Analysis
-
max time kernel
150s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
14/03/2024, 05:00
Static task
static1
Behavioral task
behavioral1
Sample
c7c0b53ddc0e61ae2a0cf33e809f6b2f.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
c7c0b53ddc0e61ae2a0cf33e809f6b2f.exe
Resource
win10v2004-20240226-en
General
-
Target
c7c0b53ddc0e61ae2a0cf33e809f6b2f.exe
-
Size
184KB
-
MD5
c7c0b53ddc0e61ae2a0cf33e809f6b2f
-
SHA1
43f4ece7d7bd99df84711fe17a0ce27dedf9c588
-
SHA256
0ced3f3a207e5b9eb0668798734fe8e7874263de72135896d1ac5a78444a5609
-
SHA512
c24808d02810d164f2b98a5d3e8edc4abd2a7ff3d9637d32e52c5acb59641f0042160234ee0153aacf78c772dc6fd45442b7d70d86aa404cf80a14bff8ddea73
-
SSDEEP
3072:SaHeoYjkfYA01OjqdTsWl8Fb6s96DDWI0DExq9PpaNlPvpFF:Sa+oZ501ldoWl8sXG+NlPvpF
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 3020 Unicorn-43246.exe 1820 Unicorn-25923.exe 2536 Unicorn-53957.exe 2772 Unicorn-53760.exe 2528 Unicorn-29064.exe 2392 Unicorn-41870.exe 2448 Unicorn-34740.exe 2372 Unicorn-26319.exe 776 Unicorn-62774.exe 2980 Unicorn-38078.exe 2728 Unicorn-64206.exe 2684 Unicorn-61077.exe 564 Unicorn-13137.exe 320 Unicorn-2961.exe 1500 Unicorn-27658.exe 1452 Unicorn-7792.exe 756 Unicorn-7600.exe 1340 Unicorn-48633.exe 2096 Unicorn-51970.exe 1992 Unicorn-43968.exe 2752 Unicorn-8342.exe 2344 Unicorn-22152.exe 976 Unicorn-47128.exe 2124 Unicorn-10200.exe 900 Unicorn-8192.exe 3052 Unicorn-45504.exe 2192 Unicorn-65369.exe 1900 Unicorn-12639.exe 2888 Unicorn-57009.exe 1696 Unicorn-408.exe 2220 Unicorn-41057.exe 2224 Unicorn-21191.exe 2708 Unicorn-18390.exe 1640 Unicorn-54798.exe 2108 Unicorn-9126.exe 2064 Unicorn-57559.exe 2560 Unicorn-37501.exe 2420 Unicorn-16911.exe 1944 Unicorn-51695.exe 2432 Unicorn-57211.exe 1756 Unicorn-36044.exe 2820 Unicorn-40106.exe 2836 Unicorn-27684.exe 2580 Unicorn-42012.exe 2864 Unicorn-42012.exe 1888 Unicorn-63371.exe 2604 Unicorn-14170.exe 2456 Unicorn-50372.exe 1820 Unicorn-18171.exe 696 Unicorn-21509.exe 2740 Unicorn-37845.exe 2756 Unicorn-45281.exe 2912 Unicorn-7128.exe 2060 Unicorn-18634.exe 2208 Unicorn-26994.exe 848 Unicorn-38321.exe 2080 Unicorn-58187.exe 2012 Unicorn-60735.exe 2072 Unicorn-60735.exe 2428 Unicorn-13994.exe 2008 Unicorn-59064.exe 2132 Unicorn-59064.exe 1712 Unicorn-29956.exe 3024 Unicorn-40853.exe -
Loads dropped DLL 64 IoCs
pid Process 948 c7c0b53ddc0e61ae2a0cf33e809f6b2f.exe 948 c7c0b53ddc0e61ae2a0cf33e809f6b2f.exe 948 c7c0b53ddc0e61ae2a0cf33e809f6b2f.exe 3020 Unicorn-43246.exe 948 c7c0b53ddc0e61ae2a0cf33e809f6b2f.exe 3020 Unicorn-43246.exe 1820 Unicorn-25923.exe 1820 Unicorn-25923.exe 2536 Unicorn-53957.exe 2536 Unicorn-53957.exe 3020 Unicorn-43246.exe 3020 Unicorn-43246.exe 2772 Unicorn-53760.exe 1820 Unicorn-25923.exe 2772 Unicorn-53760.exe 1820 Unicorn-25923.exe 2392 Unicorn-41870.exe 2392 Unicorn-41870.exe 2528 Unicorn-29064.exe 2536 Unicorn-53957.exe 2536 Unicorn-53957.exe 2528 Unicorn-29064.exe 2448 Unicorn-34740.exe 2448 Unicorn-34740.exe 2980 Unicorn-38078.exe 2980 Unicorn-38078.exe 776 Unicorn-62774.exe 776 Unicorn-62774.exe 2528 Unicorn-29064.exe 2528 Unicorn-29064.exe 2372 Unicorn-26319.exe 2372 Unicorn-26319.exe 2772 Unicorn-53760.exe 2772 Unicorn-53760.exe 2392 Unicorn-41870.exe 2392 Unicorn-41870.exe 2728 Unicorn-64206.exe 2728 Unicorn-64206.exe 2684 Unicorn-61077.exe 2684 Unicorn-61077.exe 2448 Unicorn-34740.exe 2448 Unicorn-34740.exe 564 Unicorn-13137.exe 564 Unicorn-13137.exe 2980 Unicorn-38078.exe 2980 Unicorn-38078.exe 1452 Unicorn-7792.exe 1452 Unicorn-7792.exe 1500 Unicorn-27658.exe 1500 Unicorn-27658.exe 2372 Unicorn-26319.exe 2372 Unicorn-26319.exe 320 Unicorn-2961.exe 320 Unicorn-2961.exe 776 Unicorn-62774.exe 776 Unicorn-62774.exe 2096 Unicorn-51970.exe 2096 Unicorn-51970.exe 756 Unicorn-7600.exe 756 Unicorn-7600.exe 1340 Unicorn-48633.exe 1340 Unicorn-48633.exe 2728 Unicorn-64206.exe 2728 Unicorn-64206.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1632 2192 WerFault.exe 54 -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 948 c7c0b53ddc0e61ae2a0cf33e809f6b2f.exe 3020 Unicorn-43246.exe 1820 Unicorn-25923.exe 2536 Unicorn-53957.exe 2772 Unicorn-53760.exe 2528 Unicorn-29064.exe 2392 Unicorn-41870.exe 2448 Unicorn-34740.exe 2372 Unicorn-26319.exe 2728 Unicorn-64206.exe 2980 Unicorn-38078.exe 776 Unicorn-62774.exe 2684 Unicorn-61077.exe 564 Unicorn-13137.exe 1452 Unicorn-7792.exe 320 Unicorn-2961.exe 1340 Unicorn-48633.exe 756 Unicorn-7600.exe 1500 Unicorn-27658.exe 2096 Unicorn-51970.exe 1992 Unicorn-43968.exe 2752 Unicorn-8342.exe 2344 Unicorn-22152.exe 976 Unicorn-47128.exe 2124 Unicorn-10200.exe 900 Unicorn-8192.exe 3052 Unicorn-45504.exe 2224 Unicorn-21191.exe 2220 Unicorn-41057.exe 2192 Unicorn-65369.exe 1900 Unicorn-12639.exe 1696 Unicorn-408.exe 2888 Unicorn-57009.exe 1640 Unicorn-54798.exe 2108 Unicorn-9126.exe 2708 Unicorn-18390.exe 2064 Unicorn-57559.exe 2560 Unicorn-37501.exe 2420 Unicorn-16911.exe 1944 Unicorn-51695.exe 2432 Unicorn-57211.exe 1756 Unicorn-36044.exe 2820 Unicorn-40106.exe 2836 Unicorn-27684.exe 2864 Unicorn-42012.exe 1888 Unicorn-63371.exe 2580 Unicorn-42012.exe 2604 Unicorn-14170.exe 1820 Unicorn-18171.exe 2456 Unicorn-50372.exe 2208 Unicorn-26994.exe 2008 Unicorn-59064.exe 1712 Unicorn-29956.exe 2072 Unicorn-60735.exe 2012 Unicorn-60735.exe 2912 Unicorn-7128.exe 2428 Unicorn-13994.exe 2080 Unicorn-58187.exe 2740 Unicorn-37845.exe 696 Unicorn-21509.exe 2132 Unicorn-59064.exe 2756 Unicorn-45281.exe 848 Unicorn-38321.exe 2060 Unicorn-18634.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 948 wrote to memory of 3020 948 c7c0b53ddc0e61ae2a0cf33e809f6b2f.exe 28 PID 948 wrote to memory of 3020 948 c7c0b53ddc0e61ae2a0cf33e809f6b2f.exe 28 PID 948 wrote to memory of 3020 948 c7c0b53ddc0e61ae2a0cf33e809f6b2f.exe 28 PID 948 wrote to memory of 3020 948 c7c0b53ddc0e61ae2a0cf33e809f6b2f.exe 28 PID 948 wrote to memory of 1820 948 c7c0b53ddc0e61ae2a0cf33e809f6b2f.exe 29 PID 948 wrote to memory of 1820 948 c7c0b53ddc0e61ae2a0cf33e809f6b2f.exe 29 PID 948 wrote to memory of 1820 948 c7c0b53ddc0e61ae2a0cf33e809f6b2f.exe 29 PID 948 wrote to memory of 1820 948 c7c0b53ddc0e61ae2a0cf33e809f6b2f.exe 29 PID 3020 wrote to memory of 2536 3020 Unicorn-43246.exe 30 PID 3020 wrote to memory of 2536 3020 Unicorn-43246.exe 30 PID 3020 wrote to memory of 2536 3020 Unicorn-43246.exe 30 PID 3020 wrote to memory of 2536 3020 Unicorn-43246.exe 30 PID 1820 wrote to memory of 2772 1820 Unicorn-25923.exe 31 PID 1820 wrote to memory of 2772 1820 Unicorn-25923.exe 31 PID 1820 wrote to memory of 2772 1820 Unicorn-25923.exe 31 PID 1820 wrote to memory of 2772 1820 Unicorn-25923.exe 31 PID 2536 wrote to memory of 2528 2536 Unicorn-53957.exe 32 PID 2536 wrote to memory of 2528 2536 Unicorn-53957.exe 32 PID 2536 wrote to memory of 2528 2536 Unicorn-53957.exe 32 PID 2536 wrote to memory of 2528 2536 Unicorn-53957.exe 32 PID 3020 wrote to memory of 2392 3020 Unicorn-43246.exe 33 PID 3020 wrote to memory of 2392 3020 Unicorn-43246.exe 33 PID 3020 wrote to memory of 2392 3020 Unicorn-43246.exe 33 PID 3020 wrote to memory of 2392 3020 Unicorn-43246.exe 33 PID 2772 wrote to memory of 2372 2772 Unicorn-53760.exe 34 PID 2772 wrote to memory of 2372 2772 Unicorn-53760.exe 34 PID 2772 wrote to memory of 2372 2772 Unicorn-53760.exe 34 PID 2772 wrote to memory of 2372 2772 Unicorn-53760.exe 34 PID 1820 wrote to memory of 2448 1820 Unicorn-25923.exe 35 PID 1820 wrote to memory of 2448 1820 Unicorn-25923.exe 35 PID 1820 wrote to memory of 2448 1820 Unicorn-25923.exe 35 PID 1820 wrote to memory of 2448 1820 Unicorn-25923.exe 35 PID 2392 wrote to memory of 776 2392 Unicorn-41870.exe 36 PID 2392 wrote to memory of 776 2392 Unicorn-41870.exe 36 PID 2392 wrote to memory of 776 2392 Unicorn-41870.exe 36 PID 2392 wrote to memory of 776 2392 Unicorn-41870.exe 36 PID 2536 wrote to memory of 2728 2536 Unicorn-53957.exe 38 PID 2536 wrote to memory of 2728 2536 Unicorn-53957.exe 38 PID 2536 wrote to memory of 2728 2536 Unicorn-53957.exe 38 PID 2536 wrote to memory of 2728 2536 Unicorn-53957.exe 38 PID 2528 wrote to memory of 2980 2528 Unicorn-29064.exe 37 PID 2528 wrote to memory of 2980 2528 Unicorn-29064.exe 37 PID 2528 wrote to memory of 2980 2528 Unicorn-29064.exe 37 PID 2528 wrote to memory of 2980 2528 Unicorn-29064.exe 37 PID 2448 wrote to memory of 2684 2448 Unicorn-34740.exe 39 PID 2448 wrote to memory of 2684 2448 Unicorn-34740.exe 39 PID 2448 wrote to memory of 2684 2448 Unicorn-34740.exe 39 PID 2448 wrote to memory of 2684 2448 Unicorn-34740.exe 39 PID 2980 wrote to memory of 564 2980 Unicorn-38078.exe 40 PID 2980 wrote to memory of 564 2980 Unicorn-38078.exe 40 PID 2980 wrote to memory of 564 2980 Unicorn-38078.exe 40 PID 2980 wrote to memory of 564 2980 Unicorn-38078.exe 40 PID 776 wrote to memory of 320 776 Unicorn-62774.exe 41 PID 776 wrote to memory of 320 776 Unicorn-62774.exe 41 PID 776 wrote to memory of 320 776 Unicorn-62774.exe 41 PID 776 wrote to memory of 320 776 Unicorn-62774.exe 41 PID 2528 wrote to memory of 1452 2528 Unicorn-29064.exe 42 PID 2528 wrote to memory of 1452 2528 Unicorn-29064.exe 42 PID 2528 wrote to memory of 1452 2528 Unicorn-29064.exe 42 PID 2528 wrote to memory of 1452 2528 Unicorn-29064.exe 42 PID 2372 wrote to memory of 1500 2372 Unicorn-26319.exe 43 PID 2372 wrote to memory of 1500 2372 Unicorn-26319.exe 43 PID 2372 wrote to memory of 1500 2372 Unicorn-26319.exe 43 PID 2372 wrote to memory of 1500 2372 Unicorn-26319.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\c7c0b53ddc0e61ae2a0cf33e809f6b2f.exe"C:\Users\Admin\AppData\Local\Temp\c7c0b53ddc0e61ae2a0cf33e809f6b2f.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:948 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-43246.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43246.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-53957.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53957.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2536 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-29064.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29064.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38078.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38078.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13137.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13137.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:564 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22152.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22152.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-57559.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57559.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2064 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18634.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18634.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2060
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37501.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37501.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-29956.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29956.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1712
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47128.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47128.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:976 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16911.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16911.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34178.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34178.exe8⤵PID:1960
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7792.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7792.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1452 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10200.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10200.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51695.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51695.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58187.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58187.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2080
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60735.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60735.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2072
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57211.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57211.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62993.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62993.exe7⤵PID:1108
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64206.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64206.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51970.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51970.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-57009.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57009.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21509.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21509.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:696
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45281.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45281.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-52919.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52919.exe7⤵PID:2564
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21191.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21191.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37845.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37845.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-475.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-475.exe7⤵PID:524
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41870.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41870.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62774.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62774.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:776 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-2961.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2961.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:320 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-65369.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65369.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2192 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2192 -s 2407⤵
- Program crash
PID:1632
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14170.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14170.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2604
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12639.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12639.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27684.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27684.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2836
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7600.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7600.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:756 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-408.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-408.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50372.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50372.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-64524.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64524.exe7⤵PID:1736
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18171.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18171.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1820
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25923.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25923.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1820 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-53760.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53760.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2772 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26319.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26319.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27658.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27658.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1500 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-8192.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8192.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:900 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-36044.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36044.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1756 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40853.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40853.exe8⤵
- Executes dropped EXE
PID:3024
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40106.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40106.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2820
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45504.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45504.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3052 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-42012.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42012.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13994.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13994.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2428 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35978.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35978.exe8⤵PID:1984
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60735.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60735.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2012
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48633.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48633.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1340 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-41057.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41057.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-42012.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42012.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2580
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63371.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63371.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1888 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14040.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14040.exe6⤵PID:2088
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34740.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34740.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2448 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61077.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61077.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-43968.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43968.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1992 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18390.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18390.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26994.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26994.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2208
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38321.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38321.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:848 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5365.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5365.exe7⤵PID:2280
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54798.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54798.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1640 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-59064.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59064.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-41810.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41810.exe7⤵PID:2624
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8342.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8342.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2752 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9126.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9126.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-59064.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59064.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2008
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7128.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7128.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2912
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD597b09f3c8b9744f944abcc091e5fe8a4
SHA14e90dde23df5d51bfe8a5b8ab06a0f93780f58e3
SHA2560a8d59b4e672b754014de4330b9dc21a2c322a1a69e23bfd39e71c04c35a1776
SHA51256c4ca3432c3cbd9e3e83e3f206d19fd28a3478cf5970381cdb9501e54263c6dff658e660b541745b1155a376c750fc91457be3140ba3efe125f7e3bfbdfb3c5
-
Filesize
184KB
MD5460590ad08a8ef691ad08e9f6fdecfa0
SHA1e2c55c1f2a37b0379eee9ca94cde55aea82d247b
SHA25606c6a21a3dc55fbccfa9c66d85b1f879f60028c6d67cab541731e8a6cee31bfc
SHA5124c6675a5a0880faf4e4f480b61ace5f3b4e40f63448af22f6f6dfdbc17df50a16b2dc8a8640b092cabfaf731b7f7b62b77becdcf023d09b714d0224c697caaeb
-
Filesize
184KB
MD52f968fb511a547cb83d7ac01a16853cd
SHA131e87903d393b64a3404df7cd39eb8760efdddb8
SHA256b7b35490faf44bc6cdf45cdbb31894c8559fc42a74ce0f871123f865164ea85c
SHA5128ec1364401642f32b79b34bd4e9e35bc52de267e133c4edd0a7dde6f6d9fed747be5b7fab3232f8cad39d21137353080f14b2d97d165a0d09f6554d28aaf36cb
-
Filesize
184KB
MD52248701751fa117c8ef955bbb49b8caa
SHA1374db474e70db80385f299ee33dc6c0dd7456a71
SHA256daee8000825846ca727770e16c33af83f490346596c03e5fc54944be389a16fb
SHA51208d097d5938891337dbf38cbf7e885df7e4db7f8da05b8224438f561fd4f01ee5fa395b9c7031ba13349446a6b4401be8a397b05ed49829107d296696ea7d998
-
Filesize
184KB
MD551db6715788d7e1a96b35682c0af5793
SHA168b05fee0962fd3c57ad52d5a94b0a5c997410e0
SHA2569961a31ce5a9db22f686b5231e4058356d1bf36dcdac138c8f659ba83fa370c6
SHA512c8a86bbee6a9d0bdeae93ad250506e03bdbe164ee906f4381cab4c08b008a2191d2818e6a8e592d5e43e502ff0446891bfa90b03118b6eb023480c9681434cf1
-
Filesize
184KB
MD5b76fcdbac502724ebc5f09e78993f724
SHA1f1e55aa52b33f9cd3a23494ac6b018b013f1e02d
SHA2563b851ebffaf2d1c5637307f1c3e41480af08034c7fa4d48fbd2826d6a82f512a
SHA5125b7d3fafd1b58545e9ec2ded3d3235c1ae72886b97879def8622b2d76c7b2bc1a64e28a477ab9eef99781e6e09eb7fdca26ce2aedfe6aa64536fc270a01d872b
-
Filesize
184KB
MD5dccd81bc2a33407d050d376e52e97369
SHA1cd10c5f3c7867f4a5b684a9be00e7894c0114968
SHA256f2dd49c1280853dafd85bef0c26a1f2e4560d99077544ffef3ee0a4688d8aa80
SHA5126de0d9fefef58a8321ed95a6896eacd7a131723a811d4e20e777b3c9f1096b7072cb03ba2f341e9738ead48cfca6ee3c8c7a395b031f0400f5eb416cd5888f54
-
Filesize
184KB
MD5414b3e1e28c8620c450936790a3cf699
SHA1adf96cc5761a45293704cb3b98d2c9801defb809
SHA256837d1c11f79842f61db288b87d932cfc5c36f20e8efa69d94d3f3d9cad00e36f
SHA512831234046ea153b1b4a3137f387b0fced37bc9a2e8ea8d77eef4356ee9cfad8c6d46dd5fa510610365f312510ea2e42d493acf44e211b9646ef9dd5f13e9701d
-
Filesize
184KB
MD58f6def82668990895196fb8b70df9f8c
SHA1384b54f169c670ffeebeaecdf64bd7517c3ab030
SHA256b8dd20b9fcbde860958fc2d333d236cdcd34b1bc0c98ee65a25ddb525f5ebef3
SHA512f6df364a26c77285d9518ed9d88ec40db3cc2a3645ee721c4c7fd72a72e9dee156cc5b1953e185c59ec1694854647766c866ae237ff80eba75e95800477f970c
-
Filesize
184KB
MD544d608a9c90ceba5094a9389cfaf4b0d
SHA19ab93b76388601dd82ff66a844574f02b0fd59d7
SHA25692f00910db439537996e5748430534097f6afedfe8679f1310e0a18730368f5e
SHA51221c5d59cc651676fd14fac789ee1fddfe118ca6958bbb0949e4a77932db9ae2d9a5d054fd7e7cbbb1d7b1096ec91d746aa5007f2462a639390106dabf8e0469e
-
Filesize
184KB
MD5b14f73d82ce875678d26b4e065c603da
SHA1de7124b977464349117a5cc4878228f12ba3a585
SHA256b021c81dadf21de1a0dc83e9e1e83e8d62855530c0eba0ee3ec6ffdf6166638c
SHA512a9e79a0b01d6084c1e53ac504493f383a52c8a3a04753fb0514f572b57283df339e71f5065240bd773acb7493c79b96b41079bd55105494fcc867151bd2561c7
-
Filesize
184KB
MD5d7d102c1be4b5a87b506dcbc3d85a23a
SHA1efb624425a9990e01e68ee5eff176e97b8042d80
SHA2569271b11123bb90234270ed3082cf237d0fd2bc79b0b1b73d797f39a3939969d1
SHA512789b8a85a3fdab28e8cf1abe3cb1291df1be39529fe0442778729cae8df1e68c9d94c763ee726b432206a2009d72ba103f5161d463ca6ec106a8bb7213c3233e
-
Filesize
184KB
MD5323be466aa2a3c942d847185043840e0
SHA1b000bc5d48fff8ec5538cab8525e255465c96aaf
SHA256641ad8068d458be1d23da01d9922492afd6fbf422ba679a95d0672a577f871c8
SHA512683e48ecbecdb579a7c42e03d45622c293ed4ebb75107acfcc2e8bac3be00173c7879c6d0191fc83875bba16d06032704ae7eded69708bb75df5ce89c62e30f8
-
Filesize
184KB
MD5924a52d09031d0a08e3b2af8f371e568
SHA107dfec138681ef37a42780731d9a00596c6b17e2
SHA25696ff055f669d5d29799833d313752f178e712d8a8371795760e29a5a26281e1c
SHA512dbe9b65caea1f22f1d63160a28274a6e30d80e5e42446066fd586471b0d96af4bddf83fda4e8f93874b5a0472e0e5171b8c37ccfd0c6e0b7625faeaaa3aa009a
-
Filesize
184KB
MD5301bf6000b12bb8180852e2bb19d8dbb
SHA1d86d1c71ac18daaed15aeb214ee75f6000b2113a
SHA2566b793532d6d3ab69b706e04cd1a0a75778dbe4c5c115f0cc9aeeccb8d9ce0d14
SHA512b14912fe8761855a30cdaf74c4afa655b036384e9953cfec9e24cfc5c3c3d4ac977fda7d08ac5d8106f9a05205366deca2bf661b2b0f614b7d5210206bce5f57
-
Filesize
184KB
MD5052fa8be67741bd44c4897f3c206dc6e
SHA1c89e8f0e0a094df91536634a75b1d99f4f449666
SHA2564a073e7ec56305be2fdc0d3dfd50b00daf2d3a6ab72a20bb773e7d4534af9bc9
SHA512f38d0cf8829e98e3baf537f166246372454cb2c9477aeb9154e3c58f637db7f6562618d0e19c358603bae3262bbb7aabe6da4ba103fdfae3b6177e94a240cafa
-
Filesize
184KB
MD5cbace80d47b4cef48e6456efd734bdd5
SHA1b3c7854d1db8472f7d563122506c0cab742f4d42
SHA2563e758feea83029e6596fab679ba9ab158819cceb9f969129b29e6e553c2b8aa2
SHA5129f69fb82a3d1d1a7ad8779315aae1a412fc61948c7de3d79d276a3056c84d600e5c27db18af9318b9353bd8e92c6ed8b272086c0f39ff856b75d019c140073a8
-
Filesize
184KB
MD558a00564defa8a3505925accf180eb56
SHA16773eedbe0570456eb2919506c25da1789001a0f
SHA256ffa75822f2822f18ef421dbf5685ff815b6fb7848f5943dc77a4fecbfbce93b3
SHA512fef08cb7981440160ebd7fe6afa3c8635ce52bb9c3700ededce037d9e1074ce24cdd5b0cbc05e4c0106a63c5957c34019389645f9bd833b2d693d40d4be04460
-
Filesize
184KB
MD545db42465f12308d4ae1ecbbf5588976
SHA16aa04a1d98701cfe3ab0bbffa739aafd9d157dc4
SHA25617fccdab43e81c69388b680f934d573a82d225ef26011b1acd2db4ccaacb15c2
SHA512d57f409b2a15938b36fb3a4e2e3178e5a30c920a7d914dd9931f9deadf045392116f75164277c146e055b7fab2bd99277426ea025639622c6059ddba83f97d60