Analysis

  • max time kernel
    33s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    29/03/2024, 09:50

General

  • Target

    1edd14e68bf76aba638f331685de0e60_JaffaCakes118.exe

  • Size

    188KB

  • MD5

    1edd14e68bf76aba638f331685de0e60

  • SHA1

    573e9a0e7abbb9bf2f637ffe57dbb066b117ec38

  • SHA256

    9c3efd3fdc6935ca7614d0ab8d351ab4b89bc0f4e3a3f7ac190937bfef27a091

  • SHA512

    a203bc8ba1791de560317898d344885772728c474f55befbc8fbbac732563697563146b0afb7b3bb97f9f49d0d547d14cc723328f72e9f58688a1883e908b423

  • SSDEEP

    3072:6iHao0dpJAxutjWGT8t+zZbLU06R9tsiwxoAe5H7aPdpFV:6i6oymxu8G4t+zIthp7aPdpF

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 64 IoCs
  • Loads dropped DLL 64 IoCs
  • Program crash 5 IoCs
  • Suspicious use of SetWindowsHookEx 60 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\1edd14e68bf76aba638f331685de0e60_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\1edd14e68bf76aba638f331685de0e60_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2940
    • C:\Users\Admin\AppData\Local\Temp\Unicorn-26212.exe
      C:\Users\Admin\AppData\Local\Temp\Unicorn-26212.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2976
      • C:\Users\Admin\AppData\Local\Temp\Unicorn-19243.exe
        C:\Users\Admin\AppData\Local\Temp\Unicorn-19243.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:1296
        • C:\Users\Admin\AppData\Local\Temp\Unicorn-60441.exe
          C:\Users\Admin\AppData\Local\Temp\Unicorn-60441.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2952
          • C:\Users\Admin\AppData\Local\Temp\Unicorn-28776.exe
            C:\Users\Admin\AppData\Local\Temp\Unicorn-28776.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2516
            • C:\Users\Admin\AppData\Local\Temp\Unicorn-46347.exe
              C:\Users\Admin\AppData\Local\Temp\Unicorn-46347.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              PID:800
              • C:\Users\Admin\AppData\Local\Temp\Unicorn-34261.exe
                C:\Users\Admin\AppData\Local\Temp\Unicorn-34261.exe
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetWindowsHookEx
                PID:452
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-19124.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-19124.exe
                  8⤵
                  • Executes dropped EXE
                  PID:2332
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-21895.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-21895.exe
                    9⤵
                    • Suspicious use of SetWindowsHookEx
                    PID:2216
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-55273.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-55273.exe
                      10⤵
                        PID:3024
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-35407.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-35407.exe
                      9⤵
                        PID:2664
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-35926.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-35926.exe
                          10⤵
                            PID:2168
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-15717.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-15717.exe
                              11⤵
                                PID:2960
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-30617.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-30617.exe
                          8⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:1804
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-35813.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-35813.exe
                            9⤵
                              PID:2900
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-52698.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-52698.exe
                                10⤵
                                  PID:2204
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-56627.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-56627.exe
                            7⤵
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            PID:2784
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-1282.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-1282.exe
                              8⤵
                              • Executes dropped EXE
                              • Suspicious use of SetWindowsHookEx
                              PID:2392
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 2392 -s 244
                                9⤵
                                • Program crash
                                PID:2304
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-15947.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-15947.exe
                              8⤵
                                PID:2488
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-6227.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-6227.exe
                            6⤵
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            PID:2160
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-41080.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-41080.exe
                              7⤵
                              • Executes dropped EXE
                              • Suspicious use of SetWindowsHookEx
                              PID:3060
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-62434.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-62434.exe
                                8⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                PID:2068
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-364.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-364.exe
                                  9⤵
                                    PID:1560
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-1536.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-1536.exe
                                7⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                PID:2656
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-55070.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-55070.exe
                            5⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Suspicious use of SetWindowsHookEx
                            PID:1808
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-64385.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-64385.exe
                              6⤵
                              • Executes dropped EXE
                              • Suspicious use of SetWindowsHookEx
                              PID:3056
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-57416.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-57416.exe
                                7⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                PID:2748
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-21978.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-21978.exe
                                  8⤵
                                  • Executes dropped EXE
                                  PID:904
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-18448.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-18448.exe
                                7⤵
                                • Executes dropped EXE
                                PID:2912
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-53887.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-53887.exe
                              6⤵
                              • Executes dropped EXE
                              • Suspicious use of SetWindowsHookEx
                              PID:2960
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-6025.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-6025.exe
                                7⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                PID:1388
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-62195.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-62195.exe
                          4⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Suspicious use of SetWindowsHookEx
                          • Suspicious use of WriteProcessMemory
                          PID:2880
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-59943.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-59943.exe
                            5⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Suspicious use of SetWindowsHookEx
                            PID:496
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-35413.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-35413.exe
                              6⤵
                              • Executes dropped EXE
                              • Suspicious use of SetWindowsHookEx
                              PID:1040
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-20276.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-20276.exe
                                7⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                PID:2700
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-8874.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-8874.exe
                                  8⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetWindowsHookEx
                                  PID:2172
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-10663.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-10663.exe
                                    9⤵
                                      PID:2584
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-63181.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-63181.exe
                                  7⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetWindowsHookEx
                                  PID:1208
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-20830.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-20830.exe
                                6⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                PID:2460
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-5833.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-5833.exe
                                  7⤵
                                  • Executes dropped EXE
                                  PID:1008
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-19631.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-19631.exe
                              5⤵
                              • Executes dropped EXE
                              PID:564
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-44660.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-44660.exe
                          3⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Suspicious use of SetWindowsHookEx
                          • Suspicious use of WriteProcessMemory
                          PID:2752
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-20608.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-20608.exe
                            4⤵
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            PID:1596
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 1596 -s 244
                              5⤵
                              • Loads dropped DLL
                              • Program crash
                              PID:1172
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-7213.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-7213.exe
                            4⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Suspicious use of SetWindowsHookEx
                            PID:2276
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-10716.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-10716.exe
                              5⤵
                              • Executes dropped EXE
                              • Suspicious use of SetWindowsHookEx
                              PID:892
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-815.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-815.exe
                                6⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                PID:1868
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-51573.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-51573.exe
                                  7⤵
                                    PID:2920
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-35407.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-35407.exe
                                  6⤵
                                    PID:2684
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-46487.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-46487.exe
                                  5⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetWindowsHookEx
                                  PID:1676
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-38698.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-38698.exe
                                    6⤵
                                    • Executes dropped EXE
                                    • Suspicious use of SetWindowsHookEx
                                    PID:2272
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-23177.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-23177.exe
                                      7⤵
                                        PID:2232
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-21899.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-21899.exe
                                          8⤵
                                            PID:1320
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-16606.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-16606.exe
                                        6⤵
                                          PID:2428
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-41930.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-41930.exe
                                            7⤵
                                              PID:2040
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-39340.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-39340.exe
                                    2⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • Suspicious use of SetWindowsHookEx
                                    • Suspicious use of WriteProcessMemory
                                    PID:2604
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-23493.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-23493.exe
                                      3⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Suspicious use of SetWindowsHookEx
                                      • Suspicious use of WriteProcessMemory
                                      PID:2732
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-36944.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-36944.exe
                                        4⤵
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        • Suspicious use of SetWindowsHookEx
                                        • Suspicious use of WriteProcessMemory
                                        PID:2532
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-30286.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-30286.exe
                                          5⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          • Suspicious use of SetWindowsHookEx
                                          PID:1544
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-31521.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-31521.exe
                                            6⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetWindowsHookEx
                                            PID:1996
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-20468.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-20468.exe
                                              7⤵
                                              • Executes dropped EXE
                                              • Suspicious use of SetWindowsHookEx
                                              PID:2716
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -u -p 2716 -s 244
                                                8⤵
                                                • Program crash
                                                PID:2896
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-16938.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-16938.exe
                                            6⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetWindowsHookEx
                                            PID:2708
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-26254.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-26254.exe
                                              7⤵
                                              • Executes dropped EXE
                                              • Suspicious use of SetWindowsHookEx
                                              PID:1012
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-48849.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-48849.exe
                                                8⤵
                                                  PID:2904
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-23907.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-23907.exe
                                            5⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetWindowsHookEx
                                            PID:2124
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-32720.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-32720.exe
                                              6⤵
                                              • Executes dropped EXE
                                              • Suspicious use of SetWindowsHookEx
                                              PID:2940
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-45906.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-45906.exe
                                                7⤵
                                                • Executes dropped EXE
                                                • Suspicious use of SetWindowsHookEx
                                                PID:2760
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 2760 -s 240
                                                  8⤵
                                                  • Program crash
                                                  PID:2512
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-19839.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-19839.exe
                                                7⤵
                                                  PID:2508
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-9512.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-9512.exe
                                                6⤵
                                                • Executes dropped EXE
                                                • Suspicious use of SetWindowsHookEx
                                                PID:2432
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-6336.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-6336.exe
                                            4⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            • Suspicious use of SetWindowsHookEx
                                            PID:2100
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-59917.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-59917.exe
                                              5⤵
                                              • Executes dropped EXE
                                              • Suspicious use of SetWindowsHookEx
                                              PID:816
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-11723.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-11723.exe
                                                6⤵
                                                • Executes dropped EXE
                                                • Suspicious use of SetWindowsHookEx
                                                PID:1468
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-29954.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-29954.exe
                                                  7⤵
                                                    PID:2964
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-31707.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-31707.exe
                                                  6⤵
                                                    PID:3048
                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 816 -s 240
                                                    6⤵
                                                    • Program crash
                                                    PID:2580
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-13814.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-13814.exe
                                                  5⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:1600
                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-38314.exe
                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-38314.exe
                                                    6⤵
                                                    • Executes dropped EXE
                                                    PID:2892
                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-54270.exe
                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-54270.exe
                                                      7⤵
                                                        PID:2672
                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-40576.exe
                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-40576.exe
                                                          8⤵
                                                            PID:2944
                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-11066.exe
                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-11066.exe
                                                              9⤵
                                                                PID:2860
                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-33414.exe
                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-33414.exe
                                                    3⤵
                                                    • Executes dropped EXE
                                                    • Loads dropped DLL
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:1776
                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-14826.exe
                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-14826.exe
                                                      4⤵
                                                      • Executes dropped EXE
                                                      • Loads dropped DLL
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:1176
                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-39497.exe
                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-39497.exe
                                                        5⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:2008
                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-24168.exe
                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-24168.exe
                                                          6⤵
                                                          • Executes dropped EXE
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:2484
                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-53882.exe
                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-53882.exe
                                                            7⤵
                                                            • Executes dropped EXE
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:2732
                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-9320.exe
                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-9320.exe
                                                          6⤵
                                                          • Executes dropped EXE
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:3016
                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-8386.exe
                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-8386.exe
                                                        5⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:2344
                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-37354.exe
                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-37354.exe
                                                          6⤵
                                                          • Executes dropped EXE
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:1692
                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-36492.exe
                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-36492.exe
                                                            7⤵
                                                              PID:2752
                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-35967.exe
                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-35967.exe
                                                        4⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:2012
                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-44588.exe
                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-44588.exe
                                                          5⤵
                                                          • Executes dropped EXE
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:2976
                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-29954.exe
                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-29954.exe
                                                            6⤵
                                                              PID:2516
                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-31707.exe
                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-31707.exe
                                                            5⤵
                                                              PID:3064

                                                    Network

                                                          MITRE ATT&CK Matrix

                                                          Replay Monitor

                                                          Loading Replay Monitor...

                                                          Downloads

                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-5833.exe

                                                            Filesize

                                                            188KB

                                                            MD5

                                                            f2a10e11cf8da0f3cc9d1edc16ce4fcf

                                                            SHA1

                                                            62ae5dc1d88cbfa08392efc46c989bc70effe4f8

                                                            SHA256

                                                            2e58a674f7475c6137de0e09fcc89ba6f502fe65f3082481bb2992d43dee863e

                                                            SHA512

                                                            7be735720c6852a34569e1ba470b3d214fdd2747ad9d55ef589a282039228b5b755a7d84795f03e1aa30552b6b5a4fed771f67520a9cda5f97c921e5b93f61c2

                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-6025.exe

                                                            Filesize

                                                            188KB

                                                            MD5

                                                            2dea2cacf4c52a420d2235c7eebbd8dd

                                                            SHA1

                                                            16ddfec1e02ac5324c2f6318743152e49a437f91

                                                            SHA256

                                                            49a8919a7b79e80d32616256ae17e30a2d63288abae0a7b923b4e44dfb23a467

                                                            SHA512

                                                            34ec75a53600f1d8d98fe8c7276b1947176e145be2327251e0344b2ab5fcf545f1e98bd6d5c420632bdb3a0d54f6016ddc1043c471bd2a33e3cd7f8c5cdd357c

                                                          • \Users\Admin\AppData\Local\Temp\Unicorn-14826.exe

                                                            Filesize

                                                            188KB

                                                            MD5

                                                            d0abac07db362de78a3c1a837bcae33f

                                                            SHA1

                                                            1c25aaf5e44b78096b7ae7a3180c6c9b939357d3

                                                            SHA256

                                                            b0aebaa69599d701f16e2e71e8294bc419d74b760fe3824d3b215d6c69917023

                                                            SHA512

                                                            9e4f64b3fcc80cfc31157ae150b62d400efac7bab30cb0a2d7ce8bfdaf22c3bde876211f7e320a44c255b81d3d3fb9cf1206b1f487381ca5910a3cf278bf3429

                                                          • \Users\Admin\AppData\Local\Temp\Unicorn-19243.exe

                                                            Filesize

                                                            188KB

                                                            MD5

                                                            8220b463a47e66ca5509f00f050145a6

                                                            SHA1

                                                            ec849f51183ffa0fbdb76d9542009bbdb9b27bad

                                                            SHA256

                                                            ebf5be8e0fdb6652538715616529ae1fda699c37e144f4ac91b8d404d3657eae

                                                            SHA512

                                                            b478aeef3b854331edcd50cb12b0e4214ed12a78c4a7cf482fb5124cb4452aa2cc324c497d435e07648a0cce29a1188242e3d01a3840c7294d0dcd9486c2daa3

                                                          • \Users\Admin\AppData\Local\Temp\Unicorn-20608.exe

                                                            Filesize

                                                            188KB

                                                            MD5

                                                            f1b38e77cf21a6b7c2d4456d6aee7a90

                                                            SHA1

                                                            20576ecbd14f2680cce5c91022f677a383983614

                                                            SHA256

                                                            e9d96c4235b09bb1d33f98e8a8eeba7266603b2b80f68d3abc192b7b81414d0c

                                                            SHA512

                                                            ca06fc0fe5ff386acbe20c3dd307502d2231c9e27bec18666b912caf1ab1f5da2dd97b88ec085fb8461d4546e1c841f0e07517236388e202157366ddeea2b7e7

                                                          • \Users\Admin\AppData\Local\Temp\Unicorn-23493.exe

                                                            Filesize

                                                            188KB

                                                            MD5

                                                            cb71f89738a200f95d73de215d6e7b38

                                                            SHA1

                                                            f0074af06b4933c505d5716b428ab55649cd5f4d

                                                            SHA256

                                                            ddcbaebe25256059a8e73a695b3c12f226bcfa56d2e9e6b8a6e5d8896e2650fe

                                                            SHA512

                                                            e0f3a010129249d36d6c21954975df2a0c5a784ca282416c9ea013fd50981ae7fae9e7f5e0a16f1816bd440c87b581daa706a99734d187c34dd6bcb7b70d4590

                                                          • \Users\Admin\AppData\Local\Temp\Unicorn-26212.exe

                                                            Filesize

                                                            188KB

                                                            MD5

                                                            40185c5d35b5f906713b7a9dd68f1452

                                                            SHA1

                                                            69b2f4fc1d30c679e85bb2584848720b1bcd19f9

                                                            SHA256

                                                            707d28f5700f86ee2df52a0437be3501f2dd2e4e40f90788f68098760110986b

                                                            SHA512

                                                            9e4a2d15cf6fc2730245b253fb55262ae49652f8d9ea8cd630a53490f5489926e5bed8ebe72d8992435966e62b76a1a13c12eb8e3edf01832b4b7724ed7b990d

                                                          • \Users\Admin\AppData\Local\Temp\Unicorn-28776.exe

                                                            Filesize

                                                            188KB

                                                            MD5

                                                            2b90afa9221abb62a8535b751fe15af6

                                                            SHA1

                                                            2c00f670390482902c77cc380a034d5e1bdde564

                                                            SHA256

                                                            f46960a57b085e4eb8103a25db3516cb19980b963b015b432b55d9b7726b138b

                                                            SHA512

                                                            c371ef3c2c6e94e14dacf1b9cb8145fdcfeae21208f34f62b7569ef4da0f630ef1a2e966cdd1a05874e9f67ecf2ccedcef26be802f198ce00bf860e08c774821

                                                          • \Users\Admin\AppData\Local\Temp\Unicorn-30286.exe

                                                            Filesize

                                                            188KB

                                                            MD5

                                                            2a8cccc0501f7b5704eeef5f9bc6a0d5

                                                            SHA1

                                                            ec52933fd81adfd5e1160112bc17fa5365548192

                                                            SHA256

                                                            1be9aed7f49ce26ce99ef54e1187a6f30d97ce7e9b707504df594b018f88816d

                                                            SHA512

                                                            027800f9b173a2eef72744fb7781e589953031e5972cd9ef998103ee1c66a3ce984fb4383c47d19da32baee77c1262b806eb10489c9ae0c8597905de216076f7

                                                          • \Users\Admin\AppData\Local\Temp\Unicorn-33414.exe

                                                            Filesize

                                                            188KB

                                                            MD5

                                                            877958f3ef239c9d42b797a4105f371c

                                                            SHA1

                                                            3f16d300ad19efb6f417487955b1ffa78b15a625

                                                            SHA256

                                                            6d897de6327aa85b9ad9935925b131aaabb46028f951257a82a37b524557a7a6

                                                            SHA512

                                                            c7ccf5e547a44169ad8952edb11bd1139bdf6aefe05549b71c6538b71ee427b0700a7040f9a704edb5a51ae282fe06f9744301aa15761b0d57ee7ff2f712d829

                                                          • \Users\Admin\AppData\Local\Temp\Unicorn-36944.exe

                                                            Filesize

                                                            188KB

                                                            MD5

                                                            1b4a6cb9131169ee30423eaa4c40d522

                                                            SHA1

                                                            7420a1e2e5d196937fae4e4d237452bc13d897cf

                                                            SHA256

                                                            730a4c1456d70a8f15d51fb4f643be8b1ed3e1a256031feb41280dbb283e11a5

                                                            SHA512

                                                            0ce2bb4b4bafd885bdde7f7b1048e1ac715aca04c579e28ce25d5c76820bf4d2f7a0e4b68352bbbc40806d7a9afbb1696a006654b5c55431567c502473e2bdc3

                                                          • \Users\Admin\AppData\Local\Temp\Unicorn-39340.exe

                                                            Filesize

                                                            188KB

                                                            MD5

                                                            a8bcc982cf2f6524206f96f8f88dc957

                                                            SHA1

                                                            1bf83a7d6926ad2d545df060cb9834ad53484ddb

                                                            SHA256

                                                            3c1648a89ea7729dbc5de152fc279703f47b6df9b66b409da397b350b71d3bfc

                                                            SHA512

                                                            84234f3b6fb9a1845ffe71ee18d8d9c3d802f9dcfa2d1111b6236a920aa7fd660c1b69679a59b9c4dbeb023925676d19c3f26213898a66fcd117321ff86d1187

                                                          • \Users\Admin\AppData\Local\Temp\Unicorn-44660.exe

                                                            Filesize

                                                            188KB

                                                            MD5

                                                            c918cbdceea5c7c1dadf7def91b3e8a4

                                                            SHA1

                                                            bc8d740305ad249e618921bf0e0522ddf31768e3

                                                            SHA256

                                                            9f32cef024ef3c566c5d28bdc54b4a5b490ef714a700075d2793de05789c9bfb

                                                            SHA512

                                                            a03427aacfa09204920c31eb28a13b50cecf02c041d9f9ef8256e69d55b6c585326ce995f2030f901a7f887243e743a6cb66655e4ead00a9af79521c023bd3b0

                                                          • \Users\Admin\AppData\Local\Temp\Unicorn-46347.exe

                                                            Filesize

                                                            188KB

                                                            MD5

                                                            93a9ca352b95b1f53e9ad71608d1b45e

                                                            SHA1

                                                            ba9d3297639c030ee5f8cdefc21f55bd2ad9a482

                                                            SHA256

                                                            80639b347812f885db3ab2bcb732297b347b8033ceca212f56f1fc283e2bf268

                                                            SHA512

                                                            20a859ad31f12ef6216f2d8f223996284c617f658f06998162568e1976f1c0dddb30211b17b624168ef6adc0bde1b6168039e2888bf5b40a89c62af8e49a9f89

                                                          • \Users\Admin\AppData\Local\Temp\Unicorn-55070.exe

                                                            Filesize

                                                            188KB

                                                            MD5

                                                            81e414f4492c2b5df6f981a67df2adad

                                                            SHA1

                                                            1c2d366fd281cc05d0f5427f0636b7d7a55a3aa2

                                                            SHA256

                                                            2bcec4989f451685775f54d676c636fc897b34dd3b6d073239bdd8691b04a3f9

                                                            SHA512

                                                            f2b9f481b59ea7e9fc9173e85a3f3c119d041e9c8e3f031452415ac6f613f18b37cee9f6723226ab671c191bd86f2003e082584cd5d3e1f2ffc17ee991e1fe2c

                                                          • \Users\Admin\AppData\Local\Temp\Unicorn-59943.exe

                                                            Filesize

                                                            188KB

                                                            MD5

                                                            54d5229e5bf89f277d2346b06118b277

                                                            SHA1

                                                            2ba319a9bf5a780ac59e5f01aa69886425995257

                                                            SHA256

                                                            f7fda77ad2cd65930393591e41e719a905f632b118121c7f1753aac29e460874

                                                            SHA512

                                                            787fb81dfc94ef030cca1ef85dd8f82ff1eff080f20012188661c34f0f4c2f25900696441322831ea388a40892462604ae7155fb87afe54adae47a19773a7f96

                                                          • \Users\Admin\AppData\Local\Temp\Unicorn-60441.exe

                                                            Filesize

                                                            188KB

                                                            MD5

                                                            dca93376e56cb9ba6eb4ca6a14bacabe

                                                            SHA1

                                                            828ce5ed7b3c2564c6b949d731bc48f6262a5350

                                                            SHA256

                                                            c7d3e025b5d99290a03847ce92dbd6f1ef221dd60d66e8f52cae2d04d86520d9

                                                            SHA512

                                                            733f82cad3944d9625c2a14ef54321d809518d1170b276891c917d712774015ca1a2f1c47bc82be9895633b4317ca8008979b6f97b23a7b19e8d9f1f8cbc1c47

                                                          • \Users\Admin\AppData\Local\Temp\Unicorn-62195.exe

                                                            Filesize

                                                            188KB

                                                            MD5

                                                            b4b7f933a9c635b24bc0f6fe0c83f70d

                                                            SHA1

                                                            de71111bd4b0b3f292f50c6eb9da2e117523babb

                                                            SHA256

                                                            f09a6ba36178d6ff4702603aaa09251c680fd81c14d555560b3d311ce2735070

                                                            SHA512

                                                            e7a2ce7beef1282145b16360a319e4eaa155a31182f6145c95f7eb5ff8e2bb322b6fd97a9f702a5ad828bd59288e4585ace5009db5b6f25d4c0cf884f8261bd3

                                                          • \Users\Admin\AppData\Local\Temp\Unicorn-6336.exe

                                                            Filesize

                                                            188KB

                                                            MD5

                                                            204d7ebb3c62e4c1830b223b60decf7d

                                                            SHA1

                                                            ef0c3c2639e12dacd4bc27c02c9ce70b0e001a8b

                                                            SHA256

                                                            825f3f10bbde34b254d7afe52969450a24d8f4e00d1fd0368a46ff18bea31413

                                                            SHA512

                                                            4037ba040b699352b2d6d0ca0f624df564b801f6bdec908a19c1f1c3c2fbc76351eeae1700e82a832e2afdac064e44081586125f7dba571e1176d82e7108385c

                                                          • \Users\Admin\AppData\Local\Temp\Unicorn-7213.exe

                                                            Filesize

                                                            188KB

                                                            MD5

                                                            00bf8102ab9fdfe3d9a60436633fd4b9

                                                            SHA1

                                                            3b67fe4e883ed933a4d38b23dafac2b13e45744c

                                                            SHA256

                                                            2732e5f911dcc6ba96b4541d8b5ed79dc29a023225f937005c80087b39bbe290

                                                            SHA512

                                                            71fcd5764e1e474e1a38b721d1cd97d9e576da7d9379a87b16ccb05cb32e617aa41f21cd4946aa06f505268cf1a1bfab1536dbb9b5d4bd08d399abc5a72749e3