Analysis
-
max time kernel
54s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
10-03-2024 14:01
Static task
static1
Behavioral task
behavioral1
Sample
bec9ac3e1cc760f969c4d27d5026a2b7.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
bec9ac3e1cc760f969c4d27d5026a2b7.exe
Resource
win10v2004-20240226-en
General
-
Target
bec9ac3e1cc760f969c4d27d5026a2b7.exe
-
Size
184KB
-
MD5
bec9ac3e1cc760f969c4d27d5026a2b7
-
SHA1
0ec5d22efb6709fb9684316cb35baa661893fc43
-
SHA256
bfa90efa266e06ff1ad504d9496d78a4b9c4894b69a686d576ff5079d6d2b690
-
SHA512
401ba35cbed51821b4e5948fc59caace1f1f5d73b4d0482d6488bc4505ada49c4d491f4d0f99a1d190ebec827e5a9d9669f2ac71b1edb549ae72256caf2b0a11
-
SSDEEP
3072:I6R7oi3YkiU8FojThlQaTK/mhZq6sa/Irgprxi9NauAlcvpFE:I69o8z8F6hmaTKqwJlAlcvpF
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1708 Unicorn-48429.exe 2552 Unicorn-14817.exe 2656 Unicorn-56405.exe 2636 Unicorn-14599.exe 2348 Unicorn-64355.exe 2448 Unicorn-30936.exe 2904 Unicorn-46561.exe 2672 Unicorn-34863.exe 2800 Unicorn-18165.exe 1636 Unicorn-22249.exe 888 Unicorn-10551.exe 828 Unicorn-17418.exe 1816 Unicorn-1636.exe 1416 Unicorn-33754.exe 1292 Unicorn-54174.exe 2068 Unicorn-64049.exe 2844 Unicorn-22462.exe 324 Unicorn-38798.exe 592 Unicorn-23016.exe 452 Unicorn-61631.exe 2140 Unicorn-10053.exe 1604 Unicorn-26712.exe 980 Unicorn-15014.exe 1840 Unicorn-14651.exe 2424 Unicorn-22820.exe 1856 Unicorn-19290.exe 2524 Unicorn-55108.exe 2000 Unicorn-63831.exe 2240 Unicorn-18160.exe 2812 Unicorn-22244.exe 3016 Unicorn-59384.exe 1616 Unicorn-55855.exe 2704 Unicorn-61797.exe 2700 Unicorn-43047.exe 2100 Unicorn-17797.exe 2544 Unicorn-5736.exe 2492 Unicorn-17989.exe 2444 Unicorn-63660.exe 2152 Unicorn-50661.exe 1976 Unicorn-50832.exe 2104 Unicorn-21497.exe 2624 Unicorn-26135.exe 1600 Unicorn-5352.exe 1932 Unicorn-46193.exe 1692 Unicorn-6867.exe 2988 Unicorn-26733.exe 320 Unicorn-26733.exe 2664 Unicorn-59789.exe 2656 Unicorn-39923.exe 768 Unicorn-52176.exe 1512 Unicorn-31009.exe 2308 Unicorn-47345.exe 2428 Unicorn-2399.exe 576 Unicorn-62010.exe 808 Unicorn-17832.exe 824 Unicorn-28954.exe 2412 Unicorn-5196.exe 292 Unicorn-25062.exe 1880 Unicorn-4449.exe 2400 Unicorn-6156.exe 1832 Unicorn-26022.exe 2160 Unicorn-48258.exe 2228 Unicorn-50718.exe 3000 Unicorn-10925.exe -
Loads dropped DLL 64 IoCs
pid Process 2884 bec9ac3e1cc760f969c4d27d5026a2b7.exe 2884 bec9ac3e1cc760f969c4d27d5026a2b7.exe 1708 Unicorn-48429.exe 1708 Unicorn-48429.exe 2884 bec9ac3e1cc760f969c4d27d5026a2b7.exe 2884 bec9ac3e1cc760f969c4d27d5026a2b7.exe 2552 Unicorn-14817.exe 2552 Unicorn-14817.exe 1708 Unicorn-48429.exe 1708 Unicorn-48429.exe 2656 Unicorn-56405.exe 2656 Unicorn-56405.exe 2636 Unicorn-14599.exe 2636 Unicorn-14599.exe 2552 Unicorn-14817.exe 2552 Unicorn-14817.exe 2348 Unicorn-64355.exe 2348 Unicorn-64355.exe 2448 Unicorn-30936.exe 2448 Unicorn-30936.exe 2656 Unicorn-56405.exe 2656 Unicorn-56405.exe 2904 Unicorn-46561.exe 2904 Unicorn-46561.exe 2636 Unicorn-14599.exe 2636 Unicorn-14599.exe 2672 Unicorn-34863.exe 2672 Unicorn-34863.exe 2800 Unicorn-18165.exe 2800 Unicorn-18165.exe 2348 Unicorn-64355.exe 2348 Unicorn-64355.exe 1636 Unicorn-22249.exe 1636 Unicorn-22249.exe 888 Unicorn-10551.exe 888 Unicorn-10551.exe 2448 Unicorn-30936.exe 2448 Unicorn-30936.exe 828 Unicorn-17418.exe 828 Unicorn-17418.exe 2904 Unicorn-46561.exe 2904 Unicorn-46561.exe 1416 Unicorn-33754.exe 1416 Unicorn-33754.exe 2672 Unicorn-34863.exe 2672 Unicorn-34863.exe 324 Unicorn-38798.exe 324 Unicorn-38798.exe 1816 Unicorn-1636.exe 1816 Unicorn-1636.exe 888 Unicorn-10551.exe 888 Unicorn-10551.exe 1292 Unicorn-54174.exe 1292 Unicorn-54174.exe 2800 Unicorn-18165.exe 2800 Unicorn-18165.exe 2068 Unicorn-64049.exe 2068 Unicorn-64049.exe 592 Unicorn-23016.exe 592 Unicorn-23016.exe 2844 Unicorn-22462.exe 2844 Unicorn-22462.exe 1636 Unicorn-22249.exe 1636 Unicorn-22249.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2884 bec9ac3e1cc760f969c4d27d5026a2b7.exe 1708 Unicorn-48429.exe 2552 Unicorn-14817.exe 2656 Unicorn-56405.exe 2636 Unicorn-14599.exe 2348 Unicorn-64355.exe 2448 Unicorn-30936.exe 2904 Unicorn-46561.exe 2672 Unicorn-34863.exe 2800 Unicorn-18165.exe 1636 Unicorn-22249.exe 888 Unicorn-10551.exe 828 Unicorn-17418.exe 1816 Unicorn-1636.exe 1292 Unicorn-54174.exe 1416 Unicorn-33754.exe 324 Unicorn-38798.exe 2068 Unicorn-64049.exe 2844 Unicorn-22462.exe 592 Unicorn-23016.exe 452 Unicorn-61631.exe 2140 Unicorn-10053.exe 1604 Unicorn-26712.exe 980 Unicorn-15014.exe 1840 Unicorn-14651.exe 2424 Unicorn-22820.exe 1856 Unicorn-19290.exe 2240 Unicorn-18160.exe 2000 Unicorn-63831.exe 2812 Unicorn-22244.exe 2524 Unicorn-55108.exe 3016 Unicorn-59384.exe 1616 Unicorn-55855.exe 2704 Unicorn-61797.exe 2100 Unicorn-17797.exe 2492 Unicorn-17989.exe 2544 Unicorn-5736.exe 2444 Unicorn-63660.exe 2700 Unicorn-43047.exe 2152 Unicorn-50661.exe 1976 Unicorn-50832.exe 2104 Unicorn-21497.exe 2624 Unicorn-26135.exe 1600 Unicorn-5352.exe 1932 Unicorn-46193.exe 2988 Unicorn-26733.exe 1692 Unicorn-6867.exe 320 Unicorn-26733.exe 2656 Unicorn-39923.exe 2664 Unicorn-59789.exe 1512 Unicorn-31009.exe 768 Unicorn-52176.exe 2428 Unicorn-2399.exe 576 Unicorn-62010.exe 808 Unicorn-17832.exe 292 Unicorn-25062.exe 2412 Unicorn-5196.exe 1880 Unicorn-4449.exe 824 Unicorn-28954.exe 1832 Unicorn-26022.exe 2400 Unicorn-6156.exe 2372 Unicorn-43043.exe 2160 Unicorn-48258.exe 2228 Unicorn-50718.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2884 wrote to memory of 1708 2884 bec9ac3e1cc760f969c4d27d5026a2b7.exe 28 PID 2884 wrote to memory of 1708 2884 bec9ac3e1cc760f969c4d27d5026a2b7.exe 28 PID 2884 wrote to memory of 1708 2884 bec9ac3e1cc760f969c4d27d5026a2b7.exe 28 PID 2884 wrote to memory of 1708 2884 bec9ac3e1cc760f969c4d27d5026a2b7.exe 28 PID 1708 wrote to memory of 2552 1708 Unicorn-48429.exe 29 PID 1708 wrote to memory of 2552 1708 Unicorn-48429.exe 29 PID 1708 wrote to memory of 2552 1708 Unicorn-48429.exe 29 PID 1708 wrote to memory of 2552 1708 Unicorn-48429.exe 29 PID 2884 wrote to memory of 2656 2884 bec9ac3e1cc760f969c4d27d5026a2b7.exe 30 PID 2884 wrote to memory of 2656 2884 bec9ac3e1cc760f969c4d27d5026a2b7.exe 30 PID 2884 wrote to memory of 2656 2884 bec9ac3e1cc760f969c4d27d5026a2b7.exe 30 PID 2884 wrote to memory of 2656 2884 bec9ac3e1cc760f969c4d27d5026a2b7.exe 30 PID 2552 wrote to memory of 2636 2552 Unicorn-14817.exe 31 PID 2552 wrote to memory of 2636 2552 Unicorn-14817.exe 31 PID 2552 wrote to memory of 2636 2552 Unicorn-14817.exe 31 PID 2552 wrote to memory of 2636 2552 Unicorn-14817.exe 31 PID 1708 wrote to memory of 2348 1708 Unicorn-48429.exe 32 PID 1708 wrote to memory of 2348 1708 Unicorn-48429.exe 32 PID 1708 wrote to memory of 2348 1708 Unicorn-48429.exe 32 PID 1708 wrote to memory of 2348 1708 Unicorn-48429.exe 32 PID 2656 wrote to memory of 2448 2656 Unicorn-56405.exe 33 PID 2656 wrote to memory of 2448 2656 Unicorn-56405.exe 33 PID 2656 wrote to memory of 2448 2656 Unicorn-56405.exe 33 PID 2656 wrote to memory of 2448 2656 Unicorn-56405.exe 33 PID 2636 wrote to memory of 2904 2636 Unicorn-14599.exe 34 PID 2636 wrote to memory of 2904 2636 Unicorn-14599.exe 34 PID 2636 wrote to memory of 2904 2636 Unicorn-14599.exe 34 PID 2636 wrote to memory of 2904 2636 Unicorn-14599.exe 34 PID 2552 wrote to memory of 2672 2552 Unicorn-14817.exe 35 PID 2552 wrote to memory of 2672 2552 Unicorn-14817.exe 35 PID 2552 wrote to memory of 2672 2552 Unicorn-14817.exe 35 PID 2552 wrote to memory of 2672 2552 Unicorn-14817.exe 35 PID 2348 wrote to memory of 2800 2348 Unicorn-64355.exe 36 PID 2348 wrote to memory of 2800 2348 Unicorn-64355.exe 36 PID 2348 wrote to memory of 2800 2348 Unicorn-64355.exe 36 PID 2348 wrote to memory of 2800 2348 Unicorn-64355.exe 36 PID 2448 wrote to memory of 1636 2448 Unicorn-30936.exe 37 PID 2448 wrote to memory of 1636 2448 Unicorn-30936.exe 37 PID 2448 wrote to memory of 1636 2448 Unicorn-30936.exe 37 PID 2448 wrote to memory of 1636 2448 Unicorn-30936.exe 37 PID 2656 wrote to memory of 888 2656 Unicorn-56405.exe 38 PID 2656 wrote to memory of 888 2656 Unicorn-56405.exe 38 PID 2656 wrote to memory of 888 2656 Unicorn-56405.exe 38 PID 2656 wrote to memory of 888 2656 Unicorn-56405.exe 38 PID 2904 wrote to memory of 828 2904 Unicorn-46561.exe 39 PID 2904 wrote to memory of 828 2904 Unicorn-46561.exe 39 PID 2904 wrote to memory of 828 2904 Unicorn-46561.exe 39 PID 2904 wrote to memory of 828 2904 Unicorn-46561.exe 39 PID 2636 wrote to memory of 1816 2636 Unicorn-14599.exe 40 PID 2636 wrote to memory of 1816 2636 Unicorn-14599.exe 40 PID 2636 wrote to memory of 1816 2636 Unicorn-14599.exe 40 PID 2636 wrote to memory of 1816 2636 Unicorn-14599.exe 40 PID 2672 wrote to memory of 1416 2672 Unicorn-34863.exe 41 PID 2672 wrote to memory of 1416 2672 Unicorn-34863.exe 41 PID 2672 wrote to memory of 1416 2672 Unicorn-34863.exe 41 PID 2672 wrote to memory of 1416 2672 Unicorn-34863.exe 41 PID 2800 wrote to memory of 1292 2800 Unicorn-18165.exe 42 PID 2800 wrote to memory of 1292 2800 Unicorn-18165.exe 42 PID 2800 wrote to memory of 1292 2800 Unicorn-18165.exe 42 PID 2800 wrote to memory of 1292 2800 Unicorn-18165.exe 42 PID 2348 wrote to memory of 2068 2348 Unicorn-64355.exe 43 PID 2348 wrote to memory of 2068 2348 Unicorn-64355.exe 43 PID 2348 wrote to memory of 2068 2348 Unicorn-64355.exe 43 PID 2348 wrote to memory of 2068 2348 Unicorn-64355.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\bec9ac3e1cc760f969c4d27d5026a2b7.exe"C:\Users\Admin\AppData\Local\Temp\bec9ac3e1cc760f969c4d27d5026a2b7.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48429.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48429.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1708 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14817.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14817.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14599.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14599.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46561.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46561.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2904 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17418.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17418.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:828 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61631.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61631.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:452 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61797.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61797.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62010.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62010.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:576
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17832.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17832.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:808 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44464.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44464.exe9⤵PID:3444
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43047.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43047.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-43043.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43043.exe8⤵
- Suspicious use of SetWindowsHookEx
PID:2372
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10053.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10053.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2140 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17797.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17797.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-4449.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4449.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1880 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48281.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48281.exe9⤵PID:3512
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6156.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6156.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2400
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1636.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1636.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1816 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22820.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22820.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21497.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21497.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2104 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3162.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3162.exe8⤵PID:1676
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61854.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61854.exe7⤵PID:2120
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26135.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26135.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2624 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-28435.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28435.exe7⤵PID:2172
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34863.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34863.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-33754.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33754.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1416 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26712.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26712.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5736.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5736.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50718.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50718.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58478.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58478.exe9⤵PID:3544
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10925.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10925.exe7⤵
- Executes dropped EXE
PID:3000
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63660.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63660.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-25062.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25062.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:292
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15014.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15014.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:980 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17989.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17989.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-28954.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28954.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:824
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5196.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5196.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2412 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3021.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3021.exe7⤵PID:3264
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64355.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64355.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2348 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18165.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18165.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54174.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54174.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1292 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-55108.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55108.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47345.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47345.exe7⤵
- Executes dropped EXE
PID:2308
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2399.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2399.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2428 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16183.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16183.exe7⤵PID:2732
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63831.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63831.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-59789.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59789.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38056.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38056.exe7⤵PID:2580
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14682.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14682.exe6⤵PID:2352
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64049.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64049.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18160.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18160.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2240 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26733.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26733.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2988 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-4122.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4122.exe7⤵PID:2532
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17614.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17614.exe6⤵PID:2460
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39923.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39923.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48279.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48279.exe6⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6773.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6773.exe7⤵PID:3352
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56405.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56405.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30936.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30936.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22249.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22249.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22462.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22462.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-59384.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59384.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26733.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26733.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:320 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-59794.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59794.exe8⤵PID:2708
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18190.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18190.exe7⤵PID:2760
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52176.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52176.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:768 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54008.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54008.exe7⤵PID:2020
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55855.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55855.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1616 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-31009.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31009.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1512 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49239.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49239.exe7⤵PID:2344
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8569.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8569.exe6⤵PID:2288
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23016.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23016.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:592 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22244.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22244.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2812 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46193.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46193.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1932 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-33972.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33972.exe7⤵PID:2520
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6867.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6867.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16183.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16183.exe6⤵PID:2728
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10551.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10551.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:888 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38798.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38798.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:324 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14651.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14651.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1840 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50661.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50661.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26022.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26022.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1832
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48258.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48258.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2160
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50832.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50832.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-4122.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4122.exe6⤵PID:3024
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19290.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19290.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1856 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5352.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5352.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51403.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51403.exe6⤵PID:2804
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16161.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16161.exe5⤵PID:2208
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50497.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50497.exe6⤵PID:3592
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD55c76f2e0757d8b9a056f7797eec471dd
SHA19a7ce2a9262732842ee590c37d484f535eced6fb
SHA25650a5529adcaa3c1c572b3900148df0a6b8071b06ed6529db6364885bdc298fea
SHA512d9aa5efe10f9976b9379c6c84eea6c4f6c37bdcf1ab799e3813e9c1ced1a790a13dcc63789f3cb2d3e39014f4282f1582c42273d677b3d6ad9492d2f2c7c2ef9
-
Filesize
184KB
MD594603455d04bad9aa8ed6231f5639b65
SHA137794631ff3e98d4e03e4ad9b0a6d3795e49bee0
SHA2569f3444b2a1136b72954f8e99e10bd83742147b3df22247a7733abe3d067a5c21
SHA5122b97f8856c4b812e2e23245ec11087ab431d4abc9a0fefdf15f24aadc45ea07ae50fce5413da6637cc81ab3af12b780e8ab770070a3873cf033da17c5f723aef
-
Filesize
184KB
MD509dcf332bd892d67c720ab1743bd4aa1
SHA1be5f88edbb555a8e004af9d8319b5c0d7bf66ffd
SHA256ab2ddb11b5e09be91828a623de44bb78f851ae9c649cea74447074e1eb55ace0
SHA512c52c4571ba19aa3fcc3fc4c8c5bd39c42c5997d73db36b80ad125526562c6bfec99c2f66b739e338990c85ddebdb14ea50a749087a3f7b6d66b714fd7ecbdb54
-
Filesize
184KB
MD542448d6e801d20c14736171f51501d5b
SHA19cecd972567f2eb2632cdab49ee765dae8feba52
SHA256b547a37112dbd6aa1e8b0218673a301db0d767c6a4740839574359e6b4c334b6
SHA512058f5c4ce3ea0c8b48208faf8364841fbe313432417b27db5010995f2c34932fd6cfce9974df282ad97f191637f7ec7ecbccef18cde7f8e7a4b53996351f5ef7
-
Filesize
184KB
MD50b4afc6b8282f8232e730ac320170320
SHA1d65da0006e277a464bfc885498abe87bca800b78
SHA2566d063c646c02ef92e01aa54083456337cc15c66d18b2dab13d74d14758a6f203
SHA512a4b44d99b7573d3b7f64ac145fa0941f6d6170bcbb0ca81291eabb6505c65822ac6c3bec1d3d6297c2da3cb4352c310cb099e66ea3b6efa00282c930480bfd39
-
Filesize
184KB
MD5ec94aad61aa21d396e16ebebfeecdd79
SHA107fddf8fa3c5a9260d46e24283a20d2a49e4b2af
SHA25667d0a5c1cd737991c5caa767ce8a9808cd252fb9e58e3a2eaf71c428e962e632
SHA5129470b2c32b45b47bfc87819d0f727b1e69105072f2658f79753f301a8a32b77c45328205792a224fa1e442712819bf86ba52f00e8bd95a436fee13811a646569
-
Filesize
184KB
MD517e3576a5998b9f010af665b46d29e27
SHA1debe629bcf4f282ab3488a8194adcce594279470
SHA256b6f4b483f869bf319d5314c184d2ab8ce28ad01ddfe243afd8bb3439aaa10be2
SHA5121169f99d6528a494121682fe2523defb586f8e894cb260f687886a110cd5364d1be19a07a94bfff3d79da93a2ded1ce3f003c1c3cb523caf28cd4823dee23bfb
-
Filesize
184KB
MD5e3d69c16160dcc4cfb9d95a2d9690c94
SHA135a22c3636f096307aa61c7402bb842fd4a6d882
SHA256c02885e3467f1564d220694857d12d8fb2fac87bacffb149d5b31ec439d5791c
SHA512791ed0fce7dea95a87d9d47b83638008ae51c6575aca3a6d102940e226ea92a6dfdcffa89bac41433d5cc511c7537e947461b1419a917281aad9266c8013ce6e
-
Filesize
184KB
MD51fef9d8a0abcedee780397f1705753e7
SHA154a47514733c2e0dee25376d5c94f28dd128c4fd
SHA256efb6521210e1a5379ab539a15707e1ac016107920d32c7efba52c208803b6f5a
SHA512d207cc7e80398784b303c1772504fe402eb548c66b4463a727b536503f3a368de038a5c981bd245657ce399ec63991caee14376bd52763f33cf869f6b91323ef
-
Filesize
184KB
MD5b515d2e8d9a31fa02e1cbdab8a2fecd4
SHA161aa2a0bd2ff16d51b347c8f9fb83820681b516e
SHA2562eac345b80c8bbae3017757cfe8cc006f0951d4f4d48128e45f43e4c9e77e344
SHA512ca766971ba9a4d6e0520b0b2a24869cd2b141ab71af5667b9d7bf29bbcad29323259be46498459f534dc115c5988386f40b9dde075b22e8f11f38cb85cf58638
-
Filesize
184KB
MD58ddd1d0b431f196573f6372432bb849f
SHA15026ac9af7a2fff9703b89199fdb7f768396a7ec
SHA256f65f0a246b17d5f1bb42aa46f18b9da7b8fa9c092235b6ec0a54b162a72e6bfc
SHA512d602a06fd284a221eeac99bab3aa786054f4077b86a8d0b34fa12cbc7771a8c9e6bcfb5cada40e2d5db31a41058d70a06b2b52ed094c7b4af01830e9c6b02200
-
Filesize
184KB
MD5cb78ea8d1f1655936250880a144af528
SHA102a17ef9a771b074d90cbc793423b45937cf0257
SHA256716bcc911ed409f88479da58fd9cd66309f3bb9aac336abbadad708b33ce72dd
SHA512108d0ec37f2b1450d4870a8fb9b743af0f921c0b38805533e0138c7093f8ee72da56ab39e6c8ed0910d8fe22e531d68a61a047b1c2caec11c54d3876ac52cabd
-
Filesize
184KB
MD5d07eb38e479eb4390e6344a8e6755284
SHA169345ced6ba7505a3e220f10e76ec20bf28d897d
SHA256268cf3f5aabe6f92cb75f01d6ea5392aa8652f7253c8af2af5da08207b76267e
SHA512107232e9658756ccb3903dbe78af80bdda42c9963705c5f82d5dc8a14a3b3f7200c1909fbc559496f41036c3b106c15336dee17c2ca7e81a76da1e27ca89f4db
-
Filesize
184KB
MD54eeb1918303cf78e9154eeef192d9d95
SHA11ed7c76e25e5bc55f84161681debe6296fef837c
SHA256c6fcaa6cf690218b194575217b4bb0d26df186574a9db0b35a874427f7e7b8cc
SHA512367d421e7776c0a57195932e5ea52fd73de61fece04e03cec13ecad15d15dfce768a5cacd6c7f53cebe5480745e377bd0042da03be33351a7e36864be0cb8c25
-
Filesize
184KB
MD5635213bac4d385011448f77d8a6c92e7
SHA1904fe9bf2ea22f8b5a48e8d7d70ce39de7266921
SHA25690bd20ff10ec734db7748c6a91c1da115af410caf107ec98518489e06ae4e4fb
SHA5128f6234b0eeb9ca9559f326a0b7697e3e3829c013446eb9b56da3b6bae572dfc2e374b49cce3cc2b563013114239cc55148f443fe0485d1ba365b37da87f34bdc
-
Filesize
184KB
MD57850c07b0018da3c23ce37f54bea09f9
SHA1e8073f3731dd9e3f55f077019eb8ca85e5be2b0a
SHA2565ad2b034810d40eb0a8889e4d8b2772883b28b5b7079a3eb0f26c1280d90007c
SHA512a10693ab30812ae6cac5184056e845aa3e3328caea160d5444dbbdce2499a2995e70d84c5d55539ead7c18c4e452811a60f36d4f88d5fe0934c1d038d66532bd
-
Filesize
184KB
MD59a864829f5d40c203856f5a0576f4aeb
SHA17812073a5e15d2f04714ce89e2583851adce925d
SHA2561e9aa3f74f1cf3d8676683700fdd6b0dfa6d26724300902b46262fa5013066a0
SHA5124d4a76b632b736a2bd2868423736ed7a160db781c465ea40070342f5746f644da1c497d09a4360984522414e414b9ec514f4563e2121537e7b121056062926b9
-
Filesize
184KB
MD5830aa2616114ad10e529dca5cd38d336
SHA124345c5486ddc561de92a28dd979cb08a10bcf39
SHA256c323af7b14a0bbe42cf053b722998dada3209fbb4b8c9f0807a872d0c6432c29
SHA5125b11bbe6f2a10f5b9a86d79c34d32c5a0d64d2ee16d6142332e96ed207d2e2c88be2fa6361c759c1b869034699d73580dc221cfc7ec7b41af6c2fdae45fa44fd
-
Filesize
184KB
MD54f48e98af9785713a05fe333535d9f9c
SHA1f0d8140cad8fc90e7c93748b6cb57812cd12ff09
SHA256a7edc9b204fd56850108063e6ac2a982973ba5667d5e4879f4d015469fee5ec7
SHA512dced3f2e18da57cc388a3164bc342115aa9bd6151a85055dca3a434fa419db73d953c3ef84f2c239d45efc20f33967f1bf4f539ebdb877593bad6082ff5dd6d2
-
Filesize
184KB
MD55211a58d9d5ab5d1164a21ad35c1dfe6
SHA10dd9d8dd9f41d496cdcf26e01eaabc6039c23a18
SHA256ee8d7dffeffd8c18a4153e00e6d0b55d4ec0f1a60f16c5be45bb868221c63deb
SHA512f7fbcae77d2ec933af791704de915db000a242d3e8c3903627b6d2699ee1585d48985d92bc9fcaf339b7b46844dc2acb12c474928bd966339917e846e97b45f7
-
Filesize
184KB
MD5b0d59393310aeba1833b3605517b7655
SHA16a4833c940ac5b8a96d3748f18e063537aea3d7c
SHA256d7ba5eb21faf3f5a6116994864aba97638598461e9886d03134843346cf19f0b
SHA512abcb51c678efe15acda0945a15d87409a335c7225fce557004aced02a026fcf4ff32497482da825a1d4fcbb16949d984f4fe04de4e4da585de64a1946d6fbc00