Analysis

  • max time kernel
    53s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    02/02/2024, 19:29

General

  • Target

    8a58b8d6f5223f07c7e15a272b05ee95.exe

  • Size

    184KB

  • MD5

    8a58b8d6f5223f07c7e15a272b05ee95

  • SHA1

    11f3ab9dbe06ff6b4ba6f31026417ffac90b2510

  • SHA256

    ac1d94bbf8a0ca6d3db7c163d46f033c457c261a741d775ced70ac439c1d6d9b

  • SHA512

    3c49df01865b881bcf49e85f70c8cfbc12b7d0d82b43b03191a0f9331d4874501890a64eac43fedae34d8a63ce8a7c72df8e0dc0b4bcd435291625e07bca2a8e

  • SSDEEP

    3072:3U6LoCYGmJwQ6OjLq1G/S7ZizTPJj2IOjjxVioVfxlv1pF9:3UaoviQ6cq4/S7iL+hxlv1pF

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 64 IoCs
  • Loads dropped DLL 64 IoCs
  • Suspicious use of SetWindowsHookEx 61 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8a58b8d6f5223f07c7e15a272b05ee95.exe
    "C:\Users\Admin\AppData\Local\Temp\8a58b8d6f5223f07c7e15a272b05ee95.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2316
    • C:\Users\Admin\AppData\Local\Temp\Unicorn-35831.exe
      C:\Users\Admin\AppData\Local\Temp\Unicorn-35831.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2196
      • C:\Users\Admin\AppData\Local\Temp\Unicorn-46220.exe
        C:\Users\Admin\AppData\Local\Temp\Unicorn-46220.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:3064
        • C:\Users\Admin\AppData\Local\Temp\Unicorn-41150.exe
          C:\Users\Admin\AppData\Local\Temp\Unicorn-41150.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2704
          • C:\Users\Admin\AppData\Local\Temp\Unicorn-51539.exe
            C:\Users\Admin\AppData\Local\Temp\Unicorn-51539.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2476
            • C:\Users\Admin\AppData\Local\Temp\Unicorn-20860.exe
              C:\Users\Admin\AppData\Local\Temp\Unicorn-20860.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              PID:2004
              • C:\Users\Admin\AppData\Local\Temp\Unicorn-49230.exe
                C:\Users\Admin\AppData\Local\Temp\Unicorn-49230.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:2884
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-8280.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-8280.exe
                  8⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:860
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-10309.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-10309.exe
                    9⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:1508
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-43515.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-43515.exe
                      10⤵
                        PID:2892
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-19800.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-19800.exe
                    8⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:2336
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-39561.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-39561.exe
                  7⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:3056
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-17108.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-17108.exe
                    8⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:2348
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-34119.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-34119.exe
                      9⤵
                        PID:1416
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-4952.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-4952.exe
                          10⤵
                            PID:3064
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-33448.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-33448.exe
                    6⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of SetWindowsHookEx
                    PID:2660
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-45229.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-45229.exe
                      7⤵
                      • Executes dropped EXE
                      • Suspicious use of SetWindowsHookEx
                      PID:1088
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-51342.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-51342.exe
                        8⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:1628
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-63184.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-63184.exe
                          9⤵
                            PID:2852
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-43318.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-43318.exe
                          8⤵
                            PID:2680
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-58119.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-58119.exe
                          7⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:2936
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-63184.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-63184.exe
                            8⤵
                              PID:2148
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-4672.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-4672.exe
                                9⤵
                                  PID:2816
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-5078.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-5078.exe
                          5⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Suspicious use of SetWindowsHookEx
                          PID:1092
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-2167.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-2167.exe
                            6⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Suspicious use of SetWindowsHookEx
                            PID:708
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-37061.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-37061.exe
                              7⤵
                              • Executes dropped EXE
                              • Suspicious use of SetWindowsHookEx
                              PID:1608
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-47258.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-47258.exe
                                8⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                PID:2248
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-8918.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-8918.exe
                              7⤵
                              • Executes dropped EXE
                              • Suspicious use of SetWindowsHookEx
                              PID:2980
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-4943.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-4943.exe
                            6⤵
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            PID:1936
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-35006.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-35006.exe
                              7⤵
                              • Executes dropped EXE
                              • Suspicious use of SetWindowsHookEx
                              PID:2812
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-947.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-947.exe
                        4⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Suspicious use of SetWindowsHookEx
                        • Suspicious use of WriteProcessMemory
                        PID:2532
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-8607.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-8607.exe
                          5⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Suspicious use of SetWindowsHookEx
                          PID:1080
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-46516.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-46516.exe
                            6⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Suspicious use of SetWindowsHookEx
                            PID:1496
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-47367.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-47367.exe
                              7⤵
                              • Executes dropped EXE
                              • Suspicious use of SetWindowsHookEx
                              PID:2212
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-53480.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-53480.exe
                                8⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                PID:2836
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-44373.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-44373.exe
                                  9⤵
                                    PID:2504
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-14201.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-14201.exe
                                  8⤵
                                    PID:2820
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-35679.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-35679.exe
                                      9⤵
                                        PID:1424
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-50635.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-50635.exe
                                          10⤵
                                            PID:2476
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-15140.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-15140.exe
                                      7⤵
                                      • Executes dropped EXE
                                      • Suspicious use of SetWindowsHookEx
                                      PID:1124
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-37418.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-37418.exe
                                        8⤵
                                          PID:2432
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-9747.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-9747.exe
                                            9⤵
                                              PID:1552
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-19333.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-19333.exe
                                        6⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetWindowsHookEx
                                        PID:2332
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-18478.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-18478.exe
                                          7⤵
                                          • Executes dropped EXE
                                          PID:624
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-30734.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-30734.exe
                                      5⤵
                                      • Executes dropped EXE
                                      • Suspicious use of SetWindowsHookEx
                                      PID:1232
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-49121.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-49121.exe
                                        6⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetWindowsHookEx
                                        PID:2316
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-39474.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-39474.exe
                                          7⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetWindowsHookEx
                                          PID:1828
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-35679.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-35679.exe
                                            8⤵
                                              PID:2456
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-9794.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-9794.exe
                                                9⤵
                                                  PID:2940
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-31860.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-31860.exe
                                            6⤵
                                            • Executes dropped EXE
                                            PID:2016
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-56095.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-56095.exe
                                      3⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Suspicious use of SetWindowsHookEx
                                      • Suspicious use of WriteProcessMemory
                                      PID:2868
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-45317.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-45317.exe
                                        4⤵
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        • Suspicious use of SetWindowsHookEx
                                        • Suspicious use of WriteProcessMemory
                                        PID:3000
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-14637.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-14637.exe
                                          5⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          • Suspicious use of SetWindowsHookEx
                                          PID:2944
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-51176.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-51176.exe
                                            6⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetWindowsHookEx
                                            PID:1632
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-14310.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-14310.exe
                                              7⤵
                                              • Executes dropped EXE
                                              • Suspicious use of SetWindowsHookEx
                                              PID:1044
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-45504.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-45504.exe
                                                8⤵
                                                  PID:896
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-59463.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-59463.exe
                                                7⤵
                                                  PID:2904
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-14865.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-14865.exe
                                                6⤵
                                                • Executes dropped EXE
                                                • Suspicious use of SetWindowsHookEx
                                                PID:2692
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-2717.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-2717.exe
                                                  7⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:2424
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-12836.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-12836.exe
                                              5⤵
                                              • Executes dropped EXE
                                              • Suspicious use of SetWindowsHookEx
                                              PID:2012
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-6718.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-6718.exe
                                                6⤵
                                                • Executes dropped EXE
                                                • Suspicious use of SetWindowsHookEx
                                                PID:2636
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-21000.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-21000.exe
                                                  7⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:276
                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-41761.exe
                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-41761.exe
                                                    8⤵
                                                      PID:2408
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-48197.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-48197.exe
                                                  6⤵
                                                  • Executes dropped EXE
                                                  PID:1736
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-64393.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-64393.exe
                                              4⤵
                                              • Executes dropped EXE
                                              • Loads dropped DLL
                                              • Suspicious use of SetWindowsHookEx
                                              PID:2268
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-1975.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-1975.exe
                                                5⤵
                                                • Executes dropped EXE
                                                • Suspicious use of SetWindowsHookEx
                                                PID:904
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-26563.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-26563.exe
                                                  6⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:2576
                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-25276.exe
                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-25276.exe
                                                    7⤵
                                                    • Executes dropped EXE
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:1684
                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-3089.exe
                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-3089.exe
                                                      8⤵
                                                        PID:2752
                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-19608.exe
                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-19608.exe
                                                    6⤵
                                                    • Executes dropped EXE
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:1164
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-54528.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-54528.exe
                                                  5⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:2708
                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-3485.exe
                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-3485.exe
                                                    6⤵
                                                      PID:2216
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-30438.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-30438.exe
                                              2⤵
                                              • Executes dropped EXE
                                              • Loads dropped DLL
                                              • Suspicious use of SetWindowsHookEx
                                              • Suspicious use of WriteProcessMemory
                                              PID:2160
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-32982.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-32982.exe
                                                3⤵
                                                • Executes dropped EXE
                                                • Loads dropped DLL
                                                • Suspicious use of SetWindowsHookEx
                                                • Suspicious use of WriteProcessMemory
                                                PID:2492
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-33065.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-33065.exe
                                                  4⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:2796
                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-27331.exe
                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-27331.exe
                                                    5⤵
                                                    • Executes dropped EXE
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:2996
                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-54632.exe
                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-54632.exe
                                                      6⤵
                                                        PID:1336
                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-24818.exe
                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-24818.exe
                                                          7⤵
                                                            PID:1040
                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-34766.exe
                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-34766.exe
                                                        5⤵
                                                          PID:3008
                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-37703.exe
                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-37703.exe
                                                      3⤵
                                                      • Executes dropped EXE
                                                      • Loads dropped DLL
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:1940
                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-10553.exe
                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-10553.exe
                                                        4⤵
                                                        • Executes dropped EXE
                                                        • Loads dropped DLL
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:1692
                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-16366.exe
                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-16366.exe
                                                          5⤵
                                                          • Executes dropped EXE
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:1452
                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-12940.exe
                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-12940.exe
                                                            6⤵
                                                            • Executes dropped EXE
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:2572
                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-2525.exe
                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-2525.exe
                                                              7⤵
                                                              • Executes dropped EXE
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:2872
                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-64533.exe
                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-64533.exe
                                                            6⤵
                                                            • Executes dropped EXE
                                                            PID:1248
                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-36053.exe
                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-36053.exe
                                                          5⤵
                                                          • Executes dropped EXE
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:2524
                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-45504.exe
                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-45504.exe
                                                            6⤵
                                                              PID:2096
                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-35679.exe
                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-35679.exe
                                                                7⤵
                                                                  PID:2728
                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-16920.exe
                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-16920.exe
                                                            4⤵
                                                            • Executes dropped EXE
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:572
                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-29277.exe
                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-29277.exe
                                                              5⤵
                                                              • Executes dropped EXE
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:1696
                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-46464.exe
                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-46464.exe
                                                                6⤵
                                                                  PID:1712
                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-49157.exe
                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-49157.exe
                                                                5⤵
                                                                  PID:1652

                                                        Network

                                                        MITRE ATT&CK Matrix

                                                        Replay Monitor

                                                        Loading Replay Monitor...

                                                        Downloads

                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-10553.exe

                                                          Filesize

                                                          184KB

                                                          MD5

                                                          e01acf4618a9f05e55e2e2903790d5dd

                                                          SHA1

                                                          196791d265db38c45d15d01abcd782c6e6b13111

                                                          SHA256

                                                          21e911c9ed95907b366431677a21a4d11808f0bf9e802650af949f474e860fe3

                                                          SHA512

                                                          34dd8cad15356386a6915ec7fd4a5db0407c9bdc9397891035226b410b18dc5840b5d0c0bf02fcec4960116a40988efbd2f580608f6e41427e6ea66929e3ba06

                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-14637.exe

                                                          Filesize

                                                          184KB

                                                          MD5

                                                          5787b84262138c566de936b43df97168

                                                          SHA1

                                                          271b66a7d2ec24211a15604462606ea9454cc4a4

                                                          SHA256

                                                          9ef76ab3c222310bdfa4f9aa4e5f45d67affb80dee30c2e75e712422343fcb53

                                                          SHA512

                                                          5400e6289eecb37436cb73452b5d68061160beaae255e1040ba609129f1903a2ed3e61a87e450b6d61e4904bfa99f2ac3628ded55f9adafd23bf9242df1fd365

                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-20860.exe

                                                          Filesize

                                                          64KB

                                                          MD5

                                                          f6546234154455a070c61e6fce4ad808

                                                          SHA1

                                                          03592534f89dd502ae316b685c28580b52ddc7d7

                                                          SHA256

                                                          f6f81c9f4ac809d9cb889bb7b1544d4780c0c83ef7223677629d7df3db34c856

                                                          SHA512

                                                          b38a775054f46c25c2abe2f49afa8e42f7bd73bc720be58416801c4f2c5fd9b6a40306c652eee6db936580592da7bafd59f479d6cc2d07f224642b79ee5f1ae4

                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-32982.exe

                                                          Filesize

                                                          184KB

                                                          MD5

                                                          4c9b00c013d8fcaa145def36224b85e0

                                                          SHA1

                                                          08cc1828195e8828bf9d9287a8d8f2d370372a0e

                                                          SHA256

                                                          6c5aedefcee3173220d9bf051a604c3fb48474844dc4b71772fb9d47662ee007

                                                          SHA512

                                                          a414328d3e562cfae41e9a5492088d74f0098fe33ca8335a855c5ab209ed96cf6ff962cfd1dc788757673207feefba8223a0a1a5814f4c1e73d301bc47727a37

                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-33065.exe

                                                          Filesize

                                                          184KB

                                                          MD5

                                                          65a9ed25dd1c48d8349681d332317d3f

                                                          SHA1

                                                          159f0357e4a82fa41a40aa4129b0264067460e91

                                                          SHA256

                                                          4dde7fa873ef3be012963c32a3eca716b89df4ba1fe78ea8e6925f5c929d8dfe

                                                          SHA512

                                                          6f3329eadb1cc8233ceb473b5ad9512a6b1accf3da341e4b6eaad81b12d200df156366f1aefc7b13357e043bd6334f5fa2f2e146f0cbfa18ffbeb6b3dc8eba8e

                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-37418.exe

                                                          Filesize

                                                          184KB

                                                          MD5

                                                          898dfd690860fc5bfb3bd3a8b5c8286f

                                                          SHA1

                                                          a22d6f3b6fd06cb86d35eaae544ec5d50f120629

                                                          SHA256

                                                          29a0793b0f16faf912525dd7640408df28bb82a595067603319110a2e326a819

                                                          SHA512

                                                          0cda9cb42d3913d8993a49c5d176b401afe19205b87a4ddc6a1445fe279d7fb5cc50d447eac879c37745e59aea258845ba42587e37b7e756ec5fc1e13e6d47d5

                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-64393.exe

                                                          Filesize

                                                          184KB

                                                          MD5

                                                          75faa62f3fc24b76e57f5583b0030ee4

                                                          SHA1

                                                          917a14cf777bf70956d36109aa244ccffd270547

                                                          SHA256

                                                          eba281ac5a7582c09e13ed46323f61f01290bfa3930f913fabcc6a1865cfbf74

                                                          SHA512

                                                          dbad804a68b91ca0b4b9b86ceb917f57b2cb8baab32c633d1efb45905cf1fd0101cf22392484f497d22192f6350e65a2b885d7cc44e9354bbaee1098f818a462

                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-6718.exe

                                                          Filesize

                                                          184KB

                                                          MD5

                                                          eb036514d0b2cabcc76012c8cf1036d2

                                                          SHA1

                                                          52c47ceed4369bb4ae494ab1af2f049ea6ee1aac

                                                          SHA256

                                                          498dcf9ad232e5c76bd3bf5f71a6b0f191adc1c3083e930c97bcf68b71261814

                                                          SHA512

                                                          5184c838560f5ec26655587b67f6d7c9cc8d6f6265d1913ad8aec1cf10ece880f48fc0fe868bb15289db7cf6fe611bcebc409faf40451ec97ece943b62746979

                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-947.exe

                                                          Filesize

                                                          184KB

                                                          MD5

                                                          873e6c69407a366c0c0689da5796574a

                                                          SHA1

                                                          7f360abe1d510364cedad3047dc251aae209cdc6

                                                          SHA256

                                                          1d48b2140f848011ce70979eb17c16899cfa44798855db6f25e25bdbf171d769

                                                          SHA512

                                                          750959eb584434c09b810858b3758727663658fd56efac82354a228ae3b30986cd5da30182904e3732f8ef08b7797e1c106f7c0a2e39c60f9555354089f0ff88

                                                        • \Users\Admin\AppData\Local\Temp\Unicorn-20860.exe

                                                          Filesize

                                                          184KB

                                                          MD5

                                                          81f6bf05db538ee423f24a60f4ca0456

                                                          SHA1

                                                          665a0ee9e10b8e21574f1c9a788d7132095ea4b9

                                                          SHA256

                                                          b3458868839c5821bf219d2b87bfbd4667b4b08954b7753cc8335ceeb2513c16

                                                          SHA512

                                                          2606397b5f5e06d2c9f775dc1e6de22965a4abe73f76eac413ff5f319e6afa04944079c79380d1cde5df448bd2ae1a1ae0ef473bf0977dcce4ba00cf42453c6d

                                                        • \Users\Admin\AppData\Local\Temp\Unicorn-20860.exe

                                                          Filesize

                                                          128KB

                                                          MD5

                                                          bc633163973bae6f58e6a5bbb11180cf

                                                          SHA1

                                                          e01a496945fe6df5037f9d370405169ab5843c32

                                                          SHA256

                                                          60ee835fd4ce69c11566ec8bce9ba266caeb9bd983b3a42d0a8155cf89892729

                                                          SHA512

                                                          2313694498242dc88da8fa8cfdfb42575e91582dcc5e3741513a3a8e61cbfc9779f2893ef42c5d121e1635fe781794e1d8cbcfd5df059e05c1670f9fb7a5b555

                                                        • \Users\Admin\AppData\Local\Temp\Unicorn-30438.exe

                                                          Filesize

                                                          184KB

                                                          MD5

                                                          d78c5f73cc6669d89eecadf3b4060589

                                                          SHA1

                                                          f01bbd4269b042add429967be44fc6744cf03f75

                                                          SHA256

                                                          e719b5e8f22a03a14d65852b5a68f0cb819c84fec7464a1c6355c18605044db9

                                                          SHA512

                                                          3baacf4ec20fb75fe2b8670d874897ca9b1d27bb8eb381752b97f441a3f37f4ff6c3c69161862da7ba4521f006bd05a060f66e028d06e432f6509c7ddd752429

                                                        • \Users\Admin\AppData\Local\Temp\Unicorn-35831.exe

                                                          Filesize

                                                          184KB

                                                          MD5

                                                          41c8b095e7471158c1065c04bac8ab88

                                                          SHA1

                                                          040a094e9c3d62fbc992dac187b43f144d32dd21

                                                          SHA256

                                                          d29bb4e32402effe780dc949bd4b9c9b95e22e5d3a47e62510850edbe22e6813

                                                          SHA512

                                                          fed906ce39b0618a35e771f5de1f90d888e3c3649a2d31f2dfff64339ff950b28860940ab6376a5bf5876ee374a307563510f86f4d98d5886a374ea79a05d0fb

                                                        • \Users\Admin\AppData\Local\Temp\Unicorn-37703.exe

                                                          Filesize

                                                          184KB

                                                          MD5

                                                          5ed5f83e017134aa9e6784f2dc753326

                                                          SHA1

                                                          c9cd2e2e087067c26354ee939bd06fd2efb52d23

                                                          SHA256

                                                          33bc523231190c31d606c3cc6b801d5bcfec748b2cfc1301721e4b905f516a56

                                                          SHA512

                                                          e06c06055f4c50b0a2df7a191d671e57d6bd691e0b9edcc24c51e6bbe68073d48da18838159bc2eb58f4f8062eb0770c98a15cf7499e3bc90a92502a1e9cf6c0

                                                        • \Users\Admin\AppData\Local\Temp\Unicorn-41150.exe

                                                          Filesize

                                                          184KB

                                                          MD5

                                                          f97a3b447f59015ab6b8cf5ad08d52b6

                                                          SHA1

                                                          ca0d32b0d5a968b8577cef949d28b836f0eb98fd

                                                          SHA256

                                                          bc792f5fd90e8bb8b7801511e28bd384588d4512a6ea67088cd9ce6648c76aad

                                                          SHA512

                                                          1973a11c668e51ab1de40a1bbda61dd85e71add99aca6f80e3d5e650a275c57db96e15431807a8b521da0559d5d9cfa2beaa3acddf22283f3105e9e714aca3ad

                                                        • \Users\Admin\AppData\Local\Temp\Unicorn-45317.exe

                                                          Filesize

                                                          184KB

                                                          MD5

                                                          a869c8b1ff6ac81f774093602190e45f

                                                          SHA1

                                                          14ec41fe5941b87d481e7466dcfab83d922fd3a7

                                                          SHA256

                                                          bab046beed32dc2bcaf75bc2d4a5a821b918b5d2f9a3bd56b1cda4a023f61624

                                                          SHA512

                                                          439ea9419cb4de3f12459d13be7b8395ad2c77695667bf10378cc25ee3ada40c19aaa1d2bed49d8066d0e6dee33a62a49cf760d6b9f30cea41a2112b23495a53

                                                        • \Users\Admin\AppData\Local\Temp\Unicorn-46220.exe

                                                          Filesize

                                                          184KB

                                                          MD5

                                                          446eb023e58ff52f2dfd7bd3cd2694cf

                                                          SHA1

                                                          f7cbc6744c8fe0fa58fb71fb19255405e62e51b3

                                                          SHA256

                                                          28fc018e771d2e27aeb4b0499337de54bcb05e51cf4bd5c97e5a5962ba0459db

                                                          SHA512

                                                          0a8ea178e3bcc8898ab3849e423cf388a50c9d264a85e52dbaf78bfcd938ce4e510b53e7c4fdecd17e0cbf92aea247f72a7b37b8741bf12155d61d73d762ea01

                                                        • \Users\Admin\AppData\Local\Temp\Unicorn-46516.exe

                                                          Filesize

                                                          184KB

                                                          MD5

                                                          f05bca154d3eda13fb53b2977209aeaf

                                                          SHA1

                                                          15b034d1a5d4063d556c10caacb8086ab5461165

                                                          SHA256

                                                          f5a6f7173aec242245f4a1436fd75fbdfd4830164fda8eb671587ab85cef1957

                                                          SHA512

                                                          71b4de3d43c5364d602b5e5d01308f4a8afb87ac209ae695dce6590b8730fda409d1ccee3cea9a30f94d4521c271fb44487b806769d4981f7518c7e33b60a311

                                                        • \Users\Admin\AppData\Local\Temp\Unicorn-5078.exe

                                                          Filesize

                                                          184KB

                                                          MD5

                                                          fe1b838bac3e23f72b9a67188c2f5f67

                                                          SHA1

                                                          c2c32e80404996e429a6ea8a4114310e292ee3bd

                                                          SHA256

                                                          81ad558f48dbdc5a6be580e80d359bad3772f74dad78430d05dc2026c7fee401

                                                          SHA512

                                                          0b02ad964c248d04b9a86fd6bac8594a2a5d96b7b986d27e48a01a0bae182822adc911026c70cfe8b072ff03d15c7ed56fe6ce4863e68656c57d68893328c6f3

                                                        • \Users\Admin\AppData\Local\Temp\Unicorn-51539.exe

                                                          Filesize

                                                          184KB

                                                          MD5

                                                          78caf4485decce18af48e7723bba7d93

                                                          SHA1

                                                          8156b4387893ad26ad56bf351cda7f4d28328ffb

                                                          SHA256

                                                          2867e6eea3677e599c48eaca81b8d40fd0be5b23f2ede91a8208fb7528d10b8d

                                                          SHA512

                                                          ba20ee9d0a1aff83f63b34bb705f4ee4e0605117c05fec7899afd91d7fe3ae4d03d6ab6ebc084e80f7c2bd3ed49eead64acf1d61feb884fb98910d87858555ea

                                                        • \Users\Admin\AppData\Local\Temp\Unicorn-56095.exe

                                                          Filesize

                                                          184KB

                                                          MD5

                                                          d352caaa0598ff5e43a0d198dd2781b8

                                                          SHA1

                                                          3952f1e4ac8b90ba7c559bdb164117d06ad55e6b

                                                          SHA256

                                                          22d6bfa29eb9d2b2a7c54e58cf6e02dc836177615a6a717c5aacf6d0b30a96c1

                                                          SHA512

                                                          f7839dac1f3270e94bce2d420418e9cebfdbb4d49223e9103658c551968a049aec2ebd2ac1b530c69e00f9a408323b4827a3b1d6dcfc71ba83ce978ddfe82af4

                                                        • \Users\Admin\AppData\Local\Temp\Unicorn-8607.exe

                                                          Filesize

                                                          184KB

                                                          MD5

                                                          4b5a80c27bffb84c62181f3362470840

                                                          SHA1

                                                          3a9c27e4820f8aaa3d93a4ad8f5984a8c271c90a

                                                          SHA256

                                                          95d2a8cabe232c579997a5632705f76c3fca4a13a293d435b3aee6b9ae8ddc96

                                                          SHA512

                                                          593370822df731ee051c299a87675e79c5093ff28356bcab55236e1869bd09236790fca8e8c4eee3834eef145598f4577f239e5668e90fdd6f59405edfa5f068