Analysis

  • max time kernel
    53s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    06-03-2024 11:50

General

  • Target

    b7547b31f32bd3daea5b7fcb5d05bae1.exe

  • Size

    184KB

  • MD5

    b7547b31f32bd3daea5b7fcb5d05bae1

  • SHA1

    90fc7bbc144048eb83a069b469ee37dee5bbde00

  • SHA256

    6598634013f1ff30f144118aaca0159a127ec690bdef90b7a235fca24d1c67fc

  • SHA512

    4bbdb56bac9c8d51681bfd6ab729e136814a49a140bcc9ea222259e5d02229785f916702afef743eb4d38b21db1bd0ac932be91cea4d6a02e8a1c6ab360468c7

  • SSDEEP

    3072:aZWSoz/5z+A6ryjQVjiUAZF03Hk64AaFuvEx8/uCbNlPvpFU:aZboRz6rPVWUAZya6hNlPvpF

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 64 IoCs
  • Loads dropped DLL 64 IoCs
  • Program crash 52 IoCs
  • Suspicious use of SetWindowsHookEx 55 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\b7547b31f32bd3daea5b7fcb5d05bae1.exe
    "C:\Users\Admin\AppData\Local\Temp\b7547b31f32bd3daea5b7fcb5d05bae1.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2936
    • C:\Users\Admin\AppData\Local\Temp\Unicorn-47665.exe
      C:\Users\Admin\AppData\Local\Temp\Unicorn-47665.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:3020
      • C:\Users\Admin\AppData\Local\Temp\Unicorn-40888.exe
        C:\Users\Admin\AppData\Local\Temp\Unicorn-40888.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2768
        • C:\Users\Admin\AppData\Local\Temp\Unicorn-46015.exe
          C:\Users\Admin\AppData\Local\Temp\Unicorn-46015.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2828
          • C:\Users\Admin\AppData\Local\Temp\Unicorn-58589.exe
            C:\Users\Admin\AppData\Local\Temp\Unicorn-58589.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2744
            • C:\Users\Admin\AppData\Local\Temp\Unicorn-26960.exe
              C:\Users\Admin\AppData\Local\Temp\Unicorn-26960.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:2800
              • C:\Users\Admin\AppData\Local\Temp\Unicorn-32279.exe
                C:\Users\Admin\AppData\Local\Temp\Unicorn-32279.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:1604
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-25585.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-25585.exe
                  8⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:2540
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-43348.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-43348.exe
                    9⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:2272
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-53374.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-53374.exe
                      10⤵
                        PID:2056
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 2272 -s 380
                        10⤵
                        • Program crash
                        PID:3824
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-49845.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-49845.exe
                      9⤵
                        PID:2612
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 2540 -s 380
                        9⤵
                        • Program crash
                        PID:3580
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-47795.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-47795.exe
                      8⤵
                      • Executes dropped EXE
                      • Suspicious use of SetWindowsHookEx
                      PID:972
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-11765.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-11765.exe
                        9⤵
                          PID:1336
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 972 -s 380
                          9⤵
                          • Program crash
                          PID:3904
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 1604 -s 376
                        8⤵
                        • Program crash
                        PID:2424
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-39652.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-39652.exe
                      7⤵
                      • Executes dropped EXE
                      • Suspicious use of SetWindowsHookEx
                      PID:2168
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-26820.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-26820.exe
                        8⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:1084
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 2168 -s 384
                        8⤵
                        • Program crash
                        PID:3096
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 2800 -s 376
                      7⤵
                      • Program crash
                      PID:1692
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-21925.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-21925.exe
                    6⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:1548
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-26462.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-26462.exe
                      7⤵
                      • Executes dropped EXE
                      • Suspicious use of SetWindowsHookEx
                      PID:2796
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-3083.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-3083.exe
                        8⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:2576
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-64531.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-64531.exe
                          9⤵
                            PID:2360
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 2576 -s 380
                            9⤵
                            • Program crash
                            PID:3812
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-57437.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-57437.exe
                          8⤵
                            PID:1788
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 2796 -s 380
                            8⤵
                            • Program crash
                            PID:3596
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-52455.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-52455.exe
                          7⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:2376
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-11765.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-11765.exe
                            8⤵
                              PID:1988
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 2376 -s 372
                              8⤵
                              • Program crash
                              PID:3656
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 1548 -s 380
                            7⤵
                            • Program crash
                            PID:2044
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 2744 -s 376
                          6⤵
                          • Program crash
                          PID:1732
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-15262.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-15262.exe
                        5⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:2844
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-21371.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-21371.exe
                          6⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:1868
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-58257.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-58257.exe
                            7⤵
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            PID:2476
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-38880.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-38880.exe
                              8⤵
                              • Executes dropped EXE
                              • Suspicious use of SetWindowsHookEx
                              PID:1508
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 1508 -s 380
                                9⤵
                                • Program crash
                                PID:4284
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 2476 -s 380
                              8⤵
                              • Program crash
                              PID:3736
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-59663.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-59663.exe
                            7⤵
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            PID:1580
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-53374.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-53374.exe
                              8⤵
                                PID:3036
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 1580 -s 380
                                8⤵
                                • Program crash
                                PID:3756
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 1868 -s 380
                              7⤵
                              • Program crash
                              PID:1948
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-50452.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-50452.exe
                            6⤵
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            PID:2704
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-31480.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-31480.exe
                              7⤵
                              • Executes dropped EXE
                              • Suspicious use of SetWindowsHookEx
                              PID:2468
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 2468 -s 380
                                8⤵
                                • Program crash
                                PID:4480
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 2704 -s 372
                              7⤵
                              • Program crash
                              PID:3260
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 2844 -s 376
                            6⤵
                            • Program crash
                            PID:360
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 2828 -s 368
                          5⤵
                          • Loads dropped DLL
                          • Program crash
                          PID:2028
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-34639.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-34639.exe
                        4⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Suspicious use of SetWindowsHookEx
                        PID:772
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-28304.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-28304.exe
                          5⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:480
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-52590.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-52590.exe
                            6⤵
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            PID:2288
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-46581.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-46581.exe
                              7⤵
                              • Executes dropped EXE
                              • Suspicious use of SetWindowsHookEx
                              PID:2132
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-34634.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-34634.exe
                                8⤵
                                  PID:2276
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -u -p 2132 -s 372
                                  8⤵
                                  • Program crash
                                  PID:3664
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 2288 -s 380
                                7⤵
                                • Program crash
                                PID:1500
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-38967.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-38967.exe
                              6⤵
                              • Executes dropped EXE
                              • Suspicious use of SetWindowsHookEx
                              PID:2432
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-47515.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-47515.exe
                                7⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                PID:2684
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-34810.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-34810.exe
                                  8⤵
                                    PID:3768
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -u -p 2684 -s 372
                                    8⤵
                                    • Program crash
                                    PID:4264
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -u -p 2432 -s 380
                                  7⤵
                                  • Program crash
                                  PID:3776
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 480 -s 376
                                6⤵
                                • Program crash
                                PID:1316
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-53337.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-53337.exe
                              5⤵
                              • Executes dropped EXE
                              • Suspicious use of SetWindowsHookEx
                              PID:1292
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-5356.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-5356.exe
                                6⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                PID:2428
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-6482.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-6482.exe
                                  7⤵
                                  • Executes dropped EXE
                                  PID:2180
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -u -p 2428 -s 372
                                  7⤵
                                  • Program crash
                                  PID:3268
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-8153.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-8153.exe
                                6⤵
                                • Executes dropped EXE
                                PID:580
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 1292 -s 380
                                6⤵
                                • Program crash
                                PID:3588
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 772 -s 376
                              5⤵
                              • Program crash
                              PID:2996
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 2768 -s 376
                            4⤵
                            • Loads dropped DLL
                            • Program crash
                            PID:2232
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-38401.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-38401.exe
                          3⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Suspicious use of SetWindowsHookEx
                          • Suspicious use of WriteProcessMemory
                          PID:2472
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-54505.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-54505.exe
                            4⤵
                            • Executes dropped EXE
                            PID:2808
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 2472 -s 376
                            4⤵
                            • Program crash
                            PID:1584
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 3020 -s 372
                          3⤵
                          • Loads dropped DLL
                          • Program crash
                          PID:2108
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-16938.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-16938.exe
                        2⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Suspicious use of SetWindowsHookEx
                        • Suspicious use of WriteProcessMemory
                        PID:2556
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-54183.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-54183.exe
                          3⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Suspicious use of SetWindowsHookEx
                          • Suspicious use of WriteProcessMemory
                          PID:2212
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-9196.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-9196.exe
                            4⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Suspicious use of SetWindowsHookEx
                            PID:2036
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-24220.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-24220.exe
                              5⤵
                              • Executes dropped EXE
                              • Suspicious use of SetWindowsHookEx
                              PID:592
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-62019.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-62019.exe
                                6⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                PID:1100
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-4588.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-4588.exe
                                  7⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetWindowsHookEx
                                  PID:2196
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-64282.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-64282.exe
                                    8⤵
                                      PID:2624
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -u -p 2196 -s 380
                                      8⤵
                                      • Program crash
                                      PID:3832
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-44417.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-44417.exe
                                    7⤵
                                    • Executes dropped EXE
                                    PID:2336
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -u -p 1100 -s 380
                                    7⤵
                                    • Program crash
                                    PID:3604
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-38007.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-38007.exe
                                  6⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetWindowsHookEx
                                  PID:2776
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-53374.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-53374.exe
                                    7⤵
                                    • Executes dropped EXE
                                    PID:2772
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -u -p 2776 -s 380
                                    7⤵
                                    • Program crash
                                    PID:3680
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -u -p 592 -s 368
                                  6⤵
                                  • Program crash
                                  PID:1740
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-17649.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-17649.exe
                                5⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                PID:384
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-14100.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-14100.exe
                                  6⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetWindowsHookEx
                                  PID:2548
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-26903.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-26903.exe
                                    7⤵
                                    • Executes dropped EXE
                                    PID:1432
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -u -p 2548 -s 380
                                    7⤵
                                    • Program crash
                                    PID:3620
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-37125.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-37125.exe
                                  6⤵
                                  • Executes dropped EXE
                                  PID:536
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -u -p 384 -s 372
                                  6⤵
                                  • Program crash
                                  PID:3296
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 2036 -s 376
                                5⤵
                                • Program crash
                                PID:2780
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-40918.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-40918.exe
                              4⤵
                              • Executes dropped EXE
                              • Suspicious use of SetWindowsHookEx
                              PID:1116
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-41407.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-41407.exe
                                5⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                PID:2324
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-50857.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-50857.exe
                                  6⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetWindowsHookEx
                                  PID:544
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-63659.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-63659.exe
                                    7⤵
                                    • Executes dropped EXE
                                    • Suspicious use of SetWindowsHookEx
                                    PID:2764
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -u -p 544 -s 380
                                    7⤵
                                    • Program crash
                                    PID:3628
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-7037.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-7037.exe
                                  6⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetWindowsHookEx
                                  PID:2136
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -u -p 2136 -s 380
                                    7⤵
                                    • Program crash
                                    PID:4224
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -u -p 2324 -s 380
                                  6⤵
                                  • Program crash
                                  PID:3612
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-2019.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-2019.exe
                                5⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                PID:1704
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-56991.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-56991.exe
                                  6⤵
                                  • Executes dropped EXE
                                  PID:2116
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -u -p 1704 -s 372
                                  6⤵
                                  • Program crash
                                  PID:3276
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 1116 -s 376
                                5⤵
                                • Program crash
                                PID:1568
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 2212 -s 376
                              4⤵
                              • Program crash
                              PID:1400
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-50784.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-50784.exe
                            3⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Suspicious use of SetWindowsHookEx
                            PID:1924
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-39212.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-39212.exe
                              4⤵
                              • Executes dropped EXE
                              • Suspicious use of SetWindowsHookEx
                              PID:2256
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-8734.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-8734.exe
                                5⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                PID:1808
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-21885.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-21885.exe
                                  6⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetWindowsHookEx
                                  PID:2164
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-52523.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-52523.exe
                                    7⤵
                                    • Executes dropped EXE
                                    PID:1560
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-34150.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-34150.exe
                                      8⤵
                                        PID:4696
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -u -p 2164 -s 380
                                      7⤵
                                      • Program crash
                                      PID:3224
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-33508.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-33508.exe
                                    6⤵
                                    • Executes dropped EXE
                                    PID:2320
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -u -p 1808 -s 380
                                    6⤵
                                    • Program crash
                                    PID:3728
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-14463.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-14463.exe
                                  5⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetWindowsHookEx
                                  PID:1752
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-23011.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-23011.exe
                                    6⤵
                                    • Executes dropped EXE
                                    • Suspicious use of SetWindowsHookEx
                                    PID:2784
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -u -p 1752 -s 380
                                    6⤵
                                    • Program crash
                                    PID:3284
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -u -p 2256 -s 376
                                  5⤵
                                  • Program crash
                                  PID:884
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-37685.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-37685.exe
                                4⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                PID:1284
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-46773.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-46773.exe
                                  5⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetWindowsHookEx
                                  PID:2000
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-12149.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-12149.exe
                                    6⤵
                                      PID:1668
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -u -p 2000 -s 380
                                      6⤵
                                      • Program crash
                                      PID:3916
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -u -p 1284 -s 380
                                    5⤵
                                    • Program crash
                                    PID:1940
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -u -p 1924 -s 372
                                  4⤵
                                  • Program crash
                                  PID:1956
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 2556 -s 368
                                3⤵
                                • Loads dropped DLL
                                • Program crash
                                PID:2112
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 2936 -s 372
                              2⤵
                              • Program crash
                              PID:2604

                          Network

                          MITRE ATT&CK Matrix

                          Replay Monitor

                          Loading Replay Monitor...

                          Downloads

                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-34810.exe

                            Filesize

                            184KB

                            MD5

                            d1561471f68895c30ac4e7008d64faae

                            SHA1

                            f67084a8fd28eca4c9d5d6258b9dfcc5c9fe0340

                            SHA256

                            c67144478d5fecef235a1e5e9895d1840157416eb7a8a7d4924d1619a6977e23

                            SHA512

                            6c7405b38d5fee6a37c3d41d6f291bea7aee6b4716b425cd35d33b669e1c790b391a59980943a2307f636f76b5b9566b866bd73232dfa74846b72fd6e8dbfefa

                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-39652.exe

                            Filesize

                            184KB

                            MD5

                            b20d6403eb9a180885612aeafcfa1208

                            SHA1

                            19b8c5a32924d6f8fc64b89fd71b5e28b5a893ea

                            SHA256

                            d4c3fdadd09049396949ae8c89d5d2a80a213d6baa31719a79cd469d0de3d06c

                            SHA512

                            903f2a10e15d5c87a0d3b5caf15d13487d34d868b3046fdc3b09fe57835d93efc458a8d4fd9529cf9f148823d213cb61b89524f7dbbc6c7a7a4716ba61e914e0

                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-40918.exe

                            Filesize

                            184KB

                            MD5

                            7b1375879c72296aae65ade83af7ab32

                            SHA1

                            f735f3a9c8ff0bd35c026c0ee57c25ff0a4b3126

                            SHA256

                            0dda93f9fbddacd7c017037d2ea9c6556d1f5f840f5de5ae2554c4bc02d21d6c

                            SHA512

                            451ba1d834b7059ec75385e039b7a4a41e8d1948dc5c4e5e374161efad17b0e6115baa803af0c7c9fb51af921fb08af5c1083a72efc10b54be71adc8801c5276

                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-54505.exe

                            Filesize

                            184KB

                            MD5

                            48038fc30bae6bf4e7400f1f7afef319

                            SHA1

                            3915979c907c01f68faa43e4a5dee120e80066b9

                            SHA256

                            6a2fd7e651111518239dfdaed5125e6881bee5a54efe3871bb18a4a7baad9d64

                            SHA512

                            1c28b8475a03f1dd9604fdb452197ca8c0a6f2ae2510947662145da88da61aa616c0f021b7a1f0f24b571c06c37373ed2eb25d0308c65f68ae69c0d2c24d97ae

                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-63659.exe

                            Filesize

                            184KB

                            MD5

                            b510f2eba9b2121d5d7eb5652a41839f

                            SHA1

                            dee7533c30ab288f0a4c9c40f413b523cde201e4

                            SHA256

                            616feb88a593592de3eb1079e2b2b5d93fb16a1bcde01d6118108874bc2a8cd2

                            SHA512

                            b6e4727d00374e4e0b763e41e08c3bd33eb20d926f209482ef8c3d5850a57c86fbf695973093c1eb8e1c39cd0f767cb66f295a82a5dad6a8159c4373e5431889

                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-6482.exe

                            Filesize

                            184KB

                            MD5

                            0e11112cc933b5b348becdac0d1b6c44

                            SHA1

                            264f7cf2e563196e335976d43c49e5d3cf45ebe8

                            SHA256

                            662359e281b603f095468494e831f856db285e8e5a6b6ecb5163b1c948dbe7fd

                            SHA512

                            4e4d7ec70a4cdc3f6dba54104ef007a593dcc3adb409d9574ac57b5cd00032dffd53aa405052e733c1017e0d9a19f12b7d3b5d85c8b4524f8d51bfc81cf8b1b1

                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-9196.exe

                            Filesize

                            184KB

                            MD5

                            e31d8df6f850f8af98f08b0f3a87a7eb

                            SHA1

                            0e381bbed3e78557f9cfe0975106f09a8759ab3d

                            SHA256

                            f93c4128a8e097ec197862381b02f2706679c6d9eb062c3ea2b492a745f6f013

                            SHA512

                            d680fea8a6e9aa8b7dc2614ed8a21643d7baeb2cebeead618969f3738fb082b0e411e8c6bfb781aafea6f91675be80e69e90dac24e7a7608355a2b4953752bec

                          • \Users\Admin\AppData\Local\Temp\Unicorn-16938.exe

                            Filesize

                            184KB

                            MD5

                            bc781668c54e91c00ccd5a59c0f59665

                            SHA1

                            3050e1360a6205ccf81e6d4a4a1b58334e55ddde

                            SHA256

                            e7df9b2c00c20b0747f7b90e4951e9ed16eade2ac19477fb8b2888827f8cc69a

                            SHA512

                            83a51efbe166b87787328453a3b4fb17c2809ff2a753fa2c0ca6987cd18c9bd772116cc017da7b83635e7809b750c7cfea203b19314c4f25ccfc4c3bd21be7f2

                          • \Users\Admin\AppData\Local\Temp\Unicorn-34639.exe

                            Filesize

                            184KB

                            MD5

                            0ebb8a90c0b7e74a1f9eca84b3a1e3ca

                            SHA1

                            a9a1343be8de42cd82db76b7cfb3e2431810981d

                            SHA256

                            6156892429d52962d7ba646cd3e3e795144230437ae4c00b7640e7d5de22566c

                            SHA512

                            61c159aa2c64eee570d563e956d54add3bd0d52428acabcca9531160e045ba5a3db9598aecef91efce64ca963b9d64bea3657addd7b7350dd392bbff7d8c0ffc

                          • \Users\Admin\AppData\Local\Temp\Unicorn-38401.exe

                            Filesize

                            184KB

                            MD5

                            81e389fedd50e8d5d4004d5e0faf5168

                            SHA1

                            499016be97bb3f431dfd41c822acdd1062c9abb0

                            SHA256

                            9a977004fd75495d3a45b7571032b9cb90c7f0a9e7450bd5f392f9de21004657

                            SHA512

                            c1ca40d3d4adb85c46338aed2490ef89a2f7c016443f67dfca4103f9dc4e093046ed62f7300ab216b824be5256d919cbdaf420f0dfeef5a53d25d1d862dd78eb

                          • \Users\Admin\AppData\Local\Temp\Unicorn-40888.exe

                            Filesize

                            184KB

                            MD5

                            f93ece2cc4b3448fa65beb0b8c94ed04

                            SHA1

                            84b396e0a9d145f012d1522f3e540e79a82feb39

                            SHA256

                            142a5489793db9211e31ddbec87eb61a4fbf4e36aec4cee1462705c170e6be54

                            SHA512

                            8849bb5d23603168665184f5267573a0c46ee5aea15eb2bab0bc2e5b9f239349f9c59f308ba2f1595991c70612b066a2ecaa72dd0b178ca334142c8f3ac8c72d

                          • \Users\Admin\AppData\Local\Temp\Unicorn-46015.exe

                            Filesize

                            184KB

                            MD5

                            29e0c54ff0f3a4628acbbf96caa447a4

                            SHA1

                            f7fd05e8544d64191a2280fdafea00639334fae8

                            SHA256

                            8b693ebeab1e47e8039c98cb462b3da1e381a7cf11b46173e446823e0ce6b88a

                            SHA512

                            1dffd4efce49b59630539313201ee47d97e89f03b0ad4c7a706cf3fe992c27ece50c8318d670cfc9681b98880bb9b33cfd82d404b83e44a5ee547a0f69814b40

                          • \Users\Admin\AppData\Local\Temp\Unicorn-47665.exe

                            Filesize

                            184KB

                            MD5

                            1a88993728115aa4e1359ed1ca0e1076

                            SHA1

                            3ba58850732326175eac707016def89f81500f90

                            SHA256

                            455f7bfc0e73213502ce898232772ff908717b4be9a0ad2c9a1556e4d970f5f0

                            SHA512

                            ee2e8b73f5d14e2735cfa703777aa400d105fd785739b61224d4f0666f804a61163bf0e9a4d57111ca66eefe7ef8a5b864540d9fa80eb9a6ae49ea41ff9a3730

                          • \Users\Admin\AppData\Local\Temp\Unicorn-50784.exe

                            Filesize

                            184KB

                            MD5

                            390b474c55bee93e6bff40200a267eb8

                            SHA1

                            f9c3f3790bbce9f043f2b3ec959407073132bf83

                            SHA256

                            96a69f9771a4f36389809bdfbad28c9bd1a3117ad098034e6e244e4acb9551b5

                            SHA512

                            f6e9775c6b6c3f0dfa8bb8876b9dfab94ced2a1945546246559ce5a31f7fac6dee77a1d66ed37d8ad7b6239888c9ad9f0be8e5b05e95b03afbb2a8a2c2a02f40

                          • \Users\Admin\AppData\Local\Temp\Unicorn-54183.exe

                            Filesize

                            184KB

                            MD5

                            5b6a683787cc8bbe4e84cf41916a29fb

                            SHA1

                            0b0e9fbd9f337b8e1d44277134e242079f4d46e0

                            SHA256

                            5cddf5a1ef569e021ad89d26b8ba277323cc78bd8e59be91d9833182beef6955

                            SHA512

                            c8db21f274e22e9b1d3ae3bae4a2cb789a3b3a4d198ccae326053c764516dcecff23ed8a6eee3b8378b273d91b8fc6ca19b8b34c0e4c26e9cb0c5ddb5e4468d9

                          • \Users\Admin\AppData\Local\Temp\Unicorn-58589.exe

                            Filesize

                            184KB

                            MD5

                            a2db645215eb72906b01ac1c67a2bedd

                            SHA1

                            652a9dbc78b4728dd5f69907cbc5abfd9b0fd22e

                            SHA256

                            3ae024ba4df4305e06f976f2a7ef084f760ade19abbc6f2d811e27e35bdbf033

                            SHA512

                            860986169f0129b6ac7b0b2c8735d59996c35389ffef7303c0331af44ef32eed0966262dba3ba493d856040f832f1897e59f4ed18b6dba30a46beca70a346304