Analysis

  • max time kernel
    119s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    28/02/2024, 04:17

General

  • Target

    aafbe0b65a659f28bfebe029096e333c.exe

  • Size

    184KB

  • MD5

    aafbe0b65a659f28bfebe029096e333c

  • SHA1

    f5c6a1099f5261b7b09bb89990852bfaa5ee8380

  • SHA256

    a154524b47e7f7920ac99d7353b9ba654331b5d28eca5c59551b76971ac7f0f9

  • SHA512

    7cc6382e1fa385ba4d3fadb3821e74b7890401c6ca9dd112493ce1c0f5bf03c8afa5c02dc12ac8f7463ee0ee16260056b8d4e9fb7fe89ab18582759dc67fef68

  • SSDEEP

    3072:MuFjoy9xoJXbk5/kwTsS08dbBBf6odzhHr3x+xdcTNlOvpFJ:Muxo3lbkywQS08110mNlOvpF

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 23 IoCs
  • Loads dropped DLL 64 IoCs
  • Program crash 24 IoCs
  • Suspicious use of SetWindowsHookEx 24 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\aafbe0b65a659f28bfebe029096e333c.exe
    "C:\Users\Admin\AppData\Local\Temp\aafbe0b65a659f28bfebe029096e333c.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2184
    • C:\Users\Admin\AppData\Local\Temp\Unicorn-48775.exe
      C:\Users\Admin\AppData\Local\Temp\Unicorn-48775.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2248
      • C:\Users\Admin\AppData\Local\Temp\Unicorn-58448.exe
        C:\Users\Admin\AppData\Local\Temp\Unicorn-58448.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2800
        • C:\Users\Admin\AppData\Local\Temp\Unicorn-35016.exe
          C:\Users\Admin\AppData\Local\Temp\Unicorn-35016.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2632
          • C:\Users\Admin\AppData\Local\Temp\Unicorn-12950.exe
            C:\Users\Admin\AppData\Local\Temp\Unicorn-12950.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2872
            • C:\Users\Admin\AppData\Local\Temp\Unicorn-28509.exe
              C:\Users\Admin\AppData\Local\Temp\Unicorn-28509.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:2672
              • C:\Users\Admin\AppData\Local\Temp\Unicorn-20777.exe
                C:\Users\Admin\AppData\Local\Temp\Unicorn-20777.exe
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:2100
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-12707.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-12707.exe
                  8⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:2736
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-4002.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-4002.exe
                    9⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of SetWindowsHookEx
                    PID:2044
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-19561.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-19561.exe
                      10⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Suspicious use of SetWindowsHookEx
                      PID:2192
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-39348.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-39348.exe
                        11⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:664
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-19027.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-19027.exe
                          12⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:1404
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-12062.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-12062.exe
                            13⤵
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            PID:108
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-47234.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-47234.exe
                              14⤵
                              • Executes dropped EXE
                              • Suspicious use of SetWindowsHookEx
                              PID:1200
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-54624.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-54624.exe
                                15⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                PID:1456
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-46892.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-46892.exe
                                  16⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetWindowsHookEx
                                  PID:656
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-29586.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-29586.exe
                                    17⤵
                                    • Executes dropped EXE
                                    • Suspicious use of SetWindowsHookEx
                                    PID:1216
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-21854.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-21854.exe
                                      18⤵
                                      • Executes dropped EXE
                                      • Suspicious use of SetWindowsHookEx
                                      PID:1640
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-34301.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-34301.exe
                                        19⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetWindowsHookEx
                                        PID:2120
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-38520.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-38520.exe
                                          20⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetWindowsHookEx
                                          PID:2296
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-53310.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-53310.exe
                                            21⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetWindowsHookEx
                                            PID:2748
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-46346.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-46346.exe
                                              22⤵
                                              • Executes dropped EXE
                                              • Suspicious use of SetWindowsHookEx
                                              PID:2452
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-23176.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-23176.exe
                                                23⤵
                                                • Executes dropped EXE
                                                • Suspicious use of SetWindowsHookEx
                                                PID:2500
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-64343.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-64343.exe
                                                  24⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:1632
                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 1632 -s 188
                                                    25⤵
                                                    • Program crash
                                                    PID:1960
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 2500 -s 236
                                                  24⤵
                                                  • Program crash
                                                  PID:2136
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -u -p 2452 -s 236
                                                23⤵
                                                • Program crash
                                                PID:2660
                                            • C:\Windows\SysWOW64\WerFault.exe
                                              C:\Windows\SysWOW64\WerFault.exe -u -p 2748 -s 236
                                              22⤵
                                              • Program crash
                                              PID:2308
                                          • C:\Windows\SysWOW64\WerFault.exe
                                            C:\Windows\SysWOW64\WerFault.exe -u -p 2296 -s 236
                                            21⤵
                                            • Program crash
                                            PID:2916
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -u -p 2120 -s 236
                                          20⤵
                                          • Program crash
                                          PID:2616
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -u -p 1640 -s 236
                                        19⤵
                                        • Program crash
                                        PID:2472
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -u -p 1216 -s 236
                                      18⤵
                                      • Program crash
                                      PID:1648
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -u -p 656 -s 236
                                    17⤵
                                    • Program crash
                                    PID:1948
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -u -p 1456 -s 236
                                  16⤵
                                  • Program crash
                                  PID:2796
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 1200 -s 236
                                15⤵
                                • Program crash
                                PID:1544
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 108 -s 236
                              14⤵
                              • Program crash
                              PID:2220
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 1404 -s 236
                            13⤵
                            • Program crash
                            PID:2080
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 664 -s 236
                          12⤵
                          • Program crash
                          PID:2720
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 2192 -s 236
                        11⤵
                        • Loads dropped DLL
                        • Program crash
                        PID:684
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 2044 -s 236
                      10⤵
                      • Loads dropped DLL
                      • Program crash
                      PID:2012
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 2736 -s 236
                    9⤵
                    • Loads dropped DLL
                    • Program crash
                    PID:2756
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2100 -s 236
                  8⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:2160
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 2672 -s 236
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2156
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2872 -s 236
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2716
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2632 -s 236
            5⤵
            • Loads dropped DLL
            • Program crash
            PID:2008
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2800 -s 236
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:2436
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2248 -s 236
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:2784
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2184 -s 236
      2⤵
      • Program crash
      PID:3052

Network

        MITRE ATT&CK Matrix

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\Unicorn-12707.exe

          Filesize

          184KB

          MD5

          714c73482cd547a61137b8d97ec26f9b

          SHA1

          8f0f240d022e5aafbf709fcbebecb012ee7edb8d

          SHA256

          7b32e75e956e11f94b72204edebad79fe710e7b6a7d0c17bf4b784d50300d33e

          SHA512

          c5e6b188265cdb8dcb7409146ad1d77a1ffeacabd1fa36e9bbdda7acdf018a79e02659a045c41e59cd105324c121999e2d143967ce7b1060691a7c2be5765718

        • C:\Users\Admin\AppData\Local\Temp\Unicorn-28509.exe

          Filesize

          184KB

          MD5

          f62d26969fba12412df0a376cf493817

          SHA1

          e91f5c2a47537fa4e64da76d2f22e2188d3a92c3

          SHA256

          c118e4e3ce4ea2a1fc897320eaf74db07156c9374e4bf1d9178a7362eccc03c6

          SHA512

          e048f5ef64457738d5d63a5231fda22a01dc3eba1ec3c934ec496180eaae4e06a31a2f6a53f0b3341405b70392992370faec5743a43af6405c065ac6c14dfffa

        • \Users\Admin\AppData\Local\Temp\Unicorn-12950.exe

          Filesize

          184KB

          MD5

          74f5adc9688ceeb705638eb07b25f2db

          SHA1

          5224d127f8834ee8aa145d7705edb44e1100247d

          SHA256

          5b7e1eea56926b0c07c6a1031917c1235f54e9a0167a1bbf34c6872a8a6d8874

          SHA512

          6d03253389870adfc3d6e92a0808a7ece65b5a5c235b736373c19ada439b279ed7a0572a33c063473deba12258fdc108b38e94cc2606f8172f2666eda5665fbf

        • \Users\Admin\AppData\Local\Temp\Unicorn-20777.exe

          Filesize

          184KB

          MD5

          a985e9be870f9b5c060031661ec4ab98

          SHA1

          7b5494daf41b37978322474bee0d3ed0aec34a72

          SHA256

          a4cec55903176de0d227b32bd018ba81f732f92893be1cddca116ce2c817dd4b

          SHA512

          a20afa65970e65970b1740e095c3e88ef5178475825dd0a59ca8eb8b0d64b5b72abd176c8c09d61ab748378a3739a02c394bbf727d0c763e05b3f3fd81e55814

        • \Users\Admin\AppData\Local\Temp\Unicorn-35016.exe

          Filesize

          184KB

          MD5

          b5ec37e905a3fbe32018ec1a4baf9dce

          SHA1

          9c1f3dd537f8af32a49672aee1de3a7ed3404de8

          SHA256

          c49269a293b128c78c49e529792a5d8f4bfd0fd9d8ba8650c3d8afd83faefa53

          SHA512

          e9f49f49701878fb674c723018d27e82c1385dff065ffc1d079b4be205cb7e3f4c0b2fce6180b652b645818c688260d072294d0115ee9389afafa0bc4dc9dafc

        • \Users\Admin\AppData\Local\Temp\Unicorn-4002.exe

          Filesize

          184KB

          MD5

          f73ea80185a1854f8635d6c081129e3b

          SHA1

          2cb7c9dde3ca3cd46aee628549151391378e3985

          SHA256

          45416c418696d6410dd87144faee9eee2f9dee0261338b8517e1b17d76634990

          SHA512

          433b2806150eec53375239436d2b601b3b5dd0d9562adce4aa200e5a8bf2e4347f30284c3094f2822e24bbe82f5c80bdf4515fd0ec4263bae8972852640aa26f

        • \Users\Admin\AppData\Local\Temp\Unicorn-48775.exe

          Filesize

          184KB

          MD5

          26d9d80141eac18d470f44a2eac94b3d

          SHA1

          9108ec877368c15030677bf7c6354605a3f28738

          SHA256

          f73bc3fff42c6917c57b916a2c239ef507d471e90060920ce9fad98a4b75f4af

          SHA512

          93e2112212d079225f9ad167966fbf2a47abd6f948125cbef116f30591a885145d92da8ccdd57dcee04aad8881e7038a90ddc835d2e42ba48f8c196c704eaee7

        • \Users\Admin\AppData\Local\Temp\Unicorn-58448.exe

          Filesize

          184KB

          MD5

          99aa00215ad128027b23196a8c7e49bf

          SHA1

          8b697a10c30b27d58c6b648ef4001af734b2d18b

          SHA256

          2d20897ed60c76cba6ca5d902e5e90840a7316ff9c46e7605942f34569f02464

          SHA512

          eb698d9cbab93c4fc967e1d79e20f0f857310320848e39dad1232af4a56a9994036083acd86f720776cc21654e766077bb6afd3bf0ed663999510e90f3db3ff0