Analysis

  • max time kernel
    54s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    10-03-2024 14:01

General

  • Target

    bec9ac3e1cc760f969c4d27d5026a2b7.exe

  • Size

    184KB

  • MD5

    bec9ac3e1cc760f969c4d27d5026a2b7

  • SHA1

    0ec5d22efb6709fb9684316cb35baa661893fc43

  • SHA256

    bfa90efa266e06ff1ad504d9496d78a4b9c4894b69a686d576ff5079d6d2b690

  • SHA512

    401ba35cbed51821b4e5948fc59caace1f1f5d73b4d0482d6488bc4505ada49c4d491f4d0f99a1d190ebec827e5a9d9669f2ac71b1edb549ae72256caf2b0a11

  • SSDEEP

    3072:I6R7oi3YkiU8FojThlQaTK/mhZq6sa/Irgprxi9NauAlcvpFE:I69o8z8F6hmaTKqwJlAlcvpF

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 64 IoCs
  • Loads dropped DLL 64 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bec9ac3e1cc760f969c4d27d5026a2b7.exe
    "C:\Users\Admin\AppData\Local\Temp\bec9ac3e1cc760f969c4d27d5026a2b7.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2884
    • C:\Users\Admin\AppData\Local\Temp\Unicorn-48429.exe
      C:\Users\Admin\AppData\Local\Temp\Unicorn-48429.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1708
      • C:\Users\Admin\AppData\Local\Temp\Unicorn-14817.exe
        C:\Users\Admin\AppData\Local\Temp\Unicorn-14817.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2552
        • C:\Users\Admin\AppData\Local\Temp\Unicorn-14599.exe
          C:\Users\Admin\AppData\Local\Temp\Unicorn-14599.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2636
          • C:\Users\Admin\AppData\Local\Temp\Unicorn-46561.exe
            C:\Users\Admin\AppData\Local\Temp\Unicorn-46561.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2904
            • C:\Users\Admin\AppData\Local\Temp\Unicorn-17418.exe
              C:\Users\Admin\AppData\Local\Temp\Unicorn-17418.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              PID:828
              • C:\Users\Admin\AppData\Local\Temp\Unicorn-61631.exe
                C:\Users\Admin\AppData\Local\Temp\Unicorn-61631.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:452
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-61797.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-61797.exe
                  8⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:2704
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-62010.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-62010.exe
                    9⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:576
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-17832.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-17832.exe
                  8⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:808
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-44464.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-44464.exe
                    9⤵
                      PID:3444
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-43047.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-43047.exe
                  7⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:2700
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-43043.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-43043.exe
                    8⤵
                    • Suspicious use of SetWindowsHookEx
                    PID:2372
              • C:\Users\Admin\AppData\Local\Temp\Unicorn-10053.exe
                C:\Users\Admin\AppData\Local\Temp\Unicorn-10053.exe
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:2140
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-17797.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-17797.exe
                  7⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:2100
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-4449.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-4449.exe
                    8⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:1880
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-48281.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-48281.exe
                      9⤵
                        PID:3512
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-6156.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-6156.exe
                    7⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:2400
              • C:\Users\Admin\AppData\Local\Temp\Unicorn-1636.exe
                C:\Users\Admin\AppData\Local\Temp\Unicorn-1636.exe
                5⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetWindowsHookEx
                PID:1816
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-22820.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-22820.exe
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:2424
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-21497.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-21497.exe
                    7⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:2104
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-3162.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-3162.exe
                      8⤵
                        PID:1676
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-61854.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-61854.exe
                      7⤵
                        PID:2120
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-26135.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-26135.exe
                      6⤵
                      • Executes dropped EXE
                      • Suspicious use of SetWindowsHookEx
                      PID:2624
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-28435.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-28435.exe
                        7⤵
                          PID:2172
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-34863.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-34863.exe
                    4⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of SetWindowsHookEx
                    • Suspicious use of WriteProcessMemory
                    PID:2672
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-33754.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-33754.exe
                      5⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Suspicious use of SetWindowsHookEx
                      PID:1416
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-26712.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-26712.exe
                        6⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:1604
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-5736.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-5736.exe
                          7⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:2544
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-50718.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-50718.exe
                            8⤵
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            PID:2228
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-58478.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-58478.exe
                              9⤵
                                PID:3544
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-10925.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-10925.exe
                            7⤵
                            • Executes dropped EXE
                            PID:3000
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-63660.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-63660.exe
                          6⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:2444
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-25062.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-25062.exe
                            7⤵
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            PID:292
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-15014.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-15014.exe
                        5⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:980
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-17989.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-17989.exe
                          6⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:2492
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-28954.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-28954.exe
                            7⤵
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            PID:824
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-5196.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-5196.exe
                          6⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:2412
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-3021.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-3021.exe
                            7⤵
                              PID:3264
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-64355.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-64355.exe
                      3⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Suspicious use of SetWindowsHookEx
                      • Suspicious use of WriteProcessMemory
                      PID:2348
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-18165.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-18165.exe
                        4⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Suspicious use of SetWindowsHookEx
                        • Suspicious use of WriteProcessMemory
                        PID:2800
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-54174.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-54174.exe
                          5⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Suspicious use of SetWindowsHookEx
                          PID:1292
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-55108.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-55108.exe
                            6⤵
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            PID:2524
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-47345.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-47345.exe
                              7⤵
                              • Executes dropped EXE
                              PID:2308
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-2399.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-2399.exe
                            6⤵
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            PID:2428
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-16183.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-16183.exe
                              7⤵
                                PID:2732
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-63831.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-63831.exe
                            5⤵
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            PID:2000
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-59789.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-59789.exe
                              6⤵
                              • Executes dropped EXE
                              • Suspicious use of SetWindowsHookEx
                              PID:2664
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-38056.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-38056.exe
                                7⤵
                                  PID:2580
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-14682.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-14682.exe
                                6⤵
                                  PID:2352
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-64049.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-64049.exe
                              4⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • Suspicious use of SetWindowsHookEx
                              PID:2068
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-18160.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-18160.exe
                                5⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                PID:2240
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-26733.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-26733.exe
                                  6⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetWindowsHookEx
                                  PID:2988
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-4122.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-4122.exe
                                    7⤵
                                      PID:2532
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-17614.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-17614.exe
                                    6⤵
                                      PID:2460
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-39923.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-39923.exe
                                    5⤵
                                    • Executes dropped EXE
                                    • Suspicious use of SetWindowsHookEx
                                    PID:2656
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-48279.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-48279.exe
                                      6⤵
                                        PID:2632
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-6773.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-6773.exe
                                          7⤵
                                            PID:3352
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-56405.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-56405.exe
                                  2⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Suspicious use of SetWindowsHookEx
                                  • Suspicious use of WriteProcessMemory
                                  PID:2656
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-30936.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-30936.exe
                                    3⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • Suspicious use of SetWindowsHookEx
                                    • Suspicious use of WriteProcessMemory
                                    PID:2448
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-22249.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-22249.exe
                                      4⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Suspicious use of SetWindowsHookEx
                                      PID:1636
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-22462.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-22462.exe
                                        5⤵
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        • Suspicious use of SetWindowsHookEx
                                        PID:2844
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-59384.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-59384.exe
                                          6⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetWindowsHookEx
                                          PID:3016
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-26733.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-26733.exe
                                            7⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetWindowsHookEx
                                            PID:320
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-59794.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-59794.exe
                                              8⤵
                                                PID:2708
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-18190.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-18190.exe
                                              7⤵
                                                PID:2760
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-52176.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-52176.exe
                                              6⤵
                                              • Executes dropped EXE
                                              • Suspicious use of SetWindowsHookEx
                                              PID:768
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-54008.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-54008.exe
                                                7⤵
                                                  PID:2020
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-55855.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-55855.exe
                                              5⤵
                                              • Executes dropped EXE
                                              • Suspicious use of SetWindowsHookEx
                                              PID:1616
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-31009.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-31009.exe
                                                6⤵
                                                • Executes dropped EXE
                                                • Suspicious use of SetWindowsHookEx
                                                PID:1512
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-49239.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-49239.exe
                                                  7⤵
                                                    PID:2344
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-8569.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-8569.exe
                                                  6⤵
                                                    PID:2288
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-23016.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-23016.exe
                                                4⤵
                                                • Executes dropped EXE
                                                • Loads dropped DLL
                                                • Suspicious use of SetWindowsHookEx
                                                PID:592
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-22244.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-22244.exe
                                                  5⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:2812
                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-46193.exe
                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-46193.exe
                                                    6⤵
                                                    • Executes dropped EXE
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:1932
                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-33972.exe
                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-33972.exe
                                                      7⤵
                                                        PID:2520
                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-6867.exe
                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-6867.exe
                                                    5⤵
                                                    • Executes dropped EXE
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:1692
                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-16183.exe
                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-16183.exe
                                                      6⤵
                                                        PID:2728
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-10551.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-10551.exe
                                                  3⤵
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:888
                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-38798.exe
                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-38798.exe
                                                    4⤵
                                                    • Executes dropped EXE
                                                    • Loads dropped DLL
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:324
                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-14651.exe
                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-14651.exe
                                                      5⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:1840
                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-50661.exe
                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-50661.exe
                                                        6⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:2152
                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-26022.exe
                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-26022.exe
                                                          7⤵
                                                          • Executes dropped EXE
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:1832
                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-48258.exe
                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-48258.exe
                                                        6⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:2160
                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-50832.exe
                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-50832.exe
                                                      5⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:1976
                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-4122.exe
                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-4122.exe
                                                        6⤵
                                                          PID:3024
                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-19290.exe
                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-19290.exe
                                                      4⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:1856
                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-5352.exe
                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-5352.exe
                                                        5⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:1600
                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-51403.exe
                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-51403.exe
                                                          6⤵
                                                            PID:2804
                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-16161.exe
                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-16161.exe
                                                          5⤵
                                                            PID:2208
                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-50497.exe
                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-50497.exe
                                                              6⤵
                                                                PID:3592

                                                    Network

                                                    MITRE ATT&CK Matrix

                                                    Replay Monitor

                                                    Loading Replay Monitor...

                                                    Downloads

                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-16161.exe

                                                      Filesize

                                                      184KB

                                                      MD5

                                                      5c76f2e0757d8b9a056f7797eec471dd

                                                      SHA1

                                                      9a7ce2a9262732842ee590c37d484f535eced6fb

                                                      SHA256

                                                      50a5529adcaa3c1c572b3900148df0a6b8071b06ed6529db6364885bdc298fea

                                                      SHA512

                                                      d9aa5efe10f9976b9379c6c84eea6c4f6c37bdcf1ab799e3813e9c1ced1a790a13dcc63789f3cb2d3e39014f4282f1582c42273d677b3d6ad9492d2f2c7c2ef9

                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-34863.exe

                                                      Filesize

                                                      184KB

                                                      MD5

                                                      94603455d04bad9aa8ed6231f5639b65

                                                      SHA1

                                                      37794631ff3e98d4e03e4ad9b0a6d3795e49bee0

                                                      SHA256

                                                      9f3444b2a1136b72954f8e99e10bd83742147b3df22247a7733abe3d067a5c21

                                                      SHA512

                                                      2b97f8856c4b812e2e23245ec11087ab431d4abc9a0fefdf15f24aadc45ea07ae50fce5413da6637cc81ab3af12b780e8ab770070a3873cf033da17c5f723aef

                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-39923.exe

                                                      Filesize

                                                      184KB

                                                      MD5

                                                      09dcf332bd892d67c720ab1743bd4aa1

                                                      SHA1

                                                      be5f88edbb555a8e004af9d8319b5c0d7bf66ffd

                                                      SHA256

                                                      ab2ddb11b5e09be91828a623de44bb78f851ae9c649cea74447074e1eb55ace0

                                                      SHA512

                                                      c52c4571ba19aa3fcc3fc4c8c5bd39c42c5997d73db36b80ad125526562c6bfec99c2f66b739e338990c85ddebdb14ea50a749087a3f7b6d66b714fd7ecbdb54

                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-5736.exe

                                                      Filesize

                                                      184KB

                                                      MD5

                                                      42448d6e801d20c14736171f51501d5b

                                                      SHA1

                                                      9cecd972567f2eb2632cdab49ee765dae8feba52

                                                      SHA256

                                                      b547a37112dbd6aa1e8b0218673a301db0d767c6a4740839574359e6b4c334b6

                                                      SHA512

                                                      058f5c4ce3ea0c8b48208faf8364841fbe313432417b27db5010995f2c34932fd6cfce9974df282ad97f191637f7ec7ecbccef18cde7f8e7a4b53996351f5ef7

                                                    • \Users\Admin\AppData\Local\Temp\Unicorn-10551.exe

                                                      Filesize

                                                      184KB

                                                      MD5

                                                      0b4afc6b8282f8232e730ac320170320

                                                      SHA1

                                                      d65da0006e277a464bfc885498abe87bca800b78

                                                      SHA256

                                                      6d063c646c02ef92e01aa54083456337cc15c66d18b2dab13d74d14758a6f203

                                                      SHA512

                                                      a4b44d99b7573d3b7f64ac145fa0941f6d6170bcbb0ca81291eabb6505c65822ac6c3bec1d3d6297c2da3cb4352c310cb099e66ea3b6efa00282c930480bfd39

                                                    • \Users\Admin\AppData\Local\Temp\Unicorn-14599.exe

                                                      Filesize

                                                      184KB

                                                      MD5

                                                      ec94aad61aa21d396e16ebebfeecdd79

                                                      SHA1

                                                      07fddf8fa3c5a9260d46e24283a20d2a49e4b2af

                                                      SHA256

                                                      67d0a5c1cd737991c5caa767ce8a9808cd252fb9e58e3a2eaf71c428e962e632

                                                      SHA512

                                                      9470b2c32b45b47bfc87819d0f727b1e69105072f2658f79753f301a8a32b77c45328205792a224fa1e442712819bf86ba52f00e8bd95a436fee13811a646569

                                                    • \Users\Admin\AppData\Local\Temp\Unicorn-14817.exe

                                                      Filesize

                                                      184KB

                                                      MD5

                                                      17e3576a5998b9f010af665b46d29e27

                                                      SHA1

                                                      debe629bcf4f282ab3488a8194adcce594279470

                                                      SHA256

                                                      b6f4b483f869bf319d5314c184d2ab8ce28ad01ddfe243afd8bb3439aaa10be2

                                                      SHA512

                                                      1169f99d6528a494121682fe2523defb586f8e894cb260f687886a110cd5364d1be19a07a94bfff3d79da93a2ded1ce3f003c1c3cb523caf28cd4823dee23bfb

                                                    • \Users\Admin\AppData\Local\Temp\Unicorn-1636.exe

                                                      Filesize

                                                      184KB

                                                      MD5

                                                      e3d69c16160dcc4cfb9d95a2d9690c94

                                                      SHA1

                                                      35a22c3636f096307aa61c7402bb842fd4a6d882

                                                      SHA256

                                                      c02885e3467f1564d220694857d12d8fb2fac87bacffb149d5b31ec439d5791c

                                                      SHA512

                                                      791ed0fce7dea95a87d9d47b83638008ae51c6575aca3a6d102940e226ea92a6dfdcffa89bac41433d5cc511c7537e947461b1419a917281aad9266c8013ce6e

                                                    • \Users\Admin\AppData\Local\Temp\Unicorn-17418.exe

                                                      Filesize

                                                      184KB

                                                      MD5

                                                      1fef9d8a0abcedee780397f1705753e7

                                                      SHA1

                                                      54a47514733c2e0dee25376d5c94f28dd128c4fd

                                                      SHA256

                                                      efb6521210e1a5379ab539a15707e1ac016107920d32c7efba52c208803b6f5a

                                                      SHA512

                                                      d207cc7e80398784b303c1772504fe402eb548c66b4463a727b536503f3a368de038a5c981bd245657ce399ec63991caee14376bd52763f33cf869f6b91323ef

                                                    • \Users\Admin\AppData\Local\Temp\Unicorn-18165.exe

                                                      Filesize

                                                      184KB

                                                      MD5

                                                      b515d2e8d9a31fa02e1cbdab8a2fecd4

                                                      SHA1

                                                      61aa2a0bd2ff16d51b347c8f9fb83820681b516e

                                                      SHA256

                                                      2eac345b80c8bbae3017757cfe8cc006f0951d4f4d48128e45f43e4c9e77e344

                                                      SHA512

                                                      ca766971ba9a4d6e0520b0b2a24869cd2b141ab71af5667b9d7bf29bbcad29323259be46498459f534dc115c5988386f40b9dde075b22e8f11f38cb85cf58638

                                                    • \Users\Admin\AppData\Local\Temp\Unicorn-22249.exe

                                                      Filesize

                                                      184KB

                                                      MD5

                                                      8ddd1d0b431f196573f6372432bb849f

                                                      SHA1

                                                      5026ac9af7a2fff9703b89199fdb7f768396a7ec

                                                      SHA256

                                                      f65f0a246b17d5f1bb42aa46f18b9da7b8fa9c092235b6ec0a54b162a72e6bfc

                                                      SHA512

                                                      d602a06fd284a221eeac99bab3aa786054f4077b86a8d0b34fa12cbc7771a8c9e6bcfb5cada40e2d5db31a41058d70a06b2b52ed094c7b4af01830e9c6b02200

                                                    • \Users\Admin\AppData\Local\Temp\Unicorn-22462.exe

                                                      Filesize

                                                      184KB

                                                      MD5

                                                      cb78ea8d1f1655936250880a144af528

                                                      SHA1

                                                      02a17ef9a771b074d90cbc793423b45937cf0257

                                                      SHA256

                                                      716bcc911ed409f88479da58fd9cd66309f3bb9aac336abbadad708b33ce72dd

                                                      SHA512

                                                      108d0ec37f2b1450d4870a8fb9b743af0f921c0b38805533e0138c7093f8ee72da56ab39e6c8ed0910d8fe22e531d68a61a047b1c2caec11c54d3876ac52cabd

                                                    • \Users\Admin\AppData\Local\Temp\Unicorn-30936.exe

                                                      Filesize

                                                      184KB

                                                      MD5

                                                      d07eb38e479eb4390e6344a8e6755284

                                                      SHA1

                                                      69345ced6ba7505a3e220f10e76ec20bf28d897d

                                                      SHA256

                                                      268cf3f5aabe6f92cb75f01d6ea5392aa8652f7253c8af2af5da08207b76267e

                                                      SHA512

                                                      107232e9658756ccb3903dbe78af80bdda42c9963705c5f82d5dc8a14a3b3f7200c1909fbc559496f41036c3b106c15336dee17c2ca7e81a76da1e27ca89f4db

                                                    • \Users\Admin\AppData\Local\Temp\Unicorn-33754.exe

                                                      Filesize

                                                      184KB

                                                      MD5

                                                      4eeb1918303cf78e9154eeef192d9d95

                                                      SHA1

                                                      1ed7c76e25e5bc55f84161681debe6296fef837c

                                                      SHA256

                                                      c6fcaa6cf690218b194575217b4bb0d26df186574a9db0b35a874427f7e7b8cc

                                                      SHA512

                                                      367d421e7776c0a57195932e5ea52fd73de61fece04e03cec13ecad15d15dfce768a5cacd6c7f53cebe5480745e377bd0042da03be33351a7e36864be0cb8c25

                                                    • \Users\Admin\AppData\Local\Temp\Unicorn-38798.exe

                                                      Filesize

                                                      184KB

                                                      MD5

                                                      635213bac4d385011448f77d8a6c92e7

                                                      SHA1

                                                      904fe9bf2ea22f8b5a48e8d7d70ce39de7266921

                                                      SHA256

                                                      90bd20ff10ec734db7748c6a91c1da115af410caf107ec98518489e06ae4e4fb

                                                      SHA512

                                                      8f6234b0eeb9ca9559f326a0b7697e3e3829c013446eb9b56da3b6bae572dfc2e374b49cce3cc2b563013114239cc55148f443fe0485d1ba365b37da87f34bdc

                                                    • \Users\Admin\AppData\Local\Temp\Unicorn-46561.exe

                                                      Filesize

                                                      184KB

                                                      MD5

                                                      7850c07b0018da3c23ce37f54bea09f9

                                                      SHA1

                                                      e8073f3731dd9e3f55f077019eb8ca85e5be2b0a

                                                      SHA256

                                                      5ad2b034810d40eb0a8889e4d8b2772883b28b5b7079a3eb0f26c1280d90007c

                                                      SHA512

                                                      a10693ab30812ae6cac5184056e845aa3e3328caea160d5444dbbdce2499a2995e70d84c5d55539ead7c18c4e452811a60f36d4f88d5fe0934c1d038d66532bd

                                                    • \Users\Admin\AppData\Local\Temp\Unicorn-48429.exe

                                                      Filesize

                                                      184KB

                                                      MD5

                                                      9a864829f5d40c203856f5a0576f4aeb

                                                      SHA1

                                                      7812073a5e15d2f04714ce89e2583851adce925d

                                                      SHA256

                                                      1e9aa3f74f1cf3d8676683700fdd6b0dfa6d26724300902b46262fa5013066a0

                                                      SHA512

                                                      4d4a76b632b736a2bd2868423736ed7a160db781c465ea40070342f5746f644da1c497d09a4360984522414e414b9ec514f4563e2121537e7b121056062926b9

                                                    • \Users\Admin\AppData\Local\Temp\Unicorn-54174.exe

                                                      Filesize

                                                      184KB

                                                      MD5

                                                      830aa2616114ad10e529dca5cd38d336

                                                      SHA1

                                                      24345c5486ddc561de92a28dd979cb08a10bcf39

                                                      SHA256

                                                      c323af7b14a0bbe42cf053b722998dada3209fbb4b8c9f0807a872d0c6432c29

                                                      SHA512

                                                      5b11bbe6f2a10f5b9a86d79c34d32c5a0d64d2ee16d6142332e96ed207d2e2c88be2fa6361c759c1b869034699d73580dc221cfc7ec7b41af6c2fdae45fa44fd

                                                    • \Users\Admin\AppData\Local\Temp\Unicorn-56405.exe

                                                      Filesize

                                                      184KB

                                                      MD5

                                                      4f48e98af9785713a05fe333535d9f9c

                                                      SHA1

                                                      f0d8140cad8fc90e7c93748b6cb57812cd12ff09

                                                      SHA256

                                                      a7edc9b204fd56850108063e6ac2a982973ba5667d5e4879f4d015469fee5ec7

                                                      SHA512

                                                      dced3f2e18da57cc388a3164bc342115aa9bd6151a85055dca3a434fa419db73d953c3ef84f2c239d45efc20f33967f1bf4f539ebdb877593bad6082ff5dd6d2

                                                    • \Users\Admin\AppData\Local\Temp\Unicorn-64049.exe

                                                      Filesize

                                                      184KB

                                                      MD5

                                                      5211a58d9d5ab5d1164a21ad35c1dfe6

                                                      SHA1

                                                      0dd9d8dd9f41d496cdcf26e01eaabc6039c23a18

                                                      SHA256

                                                      ee8d7dffeffd8c18a4153e00e6d0b55d4ec0f1a60f16c5be45bb868221c63deb

                                                      SHA512

                                                      f7fbcae77d2ec933af791704de915db000a242d3e8c3903627b6d2699ee1585d48985d92bc9fcaf339b7b46844dc2acb12c474928bd966339917e846e97b45f7

                                                    • \Users\Admin\AppData\Local\Temp\Unicorn-64355.exe

                                                      Filesize

                                                      184KB

                                                      MD5

                                                      b0d59393310aeba1833b3605517b7655

                                                      SHA1

                                                      6a4833c940ac5b8a96d3748f18e063537aea3d7c

                                                      SHA256

                                                      d7ba5eb21faf3f5a6116994864aba97638598461e9886d03134843346cf19f0b

                                                      SHA512

                                                      abcb51c678efe15acda0945a15d87409a335c7225fce557004aced02a026fcf4ff32497482da825a1d4fcbb16949d984f4fe04de4e4da585de64a1946d6fbc00