e09bfd903c8877e4ddb8193509e460269e388524920daac26c9183e03c4997502d152d1dc1351b548da71909a2121d2292a3842c7fcccd
-
Filesize
184KB
MD5d507fb4cb8b95ab85314140e3fb095f4
SHA11400bba60504e865103ac26d4dd5179db1917b69
SHA256b9932b376f7b4d2a8983388bf10a15de77506d2e36667a868f5ba6172ccf9ae2
SHA5129e6217e4d8a4f6743f3ab4af3f5aa210ac74d65f70f72af16e07fbe5ecb82451091be6442645a73d2c7c1fbd4c52fd39aea1ea12e959573e00535d483f3a1299
-
Filesize
184KB
MD5fd75e9d55c0328c073ab6c11cf2c4d6b
SHA116c88d1151368bd5276c60ffab44e16b0a379c9d
SHA25681624dd4e6e3dfde3ef480dcc4cac2b900ed024be205d82098dd377178ca6574
SHA5123718baf2f74e978941ababa4f4c93db356bb81ee41b57c49e520eb0ba29656435f9c1c9cac9ecd1c2d618f41819372e2cb3e1e69f5db8032982e80cccd8afcb1
-
Filesize
184KB
MD5eb0ea89bf3fd648569d0c0db7124ce7a
SHA122b752830a851293e4aa27348029c8f441e6927d
SHA25611a4f9345a6cdb622d70d47f2c223f6baeed2d7ad79faf8a3bf9ad004e52fe30
SHA512047f4c2cb299ac1d843203dc812cede312047b6bd49ca53bdc5106f58707298a154e47aecced5c14ab62dcd07e099dfb680f926951b86a0292ae56fd18850cf4
-
Filesize
184KB
MD5a5b7cb54be7d0c3b5d09ddd02dad8018
SHA16f0ed34cec3e0308347b51c6977c1424c7d2d3a0
SHA25682dac5622aa7c7eff73a475259ed66e067a5ea4153c84d5b3445afca6d00fbd6
SHA512301379aed46f1217575b706aac6b26c0a3d84d5a7fb821eecc019f0a5f0eb5315addc5bc70632e9a5caa5fe12e63b04cba19d9af83a8f4c5ee34680f7fcb7f7d
-
Filesize
184KB
MD557cc137522c2924712dc7dbb2b762d9c
SHA16871367fd3daaa0e022a50e49ace5c7ea6aff2cf
SHA25657efadd6af28c9ded59ddd563bca4366d2acf0a645edfe768eb09a3067e509e0
SHA5124cd223bb22e9d781fa89f8fbb2b2972eeb9af3908cf96bfeea46e80fcf8eefb560b24c584861caacd57554352209abbcbad588764654c7c302c2a62e2743c998
-
Filesize
184KB
MD5eb61debd127367a49fba8de345e226bf
SHA17107aa2cb9e4da791c3be49f6e55c61a073d391b
SHA2566a822d1ff317fc439aa58a414850767165f91840f16fff3c13372b8e5837418c
SHA512788678e9c88703c6e82b56875bdc99bf6f44ebf332cb069f1e06dea649fa0d30ab679ae64fe8ae20194a6b497eb260ec446b49e267f2a66da655eccef5e85819
-
Filesize
184KB
MD50bdae6a51c20c84f692e083a59f277f3
SHA184131e77246753ffd27d2387200dd7f671a6a581
SHA256aeb40c82913f9f9f5e207febce6980ff58c49dfdb12f3ca3a5cb1d43b430e22e
SHA512bb02b81c93173091edb4e29b0e1dab3a81f15f5e28d1f6bbc713d0e5a72fe6ff28793de0d7a090af0c49e44a5338213eb702fbdc5a52f0cb34623d11c7df77b8
-
Filesize
184KB
MD502207df29b3f1160820a7ee67271d96c
SHA1976f47f7383532117bf345d960e115aa21164391
SHA256ea687722e1bd88484b2182f4602b8960d6ae6d87022ddc1fba957dedfda67c4d
SHA512ccfdd82ab1d0e4b37f2fe5c913300f3b23d70f80ee86665732b71081ff7a53b2878db437acd4c36c6ea4008fc821427fd59eeb50fe1358e5c34f0fcf3e81ec9e
-
Filesize
184KB
MD53b15871877855e9a45b6a978d8dfbaec
SHA19bbb0653a3a139dc156b9f89e92b15e0064cd542
SHA256e7800bd1c83257ec74cb7974c4f3b5f492f66e07711ba1be0d941bede37998f4
SHA512569a4ce8998bdefbabbd10dcdedacd22559cc0609a5909e4d9dae22ba33c38102f9a0a3169fef476f0de982e2dc248a994d1173a33da546e506a5356b4565b84
-
Filesize
184KB
MD54d1cf5d2a3965b69c550198043fed0fc
SHA1241d577d174a9130d3741a147253996963247f2e
SHA256f4b49106bc89da6232201f20adb7ecf1f3c416cb3b7069a1a744d4b0e3ec048c
SHA512bf7e17d5393940d2773acc8d78ab45fe2867c8cc81bb1ec047ee0ee6f93d369adf6ca3daaa00893229905ab6e9c0166e698fc277ad372565cfe0258455484e9d
-
Filesize
184KB
MD54806df31823c779aecb54ec6edc4a0fc
SHA1c56653d919555233622e12adc55cc1a4763187aa
SHA2566745a6f4771bc794d8938b00be40b4f38cd53751fb791296bb30c53c87934a80
SHA512d496c4fa4a851046c2bca5ceecabc549305aae4ea7126a2aec6e5d1eba0f65e9b3277668817ecb4b50ee831ae7a46e5403d3c768fea8389ec147ee9af191b0db