Analysis
-
max time kernel
45s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240215-en -
resource tags
arch:x64arch:x86image:win7-20240215-enlocale:en-usos:windows7-x64system -
submitted
05-03-2024 11:13
Static task
static1
Behavioral task
behavioral1
Sample
b4911eca4cdcedea3e25dc86f8492b35.exe
Resource
win7-20240215-en
Behavioral task
behavioral2
Sample
b4911eca4cdcedea3e25dc86f8492b35.exe
Resource
win10v2004-20240226-en
General
-
Target
b4911eca4cdcedea3e25dc86f8492b35.exe
-
Size
184KB
-
MD5
b4911eca4cdcedea3e25dc86f8492b35
-
SHA1
53fb2956d28e9630df940b6018b91ad90e61ea70
-
SHA256
cc22bebae93865c130b0eb68842a83aa91edacb58e0d6da626af17b894daa6fa
-
SHA512
89fa907f1bc47d78cb172178e6a58d0e9df5681a500d60ec5233b9e9f05349cbfaaa2907d620905b1f6b21bd7db3c925ee17f852611907d0a04028b8ab9b3dd1
-
SSDEEP
3072:waHeoYbkfYA01OjYdTsWl8Fb6d96DDWI0DExq9PpaNlPvpFF:wa+oh501HdoWl8XXG+NlPvpF
Malware Config
Signatures
-
Executes dropped EXE 56 IoCs
pid Process 2980 Unicorn-54306.exe 3064 Unicorn-49511.exe 2588 Unicorn-25561.exe 2728 Unicorn-48608.exe 2572 Unicorn-20574.exe 2452 Unicorn-32272.exe 2056 Unicorn-57098.exe 804 Unicorn-33148.exe 2372 Unicorn-24234.exe 1896 Unicorn-11789.exe 276 Unicorn-49293.exe 2320 Unicorn-39859.exe 312 Unicorn-3465.exe 1364 Unicorn-15162.exe 2736 Unicorn-6994.exe 2100 Unicorn-23885.exe 2904 Unicorn-35583.exe 1824 Unicorn-62178.exe 988 Unicorn-16507.exe 344 Unicorn-26668.exe 2088 Unicorn-60087.exe 1588 Unicorn-55256.exe 1312 Unicorn-31306.exe 2252 Unicorn-43004.exe 2340 Unicorn-52516.exe 2244 Unicorn-27820.exe 1904 Unicorn-61239.exe 1968 Unicorn-11483.exe 1988 Unicorn-56408.exe 1728 Unicorn-36542.exe 1928 Unicorn-44156.exe 1920 Unicorn-7762.exe 2948 Unicorn-17597.exe 2536 Unicorn-59184.exe 2552 Unicorn-5344.exe 1980 Unicorn-27109.exe 2580 Unicorn-15926.exe 2440 Unicorn-7565.exe 2688 Unicorn-32816.exe 2920 Unicorn-7051.exe 1216 Unicorn-40238.exe 548 Unicorn-57129.exe 1468 Unicorn-357.exe 764 Unicorn-28946.exe 2184 Unicorn-41560.exe 2120 Unicorn-61426.exe 1580 Unicorn-61426.exe 1576 Unicorn-41560.exe 1568 Unicorn-41560.exe 1852 Unicorn-61426.exe 2312 Unicorn-14638.exe 2280 Unicorn-50627.exe 1676 Unicorn-50627.exe 628 Unicorn-51587.exe 2060 Unicorn-50300.exe 1736 Unicorn-45713.exe -
Loads dropped DLL 64 IoCs
pid Process 2204 b4911eca4cdcedea3e25dc86f8492b35.exe 2204 b4911eca4cdcedea3e25dc86f8492b35.exe 2980 Unicorn-54306.exe 2980 Unicorn-54306.exe 2204 b4911eca4cdcedea3e25dc86f8492b35.exe 2204 b4911eca4cdcedea3e25dc86f8492b35.exe 3064 Unicorn-49511.exe 3064 Unicorn-49511.exe 2980 Unicorn-54306.exe 2980 Unicorn-54306.exe 2588 Unicorn-25561.exe 2588 Unicorn-25561.exe 2728 Unicorn-48608.exe 2728 Unicorn-48608.exe 3064 Unicorn-49511.exe 3064 Unicorn-49511.exe 2572 Unicorn-20574.exe 2572 Unicorn-20574.exe 2452 Unicorn-32272.exe 2452 Unicorn-32272.exe 2588 Unicorn-25561.exe 2588 Unicorn-25561.exe 2056 Unicorn-57098.exe 2056 Unicorn-57098.exe 2728 Unicorn-48608.exe 2728 Unicorn-48608.exe 804 Unicorn-33148.exe 804 Unicorn-33148.exe 2372 Unicorn-24234.exe 2372 Unicorn-24234.exe 2572 Unicorn-20574.exe 2572 Unicorn-20574.exe 1896 Unicorn-11789.exe 1896 Unicorn-11789.exe 2452 Unicorn-32272.exe 276 Unicorn-49293.exe 2452 Unicorn-32272.exe 276 Unicorn-49293.exe 2320 Unicorn-39859.exe 2320 Unicorn-39859.exe 2056 Unicorn-57098.exe 2056 Unicorn-57098.exe 1364 Unicorn-15162.exe 1364 Unicorn-15162.exe 804 Unicorn-33148.exe 804 Unicorn-33148.exe 312 Unicorn-3465.exe 312 Unicorn-3465.exe 2100 Unicorn-23885.exe 2100 Unicorn-23885.exe 988 Unicorn-16507.exe 988 Unicorn-16507.exe 276 Unicorn-49293.exe 276 Unicorn-49293.exe 2736 Unicorn-6994.exe 2736 Unicorn-6994.exe 1824 Unicorn-62178.exe 2372 Unicorn-24234.exe 1824 Unicorn-62178.exe 2372 Unicorn-24234.exe 2904 Unicorn-35583.exe 2904 Unicorn-35583.exe 1896 Unicorn-11789.exe 1896 Unicorn-11789.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1152 2688 WerFault.exe 66 -
Suspicious use of SetWindowsHookEx 40 IoCs
pid Process 2204 b4911eca4cdcedea3e25dc86f8492b35.exe 2980 Unicorn-54306.exe 3064 Unicorn-49511.exe 2588 Unicorn-25561.exe 2728 Unicorn-48608.exe 2572 Unicorn-20574.exe 2452 Unicorn-32272.exe 2056 Unicorn-57098.exe 804 Unicorn-33148.exe 2372 Unicorn-24234.exe 1896 Unicorn-11789.exe 276 Unicorn-49293.exe 2320 Unicorn-39859.exe 1364 Unicorn-15162.exe 312 Unicorn-3465.exe 2736 Unicorn-6994.exe 2100 Unicorn-23885.exe 1824 Unicorn-62178.exe 2904 Unicorn-35583.exe 988 Unicorn-16507.exe 344 Unicorn-26668.exe 2088 Unicorn-60087.exe 1312 Unicorn-31306.exe 1588 Unicorn-55256.exe 2252 Unicorn-43004.exe 2340 Unicorn-52516.exe 2244 Unicorn-27820.exe 1904 Unicorn-61239.exe 1968 Unicorn-11483.exe 1728 Unicorn-36542.exe 1928 Unicorn-44156.exe 1988 Unicorn-56408.exe 2536 Unicorn-59184.exe 2948 Unicorn-17597.exe 2552 Unicorn-5344.exe 2580 Unicorn-15926.exe 1980 Unicorn-27109.exe 2440 Unicorn-7565.exe 2920 Unicorn-7051.exe 2688 Unicorn-32816.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2204 wrote to memory of 2980 2204 b4911eca4cdcedea3e25dc86f8492b35.exe 28 PID 2204 wrote to memory of 2980 2204 b4911eca4cdcedea3e25dc86f8492b35.exe 28 PID 2204 wrote to memory of 2980 2204 b4911eca4cdcedea3e25dc86f8492b35.exe 28 PID 2204 wrote to memory of 2980 2204 b4911eca4cdcedea3e25dc86f8492b35.exe 28 PID 2980 wrote to memory of 3064 2980 Unicorn-54306.exe 29 PID 2980 wrote to memory of 3064 2980 Unicorn-54306.exe 29 PID 2980 wrote to memory of 3064 2980 Unicorn-54306.exe 29 PID 2980 wrote to memory of 3064 2980 Unicorn-54306.exe 29 PID 2204 wrote to memory of 2588 2204 b4911eca4cdcedea3e25dc86f8492b35.exe 30 PID 2204 wrote to memory of 2588 2204 b4911eca4cdcedea3e25dc86f8492b35.exe 30 PID 2204 wrote to memory of 2588 2204 b4911eca4cdcedea3e25dc86f8492b35.exe 30 PID 2204 wrote to memory of 2588 2204 b4911eca4cdcedea3e25dc86f8492b35.exe 30 PID 3064 wrote to memory of 2728 3064 Unicorn-49511.exe 31 PID 3064 wrote to memory of 2728 3064 Unicorn-49511.exe 31 PID 3064 wrote to memory of 2728 3064 Unicorn-49511.exe 31 PID 3064 wrote to memory of 2728 3064 Unicorn-49511.exe 31 PID 2980 wrote to memory of 2572 2980 Unicorn-54306.exe 32 PID 2980 wrote to memory of 2572 2980 Unicorn-54306.exe 32 PID 2980 wrote to memory of 2572 2980 Unicorn-54306.exe 32 PID 2980 wrote to memory of 2572 2980 Unicorn-54306.exe 32 PID 2588 wrote to memory of 2452 2588 Unicorn-25561.exe 33 PID 2588 wrote to memory of 2452 2588 Unicorn-25561.exe 33 PID 2588 wrote to memory of 2452 2588 Unicorn-25561.exe 33 PID 2588 wrote to memory of 2452 2588 Unicorn-25561.exe 33 PID 2728 wrote to memory of 2056 2728 Unicorn-48608.exe 34 PID 2728 wrote to memory of 2056 2728 Unicorn-48608.exe 34 PID 2728 wrote to memory of 2056 2728 Unicorn-48608.exe 34 PID 2728 wrote to memory of 2056 2728 Unicorn-48608.exe 34 PID 3064 wrote to memory of 804 3064 Unicorn-49511.exe 35 PID 3064 wrote to memory of 804 3064 Unicorn-49511.exe 35 PID 3064 wrote to memory of 804 3064 Unicorn-49511.exe 35 PID 3064 wrote to memory of 804 3064 Unicorn-49511.exe 35 PID 2572 wrote to memory of 2372 2572 Unicorn-20574.exe 36 PID 2572 wrote to memory of 2372 2572 Unicorn-20574.exe 36 PID 2572 wrote to memory of 2372 2572 Unicorn-20574.exe 36 PID 2572 wrote to memory of 2372 2572 Unicorn-20574.exe 36 PID 2452 wrote to memory of 1896 2452 Unicorn-32272.exe 37 PID 2452 wrote to memory of 1896 2452 Unicorn-32272.exe 37 PID 2452 wrote to memory of 1896 2452 Unicorn-32272.exe 37 PID 2452 wrote to memory of 1896 2452 Unicorn-32272.exe 37 PID 2588 wrote to memory of 276 2588 Unicorn-25561.exe 38 PID 2588 wrote to memory of 276 2588 Unicorn-25561.exe 38 PID 2588 wrote to memory of 276 2588 Unicorn-25561.exe 38 PID 2588 wrote to memory of 276 2588 Unicorn-25561.exe 38 PID 2056 wrote to memory of 2320 2056 Unicorn-57098.exe 39 PID 2056 wrote to memory of 2320 2056 Unicorn-57098.exe 39 PID 2056 wrote to memory of 2320 2056 Unicorn-57098.exe 39 PID 2056 wrote to memory of 2320 2056 Unicorn-57098.exe 39 PID 2728 wrote to memory of 312 2728 Unicorn-48608.exe 40 PID 2728 wrote to memory of 312 2728 Unicorn-48608.exe 40 PID 2728 wrote to memory of 312 2728 Unicorn-48608.exe 40 PID 2728 wrote to memory of 312 2728 Unicorn-48608.exe 40 PID 804 wrote to memory of 1364 804 Unicorn-33148.exe 41 PID 804 wrote to memory of 1364 804 Unicorn-33148.exe 41 PID 804 wrote to memory of 1364 804 Unicorn-33148.exe 41 PID 804 wrote to memory of 1364 804 Unicorn-33148.exe 41 PID 2372 wrote to memory of 2736 2372 Unicorn-24234.exe 42 PID 2372 wrote to memory of 2736 2372 Unicorn-24234.exe 42 PID 2372 wrote to memory of 2736 2372 Unicorn-24234.exe 42 PID 2372 wrote to memory of 2736 2372 Unicorn-24234.exe 42 PID 2572 wrote to memory of 2100 2572 Unicorn-20574.exe 43 PID 2572 wrote to memory of 2100 2572 Unicorn-20574.exe 43 PID 2572 wrote to memory of 2100 2572 Unicorn-20574.exe 43 PID 2572 wrote to memory of 2100 2572 Unicorn-20574.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\b4911eca4cdcedea3e25dc86f8492b35.exe"C:\Users\Admin\AppData\Local\Temp\b4911eca4cdcedea3e25dc86f8492b35.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54306.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54306.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49511.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49511.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3064 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48608.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48608.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-57098.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57098.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2056 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-39859.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39859.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26668.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26668.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:344 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17597.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17597.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2948
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59184.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59184.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50300.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50300.exe8⤵
- Executes dropped EXE
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14933.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14933.exe9⤵PID:952
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60087.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60087.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2088 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5344.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5344.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2552
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3465.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3465.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:312 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-43004.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43004.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2252 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-7565.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7565.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2440 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14638.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14638.exe8⤵
- Executes dropped EXE
PID:2312
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51587.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51587.exe7⤵
- Executes dropped EXE
PID:628
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7051.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7051.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2920
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33148.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33148.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:804 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15162.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15162.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1364 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-55256.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55256.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1588 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15926.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15926.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2580 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45713.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45713.exe8⤵
- Executes dropped EXE
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18411.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18411.exe9⤵PID:2788
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32816.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32816.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2688 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2688 -s 1887⤵
- Program crash
PID:1152
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31306.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31306.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1312 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27109.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27109.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1980
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20574.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20574.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2572 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-24234.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24234.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6994.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6994.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11483.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11483.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50627.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50627.exe7⤵
- Executes dropped EXE
PID:2280
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41560.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41560.exe6⤵
- Executes dropped EXE
PID:1568
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36542.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36542.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61426.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61426.exe6⤵
- Executes dropped EXE
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-28616.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28616.exe7⤵PID:2404
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23885.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23885.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-52516.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52516.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2340 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40238.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40238.exe6⤵
- Executes dropped EXE
PID:1216 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61975.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61975.exe7⤵PID:1536
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57129.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57129.exe5⤵
- Executes dropped EXE
PID:548
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25561.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25561.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2588 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-32272.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32272.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2452 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11789.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11789.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1896 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35583.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35583.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44156.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44156.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1928 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-28946.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28946.exe7⤵
- Executes dropped EXE
PID:764
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7762.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7762.exe5⤵
- Executes dropped EXE
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61426.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61426.exe6⤵
- Executes dropped EXE
PID:1852
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62178.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62178.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1824 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-56408.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56408.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50627.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50627.exe6⤵
- Executes dropped EXE
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-33029.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33029.exe7⤵PID:2596
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11013.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11013.exe8⤵PID:2704
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41560.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41560.exe5⤵
- Executes dropped EXE
PID:1576
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49293.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49293.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:276 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16507.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16507.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:988 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27820.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27820.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61426.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61426.exe6⤵
- Executes dropped EXE
PID:2120 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-25645.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25645.exe7⤵PID:468
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63774.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63774.exe8⤵PID:2528
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41560.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41560.exe5⤵
- Executes dropped EXE
PID:2184
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61239.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61239.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1904 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-357.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-357.exe5⤵
- Executes dropped EXE
PID:1468
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD58ecbf0d7d6538a9d559ce0af1fd2fe79
SHA1fb52a01affaa9508a3a40592f1a775d713e6d1df
SHA256f912823fdbc389fbfa4a4d023876fdc8a0436187608fe38b289a7802a339fa9d
SHA51232b963faec894ff24a8394273ff9de1e8222e4260d25fd57e0cb44bd300d24ef08b9a2c68ea00987eda3e326b4dcc0f563dda9a98c8e60667171b8cd5d2e290a
-
Filesize
184KB
MD5d0465358c26b7529a18b786efa125ed8
SHA196252ad791ace82a2f59c87273c0ebf99ec3cc53
SHA256ec2af0d52e2f355a7ab4412b73c8a7d17da4e63ff65143cf8e21a77526718941
SHA512426607506c48b299b85e4027cae216e618802aebcf5cda0a57ab06bd97691b101fe6aa3257a4d5217ca1a638cb60ef066258db0b2b4788e7bbfae51e3067e1eb
-
Filesize
184KB
MD53efa71638d36f532215c79eb2d029003
SHA15b602d04f7e74d0c9df9ea206f41b40b2c2e4f37
SHA256f8ab011d09597de1999c3df71c00a33c8584463e3aed7d382aac0d971fc366b4
SHA5124f0e3b3ff92fea239a9d95593361185478320fb5281e044ff95df5aea4646894ce19c9adb50305d22a1b00127150bf28ea34e57a1c623e33fc19e0bb727f4174
-
Filesize
184KB
MD5566e689962fed3964e1d51d95e91313c
SHA1bb02a2889c70b2330f8c89d4d67fc6757e81a2d6
SHA25672d07f9cce4ec16af9e9d01ae8c11a93649e9a1867c393c68125144ec6ed3f68
SHA512026c3342abb4bd65996712286cea9266053635ddd82356a84221898b996b33ac3365a97439c6910d1ab18ee694eec39fb90a58bfa8086ff943b85686221f7d48
-
Filesize
184KB
MD598ffbadfc9131aafcfa324d0d1b33abb
SHA142e65bcee62fb99a531fc640c85654468283f9ad
SHA256bde48857fc7e18e48edeb9c3f5245ab716c9b6be1042f270c1f49c6ed4e7a056
SHA5123db2e0a5415aede1401628962e6237a2b8602de54c2ce87a55753ed66a751421ea55629e57a371e175d08286a9dd587382dd72d1f32fcf75ceaaee44e580c0f8
-
Filesize
184KB
MD596c314cc6e8233aa8957df023a64e65c
SHA1f12f617afb4eaef39d9b831323158eb6566df982
SHA2569f1e340d104643495f0b4a8a8ac84410c35f57b90d6c1f189312cefe60cee7ab
SHA5123590911a8a81c79a71ff7e912df024dc171a73a29ba6e7f70ab8b39d43f8e1f6dd917c6cf763c8b67e23d35716b2ff3c4ca0fca70781d3ef436d00a26e5f8c8f
-
Filesize
184KB
MD534ab9eadc3e3642856b1298fd59d9a0f
SHA1f248218c6a27333edde1c81f9c4c54c9d8f489fc
SHA256a8ebbdfcacaf2d3c8ffc44443988219b1d0b38aa7e57bdae8a7d9263d532e56e
SHA512e8afd21523568b0df0c7fa2c76d07b4c8620c91e36f385161de7a60c9dac4f10bb9d97bf6787683dfd17d43dd4405d05453337d62b1689cc35822750503a1759
-
Filesize
184KB
MD53675b82d97c24c894958e25ba9c1526f
SHA172a0c604fb78b9d3909e20b625e694662cf435f7
SHA2562c3f16d90342df8e1532b7a3f1f47f98d6a00d4e2b87ee4361923d0999abc004
SHA512f4fdb3a9e66b6c9c8b66b0fe0d7c29f6502a8f3f99ed6245100c93814e921d6e55cbc9cb3a2b66aaca729f3b1affd7e8344d78c49d99cd126297024a19e1602f
-
Filesize
184KB
MD55d1053c3b445b0258ae796915731a137
SHA1ac8565e08ae7b5806716dba16409e1538c57ba9a
SHA256c9f7978fea62237cd196196c70b12040a8b84b1cef2f9bebd15a28d330ebdb51
SHA512ce492f075a68bbad7515dfce1ffb520fa679e399f1cab2cb795727e6f1ff57c8f6921329cbeddfe2f5269ea45938c468970c754cdf95d671e5f4df7fe1e1acdd
-
Filesize
184KB
MD589e2cc67f00786fc14e61b71ffd26a5a
SHA1164fbe620f083421bcaba710dabd3d4ca80af4e1
SHA25618a85b19bed8a651ab25ce790d63943d55e0169aa9937756b9599466f0a948a2
SHA5125e768e09fc2ac0356c1892dca73ddee2b71d6cc198295572b1971c6c0ac745004afedc060e1871e76546cd830cf1df2cfb0497c44bbb0d2e3a1c2fc19e469cbe
-
Filesize
184KB
MD509cff0d70846ccd380f7a827da5b2c90
SHA125807838082ee0628f58dd85c33a24de1bb38d34
SHA2566ddc6a3070d4604334838dfde6d8baaa717722be76dd370ba1fea9e7fb7de9c2
SHA5125f1f21a326b3ffe6b5d2cad4a86c4e316cbf24ab23c6b769d6d50d621f76e3502f368e80c09a69a5bac657860a1773c5803d6eeb952be35635251f514559b582
-
Filesize
184KB
MD59247a11a36b18cdd026c878cd2b564cb
SHA19e75916b45c64aeb18850373018699bd33ccd1bf
SHA2561d1c68640d3e8876f9781c601fef55856ed438860702ea27ec83747df3f802f7
SHA512be8e3cf86392dd2b071bb8647407507457c6e20c0598922bd83fc61511527ef2a6dfa6bda814053946d4ada82ac9b5c3f7dc708d9cb7fc2e48a5a15c71770ebf
-
Filesize
184KB
MD5e2dbd528a1bfd37d37c5f8e5cf14a677
SHA1e9a7b3df33b7c7111416120374e55cab7b688c15
SHA25696d18ef2f30baa4a86893c6300e5c865bb112670b9634675cc75ba793c0130e4
SHA512eefe38fc9256da92b48c7efca9a8d3c432907a94ccf92154b8b242c605e74ad40a91689c1f035e2af21583ef8ee9bdc73d8b5b1da98656534579bee4c0828ded
-
Filesize
184KB
MD5ece7295e8e36fce3074346e1ddc1424a
SHA1f1f60f3065ebdfc3fd02ca6fb2d6a8c346304e65
SHA25644d08139ee6a64899cf1710c41ba9075b9cc45310d6540805e7f9bf8e6a3fb69
SHA512db142b591c54d42265b5e87d4f63c859b7cf3cce184c4932387ac95688b2de3184dab5477526e5539a12b57572cbaf6a598d826e6cc71f1614c950fe1895a23e
-
Filesize
184KB
MD55766a56f008ca0988a2f221cd8559bea
SHA119736f6743393a6ccfd26649b5f40079710e684c
SHA256354bdc05f7fe0bab46ac1b6454c911b6b3467242afd0c5871febcc777e986457
SHA512a071dc5d2c87a0f128bd68fd9ebcaf06a3b274034791f1a4ed3e2c689a8cdd1228be2e1a8106c300cde564501da3dfe4ddff98f8ada8f16373c4ca44bd621f46
-
Filesize
184KB
MD55c631fac69b1ca0a183f207f5115c096
SHA14e649eb57ac33cf34b4a52e41e020e5ebe6006d6
SHA2561bd63963f8c70711f082211b48ece311380aef1f75d3e24387f946d0a8f6a70e
SHA512ba468750070782640b12bdcb9d498355aa34ae588654f0a73af184041b66c6711e58dba5630bd37bb4dcd2bb0fc1f0ebecc2a8cddd3a4fdec802d869593a17e8
-
Filesize
184KB
MD5493f5a8b1d25c9dda1d48b305a59da98
SHA16b3f59daad6d559b80743c094d9cad5e86326488
SHA256d5cab45e1d5540ac15508341b7485c7aa379ea17ce8a131b6e7ff557d4b032a1
SHA5125d166fcb5f0109c385ca3dd1110418a282f70b10898e241a2899d1cd97b5748aa6916e689c9a6b02e42860d5d7e0a9bb6fc33a75bc66432d5edec92a25cc4c0c
-
Filesize
184KB
MD5e054640cb7fb7aa4e62574726761fa56
SHA11d8d61c26996e3b544cb07577b4c09fe871701c6
SHA256f5175b7f31a268db338886b26497293fcc09d16a791dde954273ea66ef2f08b9
SHA5129c930a9ea2e2d630a19045897ca13fd3a0d6dacc78022763a607dbf732d2296716c552a36d2f7baba0a7ee3b7f56d60eb4162239111b4e8dde0ec7397e429bbe
-
Filesize
184KB
MD53c6288d92fdd4d352ec7c866a5d2b216
SHA1bcbc5723c6779659123abda4abcacfed7218ed91
SHA25650aa090f2a42f3b85f16567428f4fb34352fdec24edcd3916c2cede4a389c940
SHA512e559f364e1a47af18646c0c8abf38b74d95e4555b83e37013cefa7b040ada3594cff06a9438b167501af14f7b33342c40ee8bebc2f77e2d0f805117f009b879c