Analysis

  • max time kernel
    41s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20231215-en
  • resource tags

    arch:x64arch:x86image:win7-20231215-enlocale:en-usos:windows7-x64system
  • submitted
    04-02-2024 11:40

General

  • Target

    8f1023fd2318c16afe1a3cc7dbb7a2d6.exe

  • Size

    184KB

  • MD5

    8f1023fd2318c16afe1a3cc7dbb7a2d6

  • SHA1

    9990e19a83780d4de88e732673f109f478d06d81

  • SHA256

    f7a7144eb605ef3ac5ebd2ca3acd4d33070bb9174b49bb6aadd7c5d2de548833

  • SHA512

    4c5f60b7304d857e4d158ceb90be022827f062738437ca45a1440e21d95c4239f1d173caecc0ee1cb077594d481e827aede881020b93ea01ad8af875efde5c54

  • SSDEEP

    3072:cPhaoVdmQWACHePvHaLYJPcZClJJMjrRlwQrxKyLU4ClP6pFw:cP0ot7CHIHxJPc9DUmClP6pF

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 64 IoCs
  • Loads dropped DLL 64 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\8f1023fd2318c16afe1a3cc7dbb7a2d6.exe
    "C:\Users\Admin\AppData\Local\Temp\8f1023fd2318c16afe1a3cc7dbb7a2d6.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2100
    • C:\Users\Admin\AppData\Local\Temp\Unicorn-32690.exe
      C:\Users\Admin\AppData\Local\Temp\Unicorn-32690.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2456
      • C:\Users\Admin\AppData\Local\Temp\Unicorn-54153.exe
        C:\Users\Admin\AppData\Local\Temp\Unicorn-54153.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2380
        • C:\Users\Admin\AppData\Local\Temp\Unicorn-37947.exe
          C:\Users\Admin\AppData\Local\Temp\Unicorn-37947.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2616
          • C:\Users\Admin\AppData\Local\Temp\Unicorn-56670.exe
            C:\Users\Admin\AppData\Local\Temp\Unicorn-56670.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1008
            • C:\Users\Admin\AppData\Local\Temp\Unicorn-53437.exe
              C:\Users\Admin\AppData\Local\Temp\Unicorn-53437.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              PID:2332
              • C:\Users\Admin\AppData\Local\Temp\Unicorn-1626.exe
                C:\Users\Admin\AppData\Local\Temp\Unicorn-1626.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:956
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-19390.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-19390.exe
                  8⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:1172
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-36541.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-36541.exe
                    9⤵
                    • Executes dropped EXE
                    PID:1680
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-49540.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-49540.exe
                  8⤵
                    PID:804
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-7692.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-7692.exe
                  7⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:1908
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-40625.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-40625.exe
                    8⤵
                      PID:1988
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-51382.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-51382.exe
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:2512
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-39618.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-39618.exe
                    7⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:2928
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-33801.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-33801.exe
                      8⤵
                        PID:2836
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-26187.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-26187.exe
                      7⤵
                        PID:2852
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-54005.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-54005.exe
                          8⤵
                            PID:3764
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-29487.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-29487.exe
                      5⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Suspicious use of SetWindowsHookEx
                      PID:528
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-9602.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-9602.exe
                        6⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:1716
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-11989.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-11989.exe
                          7⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:1096
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-40516.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-40516.exe
                            8⤵
                              PID:1192
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-45934.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-45934.exe
                                9⤵
                                  PID:576
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-50583.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-50583.exe
                              7⤵
                                PID:2564
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-12544.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-12544.exe
                              6⤵
                              • Executes dropped EXE
                              • Suspicious use of SetWindowsHookEx
                              PID:2076
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-40516.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-40516.exe
                                7⤵
                                  PID:2412
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-68.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-68.exe
                                    8⤵
                                      PID:3456
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-49057.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-49057.exe
                              4⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • Suspicious use of SetWindowsHookEx
                              PID:1196
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-16681.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-16681.exe
                                5⤵
                                • Executes dropped EXE
                                • Loads dropped DLL
                                • Suspicious use of SetWindowsHookEx
                                PID:2296
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-22239.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-22239.exe
                                  6⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetWindowsHookEx
                                  PID:2172
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-56914.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-56914.exe
                                    7⤵
                                    • Executes dropped EXE
                                    • Suspicious use of SetWindowsHookEx
                                    PID:1720
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-53152.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-53152.exe
                                      8⤵
                                        PID:344
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-29202.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-29202.exe
                                      7⤵
                                        PID:1344
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-45217.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-45217.exe
                                      6⤵
                                      • Executes dropped EXE
                                      • Suspicious use of SetWindowsHookEx
                                      PID:768
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-36624.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-36624.exe
                                        7⤵
                                          PID:2920
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-49808.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-49808.exe
                                            8⤵
                                              PID:1376
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-2373.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-2373.exe
                                        5⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetWindowsHookEx
                                        PID:1732
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-10837.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-10837.exe
                                          6⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetWindowsHookEx
                                          PID:3052
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-45176.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-45176.exe
                                            7⤵
                                              PID:2428
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-3787.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-3787.exe
                                                8⤵
                                                  PID:3916
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-41646.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-41646.exe
                                              6⤵
                                                PID:2712
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-36086.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-36086.exe
                                                  7⤵
                                                    PID:3740
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-31402.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-31402.exe
                                            3⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            • Suspicious use of SetWindowsHookEx
                                            • Suspicious use of WriteProcessMemory
                                            PID:2688
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-11553.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-11553.exe
                                              4⤵
                                              • Executes dropped EXE
                                              • Loads dropped DLL
                                              • Suspicious use of SetWindowsHookEx
                                              • Suspicious use of WriteProcessMemory
                                              PID:3064
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-49353.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-49353.exe
                                                5⤵
                                                • Executes dropped EXE
                                                • Loads dropped DLL
                                                • Suspicious use of SetWindowsHookEx
                                                PID:1652
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-17963.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-17963.exe
                                                  6⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:1348
                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-20158.exe
                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-20158.exe
                                                    7⤵
                                                    • Executes dropped EXE
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:1972
                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-827.exe
                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-827.exe
                                                      8⤵
                                                        PID:1580
                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-50272.exe
                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-50272.exe
                                                          9⤵
                                                            PID:1712
                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-29721.exe
                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-29721.exe
                                                              10⤵
                                                                PID:3532
                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-5466.exe
                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-5466.exe
                                                          7⤵
                                                            PID:1628
                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-8460.exe
                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-8460.exe
                                                          6⤵
                                                          • Executes dropped EXE
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:2336
                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-33692.exe
                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-33692.exe
                                                            7⤵
                                                              PID:1324
                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-43455.exe
                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-43455.exe
                                                                8⤵
                                                                  PID:3808
                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-63634.exe
                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-63634.exe
                                                            5⤵
                                                            • Executes dropped EXE
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:2200
                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-16266.exe
                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-16266.exe
                                                              6⤵
                                                              • Executes dropped EXE
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:1464
                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-65404.exe
                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-65404.exe
                                                                7⤵
                                                                  PID:2520
                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-53707.exe
                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-53707.exe
                                                                6⤵
                                                                  PID:2740
                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-41739.exe
                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-41739.exe
                                                              4⤵
                                                              • Executes dropped EXE
                                                              • Loads dropped DLL
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:2980
                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-54719.exe
                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-54719.exe
                                                                5⤵
                                                                • Executes dropped EXE
                                                                • Suspicious use of SetWindowsHookEx
                                                                PID:2228
                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-28326.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-28326.exe
                                                                  6⤵
                                                                  • Executes dropped EXE
                                                                  • Suspicious use of SetWindowsHookEx
                                                                  PID:2760
                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-54112.exe
                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-54112.exe
                                                                    7⤵
                                                                      PID:2528
                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-45833.exe
                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-45833.exe
                                                                        8⤵
                                                                          PID:2404
                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-30162.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-30162.exe
                                                                      6⤵
                                                                        PID:2252
                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-47970.exe
                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-47970.exe
                                                                          7⤵
                                                                            PID:3868
                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-8460.exe
                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-8460.exe
                                                                        5⤵
                                                                        • Executes dropped EXE
                                                                        • Suspicious use of SetWindowsHookEx
                                                                        PID:2116
                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-4719.exe
                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-4719.exe
                                                                          6⤵
                                                                            PID:1640
                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-46540.exe
                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-46540.exe
                                                                    2⤵
                                                                    • Executes dropped EXE
                                                                    • Loads dropped DLL
                                                                    • Suspicious use of SetWindowsHookEx
                                                                    • Suspicious use of WriteProcessMemory
                                                                    PID:2808
                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-10235.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-10235.exe
                                                                      3⤵
                                                                      • Executes dropped EXE
                                                                      • Loads dropped DLL
                                                                      • Suspicious use of SetWindowsHookEx
                                                                      • Suspicious use of WriteProcessMemory
                                                                      PID:764
                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-7661.exe
                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-7661.exe
                                                                        4⤵
                                                                        • Executes dropped EXE
                                                                        • Loads dropped DLL
                                                                        • Suspicious use of SetWindowsHookEx
                                                                        • Suspicious use of WriteProcessMemory
                                                                        PID:2628
                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-728.exe
                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-728.exe
                                                                          5⤵
                                                                          • Executes dropped EXE
                                                                          • Loads dropped DLL
                                                                          • Suspicious use of SetWindowsHookEx
                                                                          PID:1916
                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-30324.exe
                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-30324.exe
                                                                            6⤵
                                                                            • Executes dropped EXE
                                                                            • Suspicious use of SetWindowsHookEx
                                                                            PID:1804
                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-34766.exe
                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-34766.exe
                                                                              7⤵
                                                                              • Executes dropped EXE
                                                                              • Suspicious use of SetWindowsHookEx
                                                                              PID:1960
                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-4444.exe
                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-4444.exe
                                                                                8⤵
                                                                                • Executes dropped EXE
                                                                                • Suspicious use of SetWindowsHookEx
                                                                                PID:1748
                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-58284.exe
                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-58284.exe
                                                                              7⤵
                                                                              • Executes dropped EXE
                                                                              • Suspicious use of SetWindowsHookEx
                                                                              PID:1532
                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-22876.exe
                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-22876.exe
                                                                            6⤵
                                                                            • Executes dropped EXE
                                                                            • Suspicious use of SetWindowsHookEx
                                                                            PID:2432
                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-11268.exe
                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-11268.exe
                                                                              7⤵
                                                                              • Executes dropped EXE
                                                                              • Suspicious use of SetWindowsHookEx
                                                                              PID:436
                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-26100.exe
                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-26100.exe
                                                                                8⤵
                                                                                  PID:1060
                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-14594.exe
                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-14594.exe
                                                                                7⤵
                                                                                  PID:2632
                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-13665.exe
                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-13665.exe
                                                                              5⤵
                                                                              • Executes dropped EXE
                                                                              • Suspicious use of SetWindowsHookEx
                                                                              PID:704
                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-5793.exe
                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-5793.exe
                                                                                6⤵
                                                                                • Executes dropped EXE
                                                                                • Suspicious use of SetWindowsHookEx
                                                                                PID:2796
                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-49561.exe
                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-49561.exe
                                                                                  7⤵
                                                                                  • Executes dropped EXE
                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                  PID:1548
                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-33587.exe
                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-33587.exe
                                                                                6⤵
                                                                                • Executes dropped EXE
                                                                                • Suspicious use of SetWindowsHookEx
                                                                                PID:2056
                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-27527.exe
                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-27527.exe
                                                                                  7⤵
                                                                                    PID:2460
                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-62736.exe
                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-62736.exe
                                                                              4⤵
                                                                              • Executes dropped EXE
                                                                              • Loads dropped DLL
                                                                              • Suspicious use of SetWindowsHookEx
                                                                              PID:1964
                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-9711.exe
                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-9711.exe
                                                                                5⤵
                                                                                • Executes dropped EXE
                                                                                • Suspicious use of SetWindowsHookEx
                                                                                PID:1620
                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-30490.exe
                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-30490.exe
                                                                                  6⤵
                                                                                  • Executes dropped EXE
                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                  PID:2884
                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-33033.exe
                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-33033.exe
                                                                                    7⤵
                                                                                    • Executes dropped EXE
                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                    PID:2844
                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-5487.exe
                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-5487.exe
                                                                                      8⤵
                                                                                        PID:1700
                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-36086.exe
                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-36086.exe
                                                                                          9⤵
                                                                                            PID:3728
                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-51159.exe
                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-51159.exe
                                                                                        7⤵
                                                                                          PID:1176
                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-21335.exe
                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-21335.exe
                                                                                        6⤵
                                                                                        • Executes dropped EXE
                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                        PID:1268
                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-334.exe
                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-334.exe
                                                                                          7⤵
                                                                                            PID:2104
                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-14708.exe
                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-14708.exe
                                                                                        5⤵
                                                                                        • Executes dropped EXE
                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                        PID:2820
                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-57537.exe
                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-57537.exe
                                                                                          6⤵
                                                                                          • Executes dropped EXE
                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                          PID:1992
                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-33967.exe
                                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-33967.exe
                                                                                            7⤵
                                                                                              PID:2236
                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-14101.exe
                                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-14101.exe
                                                                                            6⤵
                                                                                              PID:2552
                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-34256.exe
                                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-34256.exe
                                                                                                7⤵
                                                                                                  PID:3304
                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-12492.exe
                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-12492.exe
                                                                                          3⤵
                                                                                          • Executes dropped EXE
                                                                                          • Loads dropped DLL
                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                          • Suspicious use of WriteProcessMemory
                                                                                          PID:1212
                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-33209.exe
                                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-33209.exe
                                                                                            4⤵
                                                                                            • Executes dropped EXE
                                                                                            • Loads dropped DLL
                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                            PID:2096
                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-21087.exe
                                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-21087.exe
                                                                                              5⤵
                                                                                              • Executes dropped EXE
                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                              PID:2152
                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-64506.exe
                                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-64506.exe
                                                                                                6⤵
                                                                                                • Executes dropped EXE
                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                PID:2744
                                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-32649.exe
                                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-32649.exe
                                                                                                  7⤵
                                                                                                  • Executes dropped EXE
                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                  PID:1928
                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-339.exe
                                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-339.exe
                                                                                                6⤵
                                                                                                • Executes dropped EXE
                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                PID:368
                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-52809.exe
                                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-52809.exe
                                                                                              5⤵
                                                                                              • Executes dropped EXE
                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                              PID:2620
                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-21549.exe
                                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-21549.exe
                                                                                                6⤵
                                                                                                  PID:2976
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-30750.exe
                                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-30750.exe
                                                                                                    7⤵
                                                                                                      PID:1416
                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-26794.exe
                                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-26794.exe
                                                                                                4⤵
                                                                                                • Executes dropped EXE
                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                PID:1180
                                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-23666.exe
                                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-23666.exe
                                                                                                  5⤵
                                                                                                  • Executes dropped EXE
                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                  PID:2652
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-48985.exe
                                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-48985.exe
                                                                                                    6⤵
                                                                                                      PID:2628
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-49540.exe
                                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-49540.exe
                                                                                                    5⤵
                                                                                                      PID:2792

                                                                                            Network

                                                                                            MITRE ATT&CK Matrix

                                                                                            Replay Monitor

                                                                                            Loading Replay Monitor...

                                                                                            Downloads

                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-31402.exe

                                                                                              Filesize

                                                                                              184KB

                                                                                              MD5

                                                                                              ccaf3c507646fc11ba804063c4ab756f

                                                                                              SHA1

                                                                                              88b581bb92a65ce1a75127546bc11c7f416f0b88

                                                                                              SHA256

                                                                                              cede9c8f5eb6dd4e819999cfaa673010a0bc093f09b927195303797cf8d55a66

                                                                                              SHA512

                                                                                              44e9e75946859f348e7b94f6f21732bd30fc9416e43b871a4754c2ce19f4c8c61e3e6c715d95e8a4fb7778860326aae67e09c510f957d23422424d60b486cb63

                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-53437.exe

                                                                                              Filesize

                                                                                              184KB

                                                                                              MD5

                                                                                              00f01fa7806c48b368dd952879f49cc6

                                                                                              SHA1

                                                                                              79a2c672561c4b2c0cbc676221c3525c4e52b729

                                                                                              SHA256

                                                                                              476336fe9789a16ff3e554891d85c9780bb7c291b6fc264498b64165f84201a1

                                                                                              SHA512

                                                                                              8d1ae30647a7c0073fc28f97fd84d0c15eb04bb1964f413813e3526d316aeb26450b0a05cf925364d7a08fc115e6a12a1aea8a7e1c5cf0d8df7be3798e46ce6c

                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-54153.exe

                                                                                              Filesize

                                                                                              184KB

                                                                                              MD5

                                                                                              e8f77045e54295c30625be6c359e3350

                                                                                              SHA1

                                                                                              0c170a3378632733c43f65c3ffd2391c0b3c3504

                                                                                              SHA256

                                                                                              85f738b61fde0d74d566b55e1bf9ed573642f48cf7deebfa2369a05e75699fb1

                                                                                              SHA512

                                                                                              e95fb366d65ff8ff2a07d8a5f785a9d56235672104517b3a996d6f43fc2a80d3db863f805bdd2df952155bd6dacca8cc4e1aec09b3e2408b596d7655e6c7addf

                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-5793.exe

                                                                                              Filesize

                                                                                              184KB

                                                                                              MD5

                                                                                              699de47bf02e9af7f14321bb2b8b7d5e

                                                                                              SHA1

                                                                                              696f166521f7812d3ecaac778813cf94fd6425b0

                                                                                              SHA256

                                                                                              ae51bc7ae675d40f83b93a992392560012afc33d84810cbbc0c10aecb5bb7a70

                                                                                              SHA512

                                                                                              1ecb8a3e7b703badf2ea8320b403cbd93033eedf610bb1a0cd60eb4b957ca422f1493b05444bf6445cb4e70e39a51895c95778970d94f379c8cbe34071249a75

                                                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-10235.exe

                                                                                              Filesize

                                                                                              184KB

                                                                                              MD5

                                                                                              839646bdd91b2d25af0f96853e9b04c6

                                                                                              SHA1

                                                                                              c77efa2a8e8502ae92af09ed61f699d752c07f57

                                                                                              SHA256

                                                                                              a525b02461f1503ae29990cce3d9979f76ddaf6a5760b0af9569b6c50ac02f1e

                                                                                              SHA512

                                                                                              20dd06a4627c4288bb8485414f9d0aa35c9409e37c420728e83c62fd8954fdc32a861f22bfee1edff90b4ede496f6bfdcae8b774ed4a305ebc29990053357099

                                                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-11553.exe

                                                                                              Filesize

                                                                                              184KB

                                                                                              MD5

                                                                                              156f77a8fff53cebf3e4cccea0011712

                                                                                              SHA1

                                                                                              2f596599e0d3583a3a60de0b5be8cdb7bed8ee05

                                                                                              SHA256

                                                                                              8057b4852ed201d2ea7d5e7e8032ebfe24683313875a3b5f90d01bd5baaaaaa7

                                                                                              SHA512

                                                                                              1a0cf308ae1c798c4ddb2f185ac495ffdeacf8a0a61ad9570fc72cd3c78cec8fb6c23e39a0ac1bd359e0b495939fdcb5057b6261fd3264b91822d85caa0430ab

                                                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-12492.exe

                                                                                              Filesize

                                                                                              184KB

                                                                                              MD5

                                                                                              e725f578178701d8009384ae39b14f8e

                                                                                              SHA1

                                                                                              301b4c41d367dd2707e91d3a294eae78bcdc6cd4

                                                                                              SHA256

                                                                                              5c1e71dd064d308d3843ba3d0e2da0ac8c4d1689faae71fb884f38f0dfe88e95

                                                                                              SHA512

                                                                                              a9114850843108d261c9c0aa631c74c0c861c149325c7d4f577ef7e7759b4c9fcc5e46083484e98003d695c4d82c8a8a274f22fc03660ed1afdf270c11d28a24

                                                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-29487.exe

                                                                                              Filesize

                                                                                              184KB

                                                                                              MD5

                                                                                              245a891b4d2f7cd2507e13a57f2d2ba9

                                                                                              SHA1

                                                                                              e85ac99f7a113bd25c00abdf8bc89e6a5ee04eab

                                                                                              SHA256

                                                                                              dc0e645bf0e58750a3451f327d9d23d33fca878133b4350ff8aa55eeb2c6e4cc

                                                                                              SHA512

                                                                                              852fa9c9e621594eb0f781d7d0707ed190251b6543779b48bce90deb183bfb4c16f391516c2505060c5dc7abe7f142c3285f987e919d2bd7c6243e3508c1c12b

                                                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-32690.exe

                                                                                              Filesize

                                                                                              184KB

                                                                                              MD5

                                                                                              027586def590435d42f7546617fea9ad

                                                                                              SHA1

                                                                                              a53d2c053dcc6633fb7467a85cf7f1d74fa60830

                                                                                              SHA256

                                                                                              cc0fbe721d1e8c4aaf0448fbe92dea723421136dedd61dc7b4ef0f6b53ae8a7d

                                                                                              SHA512

                                                                                              9c360bc8f8c0e1f031336ab1261560d697a8c7fce1c4b28df8ef05ece2b3fd984da8631379413f5fd80c048169a1502df1e1c157968aed2bda78ba960f538ed8

                                                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-33209.exe

                                                                                              Filesize

                                                                                              184KB

                                                                                              MD5

                                                                                              e122df83dc4c314acf8ca134df0c6ed7

                                                                                              SHA1

                                                                                              bc84f346cb193abf07ccc922052a6e34c24a0784

                                                                                              SHA256

                                                                                              7646f3cd15beba04f0ecff2f3549fb2f8abfad249dfbf970d21149f5ea8b0f47

                                                                                              SHA512

                                                                                              12b79aff80e3b8962e8179820552cede445748ea7b620973a8876c1c371862b0b3bf938aecb9cbe645cc94fd857cfab622f77e856464f0f8d945bf0da16af3c9

                                                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-37947.exe

                                                                                              Filesize

                                                                                              184KB

                                                                                              MD5

                                                                                              62564194e7a5efdeb4639759ca8a54e8

                                                                                              SHA1

                                                                                              94673c27e4cb2b52fa4608bd63f9422dd2523354

                                                                                              SHA256

                                                                                              aab53446e547f6f672c1286e80c956a1d0a213ff6f51e8337cc7eee4a680cda7

                                                                                              SHA512

                                                                                              b1e0b6e1d3d75c2df5e8cf76214831971bcdda36af03a22f8f50abdf0b1957c82963d8404d433170a5b94797158ea309c0bd37fb9c2fec6aa8b164b741016488

                                                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-41739.exe

                                                                                              Filesize

                                                                                              184KB

                                                                                              MD5

                                                                                              413dcf51b31a61c9aaf715c7f8ab7903

                                                                                              SHA1

                                                                                              d377197dfb25bad11a69e8d954670e786ed2e63b

                                                                                              SHA256

                                                                                              049098c7c887bfe889a0c18504e607453673cb773c206ccb7f4f9c1dd7f0995b

                                                                                              SHA512

                                                                                              5b9f7af59bf3b088c7e33c33807cf2278a93daf264d67bd52fad7e831d457083f73ce196f66227049860fedf3b91afc11cafb2c2301a7d12cc835583429b02d4

                                                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-46540.exe

                                                                                              Filesize

                                                                                              184KB

                                                                                              MD5

                                                                                              380249ddcc4da7a5e1655eb7fd8b855e

                                                                                              SHA1

                                                                                              4bc1175d9b8392fb18f81b08b99aeacda507d0e0

                                                                                              SHA256

                                                                                              fea891c0831e475ee0539d6195aee52f6ee7e6ab61737e2b5ba78e83b538ea18

                                                                                              SHA512

                                                                                              add4c0a6752f8a4d15fa8dc4e4985a1cfd95bd18026197874cfe055c9acd03df9847c6f4562636d59e0b515eebef3477cb79c5d3a9c492993e3b915e278e446b

                                                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-49057.exe

                                                                                              Filesize

                                                                                              184KB

                                                                                              MD5

                                                                                              8ad44f75e0393fe869c4256e8ab28be7

                                                                                              SHA1

                                                                                              8576eed9ee5d22b8f51d84c063e66df83bbf6658

                                                                                              SHA256

                                                                                              847f7edf26871c9686fed236a13f7182a7efe8202e17f6e5b99976eb1bb60ff1

                                                                                              SHA512

                                                                                              50bab599006279ae3a1a1adaac3d83fc363cc5f64ae3f36c417c6c2f51af29c834cc87cebaf19c10a471ffc68ed1340bcd5279bd0543eed8ee357305af135528

                                                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-49353.exe

                                                                                              Filesize

                                                                                              184KB

                                                                                              MD5

                                                                                              af4d2b2efd98bea34b6f46a7698a14c4

                                                                                              SHA1

                                                                                              09ca64169ee3d581d048575b4fdd3b9357c34cac

                                                                                              SHA256

                                                                                              546f68cf293c49ea7bd09dadb4e6a143c933bd083e7144f2894d2d58be61e510

                                                                                              SHA512

                                                                                              f2396fe49d9e40f1524d7d14f67994a0e80ec1cfad9b1ae2d0a6b087b2dc3336d4f255585ad5adf0a7dd45d84c235d1bcb6588dfbca3727eba346f18a17ce194

                                                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-56670.exe

                                                                                              Filesize

                                                                                              184KB

                                                                                              MD5

                                                                                              f6e2f9f943d0077b18b5af78cd626f9d

                                                                                              SHA1

                                                                                              a556d611a8fa0fa0dd75877aa7d4c74173f9674d

                                                                                              SHA256

                                                                                              a0b601c4bd38114bac23420568ea98cf5d7bd41914dd1d243860b917c52b5154

                                                                                              SHA512

                                                                                              efca032edbc75f0a49e9be72088fe1acf0f3721bdd47217b7f4b54a6b7b0e03dd96110e729341528a00247883afb3ef62b06b1b7eb356d41598fa365c9abd775

                                                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-62736.exe

                                                                                              Filesize

                                                                                              184KB

                                                                                              MD5

                                                                                              097ebc8578f264901ea227b62d68db2c

                                                                                              SHA1

                                                                                              a8aeab2cf96c95b518e48380c0c0c71a7aa501df

                                                                                              SHA256

                                                                                              8aaa13ef0356e4511f6b7e98dca6ab03d6dc89285b503a2dd8989fcd46e4a683

                                                                                              SHA512

                                                                                              1174d8a5af159f7175c4e6aab3382a6982549c2770b5123334fe64f67a91b7bfbb41cbacb82d1145141f90945ddbd7d1cb85134b0724356077948acfe2815d76

                                                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-728.exe

                                                                                              Filesize

                                                                                              184KB

                                                                                              MD5

                                                                                              3f5067291b607551d3e5793aa13362ea

                                                                                              SHA1

                                                                                              95846a2c50d3665125e1b5b1088e5b71d199cd7b

                                                                                              SHA256

                                                                                              9d4c551f35ba68ab1089cfebd4b08daccad210c05386da7f1f8bf6caabe0da86

                                                                                              SHA512

                                                                                              3d0b1bf0c8ac4e5cbecb1d97e9644f08c759420db1d112adbb6734613f88f234dc449bdaf2238786abb5274b250aaaf3d689be5469fc2173946314a34425c657

                                                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-7661.exe

                                                                                              Filesize

                                                                                              184KB

                                                                                              MD5

                                                                                              1858ec2187a42950fb7c70f323316866

                                                                                              SHA1

                                                                                              6dccca2fd6cf82b2e7c1fb3acc12760fa90ff00a

                                                                                              SHA256

                                                                                              67413eebab97d93093ab1766ab684bc49945dcb198b5ed3e13ccf5c0829aa131

                                                                                              SHA512

                                                                                              1456b090f6631e04d3506ab4bd782ebf1f7265f60cf3ab04a86ae4b97a770eb954f10619402bcb25403dbab96751acc48175aae5d94a2c0853114c95a05a135a

                                                                                            • memory/2552-786-0x0000000002830000-0x000000000298C000-memory.dmp

                                                                                              Filesize

                                                                                              1.4MB