Analysis

  • max time kernel
    75s
  • max time network
    117s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    14-02-2024 01:04

General

  • Target

    9a619d92ce55af4c613f27e0f5f5e845.exe

  • Size

    184KB

  • MD5

    9a619d92ce55af4c613f27e0f5f5e845

  • SHA1

    95a312e21eb4da5747b3dd6b5d0cc298f907f74c

  • SHA256

    ce133d13212449f0690ffdab1176fcf93fa45e79382b2f2f4033e68d8f760a56

  • SHA512

    0ffe1fca7cbc3aa9b24014a3ab75191b8235b9ed78171b98b3cd1b6b37cf76c1705bf640ab1b1f99534fb58a360dd1e2805247e76b4cd7ade12bb1f40f544e9b

  • SSDEEP

    3072:+PdZol+7ecADtGP3HaL+JPcZCDJmc+pOl6XrxgJL6dClP6pin:+Pvol9DtYH/JPclKPoClP6pi

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 64 IoCs
  • Loads dropped DLL 64 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\9a619d92ce55af4c613f27e0f5f5e845.exe
    "C:\Users\Admin\AppData\Local\Temp\9a619d92ce55af4c613f27e0f5f5e845.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1328
    • C:\Users\Admin\AppData\Local\Temp\Unicorn-10932.exe
      C:\Users\Admin\AppData\Local\Temp\Unicorn-10932.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2216
      • C:\Users\Admin\AppData\Local\Temp\Unicorn-34382.exe
        C:\Users\Admin\AppData\Local\Temp\Unicorn-34382.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1616
        • C:\Users\Admin\AppData\Local\Temp\Unicorn-12579.exe
          C:\Users\Admin\AppData\Local\Temp\Unicorn-12579.exe
          4⤵
          • Executes dropped EXE
          PID:2580
          • C:\Users\Admin\AppData\Local\Temp\Unicorn-41339.exe
            C:\Users\Admin\AppData\Local\Temp\Unicorn-41339.exe
            5⤵
              PID:1320
              • C:\Users\Admin\AppData\Local\Temp\Unicorn-52855.exe
                C:\Users\Admin\AppData\Local\Temp\Unicorn-52855.exe
                6⤵
                  PID:832
          • C:\Users\Admin\AppData\Local\Temp\Unicorn-22864.exe
            C:\Users\Admin\AppData\Local\Temp\Unicorn-22864.exe
            3⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2804
            • C:\Users\Admin\AppData\Local\Temp\Unicorn-41478.exe
              C:\Users\Admin\AppData\Local\Temp\Unicorn-41478.exe
              4⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:2880
              • C:\Users\Admin\AppData\Local\Temp\Unicorn-48718.exe
                C:\Users\Admin\AppData\Local\Temp\Unicorn-48718.exe
                5⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetWindowsHookEx
                PID:2520
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-34669.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-34669.exe
                  6⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of SetWindowsHookEx
                  PID:1644
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-63541.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-63541.exe
                    7⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:760
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-56669.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-56669.exe
                      8⤵
                      • Executes dropped EXE
                      • Suspicious use of SetWindowsHookEx
                      PID:1200
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-41339.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-41339.exe
                        9⤵
                          PID:2724
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-26545.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-26545.exe
                            10⤵
                              PID:2460
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-62667.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-62667.exe
                                11⤵
                                  PID:1928
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-36803.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-36803.exe
                          7⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:2784
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-45857.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-45857.exe
                            8⤵
                              PID:2272
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-27422.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-27422.exe
                          6⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:2164
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-56669.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-56669.exe
                            7⤵
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            PID:1324
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-16273.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-16273.exe
                              8⤵
                              • Executes dropped EXE
                              • Suspicious use of SetWindowsHookEx
                              PID:1440
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-38874.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-38874.exe
                                9⤵
                                  PID:2300
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-35997.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-35997.exe
                                    10⤵
                                      PID:2120
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-30454.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-30454.exe
                                        11⤵
                                          PID:2736
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-6541.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-6541.exe
                                            12⤵
                                              PID:2648
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-45722.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-45722.exe
                                5⤵
                                • Executes dropped EXE
                                • Loads dropped DLL
                                • Suspicious use of SetWindowsHookEx
                                PID:584
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-15794.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-15794.exe
                                  6⤵
                                  • Executes dropped EXE
                                  PID:2272
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-55444.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-55444.exe
                                    7⤵
                                    • Suspicious use of SetWindowsHookEx
                                    PID:2268
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-41339.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-41339.exe
                                      8⤵
                                        PID:1896
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-45158.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-45158.exe
                                          9⤵
                                            PID:2820
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-35578.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-35578.exe
                                      6⤵
                                      • Executes dropped EXE
                                      • Suspicious use of SetWindowsHookEx
                                      PID:1940
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-53316.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-53316.exe
                                        7⤵
                                          PID:2220
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-12023.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-12023.exe
                                    4⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • Suspicious use of SetWindowsHookEx
                                    PID:2772
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-38369.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-38369.exe
                                      5⤵
                                      • Executes dropped EXE
                                      • Suspicious use of SetWindowsHookEx
                                      PID:2236
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-47288.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-47288.exe
                                        6⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetWindowsHookEx
                                        PID:2160
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-56669.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-56669.exe
                                          7⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetWindowsHookEx
                                          PID:2408
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-40255.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-40255.exe
                                            8⤵
                                              PID:2500
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-2317.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-2317.exe
                                                9⤵
                                                  PID:1316
                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-23973.exe
                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-23973.exe
                                                    10⤵
                                                      PID:2844
                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-21937.exe
                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-21937.exe
                                                        11⤵
                                                          PID:976
                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-35575.exe
                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-35575.exe
                                                    8⤵
                                                      PID:1908
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-36803.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-36803.exe
                                                  6⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:2036
                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-55441.exe
                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-55441.exe
                                                    7⤵
                                                      PID:2704
                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-21937.exe
                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-21937.exe
                                                        8⤵
                                                          PID:2748
                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-27422.exe
                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-27422.exe
                                                    5⤵
                                                    • Executes dropped EXE
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:948
                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-56669.exe
                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-56669.exe
                                                      6⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:1980
                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-40255.exe
                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-40255.exe
                                                        7⤵
                                                          PID:1828
                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-2317.exe
                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-2317.exe
                                                            8⤵
                                                              PID:2552
                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-21937.exe
                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-21937.exe
                                                                9⤵
                                                                  PID:1364
                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-14516.exe
                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-14516.exe
                                                    2⤵
                                                    • Executes dropped EXE
                                                    • Loads dropped DLL
                                                    • Suspicious use of SetWindowsHookEx
                                                    • Suspicious use of WriteProcessMemory
                                                    PID:2208
                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-42730.exe
                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-42730.exe
                                                      3⤵
                                                      • Executes dropped EXE
                                                      • Loads dropped DLL
                                                      • Suspicious use of SetWindowsHookEx
                                                      • Suspicious use of WriteProcessMemory
                                                      PID:2656
                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-43590.exe
                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-43590.exe
                                                        4⤵
                                                        • Executes dropped EXE
                                                        • Loads dropped DLL
                                                        • Suspicious use of SetWindowsHookEx
                                                        • Suspicious use of WriteProcessMemory
                                                        PID:2484
                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-36933.exe
                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-36933.exe
                                                          5⤵
                                                          • Executes dropped EXE
                                                          • Loads dropped DLL
                                                          • Suspicious use of SetWindowsHookEx
                                                          • Suspicious use of WriteProcessMemory
                                                          PID:2932
                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-14959.exe
                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-14959.exe
                                                            6⤵
                                                            • Executes dropped EXE
                                                            • Loads dropped DLL
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:1684
                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-8206.exe
                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-8206.exe
                                                              7⤵
                                                              • Executes dropped EXE
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:1080
                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-65096.exe
                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-65096.exe
                                                                8⤵
                                                                • Executes dropped EXE
                                                                • Suspicious use of SetWindowsHookEx
                                                                PID:2440
                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-43004.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-43004.exe
                                                                  9⤵
                                                                  • Executes dropped EXE
                                                                  • Suspicious use of SetWindowsHookEx
                                                                  PID:2240
                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-46768.exe
                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-46768.exe
                                                                    10⤵
                                                                      PID:2004
                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-55441.exe
                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-55441.exe
                                                                        11⤵
                                                                          PID:1664
                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-30454.exe
                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-30454.exe
                                                                            12⤵
                                                                              PID:2788
                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-25634.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-25634.exe
                                                                      8⤵
                                                                      • Executes dropped EXE
                                                                      • Suspicious use of SetWindowsHookEx
                                                                      PID:1208
                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-10488.exe
                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-10488.exe
                                                                        9⤵
                                                                          PID:1656
                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-41339.exe
                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-41339.exe
                                                                            10⤵
                                                                              PID:2288
                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-55139.exe
                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-55139.exe
                                                                                11⤵
                                                                                  PID:1204
                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-62110.exe
                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-62110.exe
                                                                                    12⤵
                                                                                      PID:320
                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-45231.exe
                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-45231.exe
                                                                            7⤵
                                                                            • Executes dropped EXE
                                                                            • Suspicious use of SetWindowsHookEx
                                                                            PID:2812
                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-43004.exe
                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-43004.exe
                                                                              8⤵
                                                                              • Executes dropped EXE
                                                                              • Suspicious use of SetWindowsHookEx
                                                                              PID:1780
                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-5170.exe
                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-5170.exe
                                                                          6⤵
                                                                          • Executes dropped EXE
                                                                          • Suspicious use of SetWindowsHookEx
                                                                          PID:2044
                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-53908.exe
                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-53908.exe
                                                                            7⤵
                                                                            • Executes dropped EXE
                                                                            • Suspicious use of SetWindowsHookEx
                                                                            PID:2724
                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-28287.exe
                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-28287.exe
                                                                              8⤵
                                                                              • Executes dropped EXE
                                                                              • Suspicious use of SetWindowsHookEx
                                                                              PID:2360
                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-53969.exe
                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-53969.exe
                                                                                9⤵
                                                                                • Executes dropped EXE
                                                                                • Suspicious use of SetWindowsHookEx
                                                                                PID:2932
                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-40255.exe
                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-40255.exe
                                                                                  10⤵
                                                                                    PID:2296
                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-23138.exe
                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-23138.exe
                                                                              7⤵
                                                                              • Executes dropped EXE
                                                                              • Suspicious use of SetWindowsHookEx
                                                                              PID:996
                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-50720.exe
                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-50720.exe
                                                                                8⤵
                                                                                  PID:500
                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-45857.exe
                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-45857.exe
                                                                                    9⤵
                                                                                      PID:2700
                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-60439.exe
                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-60439.exe
                                                                              5⤵
                                                                              • Executes dropped EXE
                                                                              • Loads dropped DLL
                                                                              • Suspicious use of SetWindowsHookEx
                                                                              PID:2108
                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-60614.exe
                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-60614.exe
                                                                                6⤵
                                                                                • Executes dropped EXE
                                                                                • Suspicious use of SetWindowsHookEx
                                                                                PID:404
                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-40203.exe
                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-40203.exe
                                                                                  7⤵
                                                                                  • Executes dropped EXE
                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                  PID:2676
                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-7861.exe
                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-7861.exe
                                                                                    8⤵
                                                                                    • Executes dropped EXE
                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                    PID:2244
                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-38874.exe
                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-38874.exe
                                                                                      9⤵
                                                                                        PID:2896
                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-2317.exe
                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-2317.exe
                                                                                          10⤵
                                                                                            PID:2668
                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-44144.exe
                                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-44144.exe
                                                                                              11⤵
                                                                                                PID:2228
                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-20337.exe
                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-20337.exe
                                                                                      6⤵
                                                                                      • Executes dropped EXE
                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                      PID:2168
                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-1447.exe
                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-1447.exe
                                                                                        7⤵
                                                                                        • Executes dropped EXE
                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                        PID:2076
                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-11639.exe
                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-11639.exe
                                                                                          8⤵
                                                                                            PID:2740
                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-64623.exe
                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-64623.exe
                                                                                    4⤵
                                                                                    • Executes dropped EXE
                                                                                    • Loads dropped DLL
                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                    PID:1988
                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-33761.exe
                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-33761.exe
                                                                                      5⤵
                                                                                      • Executes dropped EXE
                                                                                      • Loads dropped DLL
                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                      PID:2084
                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-24460.exe
                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-24460.exe
                                                                                        6⤵
                                                                                        • Executes dropped EXE
                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                        PID:2836
                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-25922.exe
                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-25922.exe
                                                                                          7⤵
                                                                                          • Executes dropped EXE
                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                          PID:2480
                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-55870.exe
                                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-55870.exe
                                                                                            8⤵
                                                                                            • Executes dropped EXE
                                                                                            PID:2144
                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-45857.exe
                                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-45857.exe
                                                                                              9⤵
                                                                                                PID:1492
                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-6056.exe
                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-6056.exe
                                                                                          6⤵
                                                                                          • Executes dropped EXE
                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                          PID:2444
                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-23774.exe
                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-23774.exe
                                                                                        5⤵
                                                                                        • Executes dropped EXE
                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                        PID:3056
                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-25294.exe
                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-25294.exe
                                                                                          6⤵
                                                                                          • Executes dropped EXE
                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                          PID:3052
                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-12560.exe
                                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-12560.exe
                                                                                            7⤵
                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                            PID:2888
                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-2317.exe
                                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-2317.exe
                                                                                              8⤵
                                                                                                PID:2428
                                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-52855.exe
                                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-52855.exe
                                                                                                  9⤵
                                                                                                    PID:2448
                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-23724.exe
                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-23724.exe
                                                                                        3⤵
                                                                                        • Executes dropped EXE
                                                                                        • Loads dropped DLL
                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                        • Suspicious use of WriteProcessMemory
                                                                                        PID:2452
                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-18952.exe
                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-18952.exe
                                                                                          4⤵
                                                                                          • Executes dropped EXE
                                                                                          • Loads dropped DLL
                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                          PID:2688
                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-51882.exe
                                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-51882.exe
                                                                                            5⤵
                                                                                            • Executes dropped EXE
                                                                                            • Loads dropped DLL
                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                            PID:1908
                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-36681.exe
                                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-36681.exe
                                                                                              6⤵
                                                                                              • Executes dropped EXE
                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                              PID:3012
                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-37463.exe
                                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-37463.exe
                                                                                                7⤵
                                                                                                • Executes dropped EXE
                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                PID:1704
                                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-19670.exe
                                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-19670.exe
                                                                                                  8⤵
                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                  PID:2568
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-41339.exe
                                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-41339.exe
                                                                                                    9⤵
                                                                                                      PID:1972
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-58946.exe
                                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-58946.exe
                                                                                                        10⤵
                                                                                                          PID:584
                                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-35578.exe
                                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-35578.exe
                                                                                                  6⤵
                                                                                                  • Executes dropped EXE
                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                  PID:1916
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-12821.exe
                                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-12821.exe
                                                                                                    7⤵
                                                                                                    • Executes dropped EXE
                                                                                                    PID:1040
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-16075.exe
                                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-16075.exe
                                                                                                      8⤵
                                                                                                        PID:1296
                                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-63001.exe
                                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-63001.exe
                                                                                                  5⤵
                                                                                                  • Executes dropped EXE
                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                  PID:2316
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-7504.exe
                                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-7504.exe
                                                                                                    6⤵
                                                                                                    • Executes dropped EXE
                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                    PID:2156
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-40255.exe
                                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-40255.exe
                                                                                                      7⤵
                                                                                                        PID:1976
                                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-63703.exe
                                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-63703.exe
                                                                                                  4⤵
                                                                                                  • Executes dropped EXE
                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                  PID:412
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-3892.exe
                                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-3892.exe
                                                                                                    5⤵
                                                                                                    • Executes dropped EXE
                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                    PID:1804

                                                                                          Network

                                                                                          MITRE ATT&CK Matrix

                                                                                          Replay Monitor

                                                                                          Loading Replay Monitor...

                                                                                          Downloads

                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-12023.exe

                                                                                            Filesize

                                                                                            184KB

                                                                                            MD5

                                                                                            9506161b5d06dea88b2e94111f6c73e8

                                                                                            SHA1

                                                                                            415148f00fb816ec1e6dde363360a277023201e9

                                                                                            SHA256

                                                                                            e91286b80dbdb9847b52b8272c4a85169186677b1f3108ff792d00620b033b5d

                                                                                            SHA512

                                                                                            71b5840153c12f553787c2cfec7c707994e094633a7a5c9d10059a1b632db3ebcb98dd283d8a487b75605490557b976a58f8bd2e460328968c2cca6a59a247ae

                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-23724.exe

                                                                                            Filesize

                                                                                            184KB

                                                                                            MD5

                                                                                            4ed2ae564984a6faa12f4ded8c27949b

                                                                                            SHA1

                                                                                            628629889cd5174a04ba5f1cf3a12c6f2a10d11e

                                                                                            SHA256

                                                                                            a6dcae91f380b4981c90dbff0cb09ad5d9bbb90ae6bf0c8e058c166c0d060afb

                                                                                            SHA512

                                                                                            9e085d543506a41218a58f47cf8bc0eec88ef1c91331a1072b93221c7ad713100c2e196741655d0c714cf40e503de4ef6b57bb5f14ce0765ed251e91a644fdeb

                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-33761.exe

                                                                                            Filesize

                                                                                            184KB

                                                                                            MD5

                                                                                            177f871bfbf07700cae89f4abf5f834a

                                                                                            SHA1

                                                                                            b4805b202fddb4ad0ef1fad6c8aab5ce873a510a

                                                                                            SHA256

                                                                                            c0d077eae015ea9b371bf0151bed6dd44c660c32e1706a6e0a4c9f720bef6222

                                                                                            SHA512

                                                                                            e4ec957db5be23b3e4ab1428af382070534b3ac3d20dbd39e624857b24c88d0c303389706c9e29fa642db3ad9c0a034a3e9b3c37dbd9dbefb82dd7bd5a143e74

                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-48718.exe

                                                                                            Filesize

                                                                                            184KB

                                                                                            MD5

                                                                                            e59225c9e3fe6c3ed12158f6f15321e0

                                                                                            SHA1

                                                                                            9ba05c8d4d7db1a4674cb822824bd40e5651335a

                                                                                            SHA256

                                                                                            94ce620c1adb1c30e1405708bead5bbfae247fc9b7adcdcba68b7eeb71bbefa5

                                                                                            SHA512

                                                                                            d8a36179126dfd0c5e9b10ce0a64ffcf4ccf281343e832d6413f7a5ab21a9561c5d7ba643f74fa63063489c3f6a786884083d3ae3de02d5d8882ffcd8d778b65

                                                                                          • \Users\Admin\AppData\Local\Temp\Unicorn-10932.exe

                                                                                            Filesize

                                                                                            184KB

                                                                                            MD5

                                                                                            584ab578de41697dfb39e7f2c934117f

                                                                                            SHA1

                                                                                            53c551a1366478fdaaf6002435d36f6a25f5f97d

                                                                                            SHA256

                                                                                            b67bb2ab00e8e0afb3ff25152abe23091c43a421963c6ecdba13f2434f52bb9f

                                                                                            SHA512

                                                                                            560d5d4492ddf4a699285217ee45c787d0cca159d9d7b6c823e913851453fcfd18326930a13fe64e64feb50378afb57a67867aa141984ef545b1017a7d4deebf

                                                                                          • \Users\Admin\AppData\Local\Temp\Unicorn-12579.exe

                                                                                            Filesize

                                                                                            184KB

                                                                                            MD5

                                                                                            90c566db1c42b566273dde9ded84e0ac

                                                                                            SHA1

                                                                                            3284c7f60ef19b5a35d42767566f0dbf85a9a709

                                                                                            SHA256

                                                                                            0da3014b9a1743b3c01847842e6aa6d6f9e53ef32a2460fc953304663cbc6b55

                                                                                            SHA512

                                                                                            8469572a7b00295cf24a19d47ec1b8404844030516b20208bcd0ed62a19658f4105e9749974ca1877f8c7fca49ae2116f39b56e24eb387bf0697b3cdb4f9c3d7

                                                                                          • \Users\Admin\AppData\Local\Temp\Unicorn-14516.exe

                                                                                            Filesize

                                                                                            184KB

                                                                                            MD5

                                                                                            543a134282f134ab57e4448dae1f4f7e

                                                                                            SHA1

                                                                                            9098df067d539510e37a0e74a14d9b2b97cb324e

                                                                                            SHA256

                                                                                            a7d0dfa1915b2938fcba3a3be238bf917b117293622bacfbc810d1f6118e8543

                                                                                            SHA512

                                                                                            b4a017cd12b7e656f878aa39935ced1c1aae5978aec28ec297cc6709a728b0797100fb345536f25f7b06ae6591dcbf692a57acaf97f16e58ff63525779d8d89c

                                                                                          • \Users\Admin\AppData\Local\Temp\Unicorn-14959.exe

                                                                                            Filesize

                                                                                            184KB

                                                                                            MD5

                                                                                            b8b3da1c3a2230fc597f7b7a6ad62013

                                                                                            SHA1

                                                                                            332072146a4d419ca086eb06bd6057e10937d6fd

                                                                                            SHA256

                                                                                            e5db3655d0b89d67249621214faf8a107cfec32acb301460600cdf542221eab9

                                                                                            SHA512

                                                                                            4d1143fc7bc28ec2f2a5a77718cbd5c5f3d9470d77258af4888518a200daba1742da64e3d29d9fc34b6465d7bb864e7d75f587fde58693f82cf328016efbca2d

                                                                                          • \Users\Admin\AppData\Local\Temp\Unicorn-18952.exe

                                                                                            Filesize

                                                                                            184KB

                                                                                            MD5

                                                                                            35f6fe0d38e8e425f61d4374eb1a4284

                                                                                            SHA1

                                                                                            790dd5f6d75225c03606fa0accb246c6a2811cee

                                                                                            SHA256

                                                                                            5231cd4f4fb7375e7839a0af243298b98a15b8a38f5dcec347b6db490545181d

                                                                                            SHA512

                                                                                            8d0b3141fcca057b4c3d3a224311e6fb269f0dce4fdb2cbf627c3a83d5184d8362cb774a3a8a47764b5adf3f65b6bfe8b47cd36ecc956d553059ba57f6260643

                                                                                          • \Users\Admin\AppData\Local\Temp\Unicorn-22864.exe

                                                                                            Filesize

                                                                                            184KB

                                                                                            MD5

                                                                                            d11bfd5b39db3b3298bac12de45f017d

                                                                                            SHA1

                                                                                            33ac5b502b9dce02bd9b3c9bc84e3242da0e9cbd

                                                                                            SHA256

                                                                                            7e5aba834d8f19e64d6eefcfb2df75983de39eaf03c84e5ab5362bcff3150362

                                                                                            SHA512

                                                                                            9e7e8758e842d192d376c3ed74e6e0b0420f38fadfc5c9375a55a13b38f93d45e0ebce454f23dd7043fabdb100c5ad2ad215004b18ae671354b9d7713183ace4

                                                                                          • \Users\Admin\AppData\Local\Temp\Unicorn-34382.exe

                                                                                            Filesize

                                                                                            184KB

                                                                                            MD5

                                                                                            ba835835221eee4accfb1d830f068eb5

                                                                                            SHA1

                                                                                            a3c9307c9f8680f60ab84334a8e6dcb7dc41d508

                                                                                            SHA256

                                                                                            fdbebc6783cffe811009b3437b9304b8397951c4762a2c6e3a58b50cac47cee0

                                                                                            SHA512

                                                                                            f5fd381899fe72c8d027521bdc7c30e2b2aeeaec6be39fe7ef568cf9c771a7f30a36f097d90f12581c1de534124762ef8b461e85c15e65f2180fd056edabfc22

                                                                                          • \Users\Admin\AppData\Local\Temp\Unicorn-36933.exe

                                                                                            Filesize

                                                                                            184KB

                                                                                            MD5

                                                                                            5e12da6d5e72f17e444eb9cfdd5b75fd

                                                                                            SHA1

                                                                                            9aa3e4939f7c905e55311d8aa3b4572c95f1b771

                                                                                            SHA256

                                                                                            0612d0bbe1ab2a559811c9ddd2de8343f1bb235f34cd24148a7aa5c294c181a3

                                                                                            SHA512

                                                                                            a609800874c0d69da5a826129d53ec7483f71923089ebeb15c70c1808e2f0c1177eefbd0dfad5f65b6edfcd57b1b5f20476dd57c1105310c431285fe8cea9a08

                                                                                          • \Users\Admin\AppData\Local\Temp\Unicorn-41478.exe

                                                                                            Filesize

                                                                                            184KB

                                                                                            MD5

                                                                                            c4db1b23fe2469a78c06d6bcb061343d

                                                                                            SHA1

                                                                                            6547ca392a9af88a1efa1112c301f3338d616427

                                                                                            SHA256

                                                                                            707b53a25a56b40aad5ba0db9ab56b34b7913e2bfb75e16abe6defeefe83ff8f

                                                                                            SHA512

                                                                                            66e56461981093a97a68627920a3236188b3bed3a069289dc05f5104a2970433b844e88d787d88977a1b785f46464d226975b25c33e3018e5f7fba8f183d48c7

                                                                                          • \Users\Admin\AppData\Local\Temp\Unicorn-42730.exe

                                                                                            Filesize

                                                                                            184KB

                                                                                            MD5

                                                                                            36432be7898b75cfca3bfa4f5de69750

                                                                                            SHA1

                                                                                            67ee1609006a3c66d85ebd01e0cdc2709ab067fc

                                                                                            SHA256

                                                                                            6171d489617ab4863820f4a7e59141b262474b1721d9722bf2060640968d0df0

                                                                                            SHA512

                                                                                            f155beabe7585c589d7d73a8310903b0370da8d7a561b4fed7e95d7c591cbb0a9f2996e7f2d18d1b4803a8401417c5781b86bc028a557e3dfabae0b21eede2fb

                                                                                          • \Users\Admin\AppData\Local\Temp\Unicorn-43590.exe

                                                                                            Filesize

                                                                                            184KB

                                                                                            MD5

                                                                                            a1aaef3cd4cafd3cda7508417e9b0e44

                                                                                            SHA1

                                                                                            6ccde127a7a963921cf4b9f4cc76a68c39d1ca70

                                                                                            SHA256

                                                                                            c61b80e3bdfafd217306202622471a330173117d79f86742e6296af31063cac6

                                                                                            SHA512

                                                                                            abce68e7e54c28fc333fa5608e9d5f986a043da3bfbfc0d723943571e5bb50fef4340c3e7c4ea93cdbd566ef52bcb5be2e6969fffbcc5bb5ad824844b98c2c60

                                                                                          • \Users\Admin\AppData\Local\Temp\Unicorn-60439.exe

                                                                                            Filesize

                                                                                            184KB

                                                                                            MD5

                                                                                            1bf78c605d77871f7da7af6a99c38d88

                                                                                            SHA1

                                                                                            52fcfd4f02c845f4c7e86b24119809752955eef1

                                                                                            SHA256

                                                                                            55a125d99a7c4a5414535eef41e70c290df7f6891f5371669ffb871045f2bd34

                                                                                            SHA512

                                                                                            9811f6628a5c7814309d175327e39ef5d4c108baaf61470719d20f49cbeea26367bc5774d3eec80c58548b19e6e3a7fb1a354ddbd6b1210c54a4c73c177c23c4

                                                                                          • \Users\Admin\AppData\Local\Temp\Unicorn-64623.exe

                                                                                            Filesize

                                                                                            184KB

                                                                                            MD5

                                                                                            9c53c02cafe33380853a565b7469f296

                                                                                            SHA1

                                                                                            107389538ee10fb8d7a835b458018e2045277b70

                                                                                            SHA256

                                                                                            4cb888d2c07bf4c20f3d6d645ddfa75096241893d998426d491dbad68dfb2a14

                                                                                            SHA512

                                                                                            18c6bed5d5ea02f50cef1c1a267ff982f4e4e367bd1d84548afc2ce223689159fd16079a3efc228666fc27668c2864b74515129087afb8908fd1b4b7bc0e5c4c