Analysis
-
max time kernel
33s -
max time network
118s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/03/2024, 09:50
Static task
static1
Behavioral task
behavioral1
Sample
1edd14e68bf76aba638f331685de0e60_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
1edd14e68bf76aba638f331685de0e60_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
1edd14e68bf76aba638f331685de0e60_JaffaCakes118.exe
-
Size
188KB
-
MD5
1edd14e68bf76aba638f331685de0e60
-
SHA1
573e9a0e7abbb9bf2f637ffe57dbb066b117ec38
-
SHA256
9c3efd3fdc6935ca7614d0ab8d351ab4b89bc0f4e3a3f7ac190937bfef27a091
-
SHA512
a203bc8ba1791de560317898d344885772728c474f55befbc8fbbac732563697563146b0afb7b3bb97f9f49d0d547d14cc723328f72e9f58688a1883e908b423
-
SSDEEP
3072:6iHao0dpJAxutjWGT8t+zZbLU06R9tsiwxoAe5H7aPdpFV:6i6oymxu8G4t+zIthp7aPdpF
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2976 Unicorn-26212.exe 1296 Unicorn-19243.exe 2604 Unicorn-39340.exe 2952 Unicorn-60441.exe 2752 Unicorn-44660.exe 2732 Unicorn-23493.exe 2516 Unicorn-28776.exe 2880 Unicorn-62195.exe 1596 Unicorn-20608.exe 2532 Unicorn-36944.exe 1776 Unicorn-33414.exe 800 Unicorn-46347.exe 1808 Unicorn-55070.exe 1544 Unicorn-30286.exe 2100 Unicorn-6336.exe 496 Unicorn-59943.exe 1176 Unicorn-14826.exe 2276 Unicorn-7213.exe 452 Unicorn-34261.exe 2160 Unicorn-6227.exe 3056 Unicorn-64385.exe 1996 Unicorn-31521.exe 2124 Unicorn-23907.exe 1040 Unicorn-35413.exe 564 Unicorn-19631.exe 2008 Unicorn-39497.exe 2012 Unicorn-35967.exe 816 Unicorn-59917.exe 892 Unicorn-10716.exe 2332 Unicorn-19124.exe 2784 Unicorn-56627.exe 3060 Unicorn-41080.exe 2748 Unicorn-57416.exe 2960 Unicorn-53887.exe 2716 Unicorn-20468.exe 2940 Unicorn-32720.exe 2708 Unicorn-16938.exe 2700 Unicorn-20276.exe 2460 Unicorn-20830.exe 2484 Unicorn-24168.exe 2344 Unicorn-8386.exe 2976 Unicorn-44588.exe 1600 Unicorn-13814.exe 1468 Unicorn-11723.exe 1868 Unicorn-815.exe 1676 Unicorn-46487.exe 1804 Unicorn-30617.exe 2392 Unicorn-1282.exe 2172 Unicorn-8874.exe 1208 Unicorn-63181.exe 2068 Unicorn-62434.exe 2656 Unicorn-1536.exe 2760 Unicorn-45906.exe 2432 Unicorn-9512.exe 2732 Unicorn-53882.exe 3016 Unicorn-9320.exe 1692 Unicorn-37354.exe 1388 Unicorn-6025.exe 2272 Unicorn-38698.exe 1012 Unicorn-26254.exe 1008 Unicorn-5833.exe 904 Unicorn-21978.exe 2892 Unicorn-38314.exe 2912 Unicorn-18448.exe -
Loads dropped DLL 64 IoCs
pid Process 2940 1edd14e68bf76aba638f331685de0e60_JaffaCakes118.exe 2940 1edd14e68bf76aba638f331685de0e60_JaffaCakes118.exe 2976 Unicorn-26212.exe 2976 Unicorn-26212.exe 2940 1edd14e68bf76aba638f331685de0e60_JaffaCakes118.exe 2940 1edd14e68bf76aba638f331685de0e60_JaffaCakes118.exe 1296 Unicorn-19243.exe 1296 Unicorn-19243.exe 2976 Unicorn-26212.exe 2976 Unicorn-26212.exe 2604 Unicorn-39340.exe 2604 Unicorn-39340.exe 2952 Unicorn-60441.exe 2952 Unicorn-60441.exe 1296 Unicorn-19243.exe 1296 Unicorn-19243.exe 2752 Unicorn-44660.exe 2752 Unicorn-44660.exe 2732 Unicorn-23493.exe 2732 Unicorn-23493.exe 2604 Unicorn-39340.exe 2604 Unicorn-39340.exe 2516 Unicorn-28776.exe 2516 Unicorn-28776.exe 2952 Unicorn-60441.exe 2952 Unicorn-60441.exe 2532 Unicorn-36944.exe 2532 Unicorn-36944.exe 2732 Unicorn-23493.exe 2732 Unicorn-23493.exe 2880 Unicorn-62195.exe 2880 Unicorn-62195.exe 1776 Unicorn-33414.exe 1776 Unicorn-33414.exe 2752 Unicorn-44660.exe 2752 Unicorn-44660.exe 1172 WerFault.exe 1172 WerFault.exe 1172 WerFault.exe 1172 WerFault.exe 1172 WerFault.exe 800 Unicorn-46347.exe 800 Unicorn-46347.exe 2516 Unicorn-28776.exe 2516 Unicorn-28776.exe 1808 Unicorn-55070.exe 1808 Unicorn-55070.exe 1544 Unicorn-30286.exe 1544 Unicorn-30286.exe 2532 Unicorn-36944.exe 2532 Unicorn-36944.exe 496 Unicorn-59943.exe 496 Unicorn-59943.exe 2880 Unicorn-62195.exe 2880 Unicorn-62195.exe 1176 Unicorn-14826.exe 1176 Unicorn-14826.exe 1776 Unicorn-33414.exe 1776 Unicorn-33414.exe 2100 Unicorn-6336.exe 2100 Unicorn-6336.exe 2276 Unicorn-7213.exe 2276 Unicorn-7213.exe 452 Unicorn-34261.exe -
Program crash 5 IoCs
pid pid_target Process procid_target 1172 1596 WerFault.exe 36 2896 2716 WerFault.exe 63 2580 816 WerFault.exe 56 2304 2392 WerFault.exe 77 2512 2760 WerFault.exe 82 -
Suspicious use of SetWindowsHookEx 60 IoCs
pid Process 2940 1edd14e68bf76aba638f331685de0e60_JaffaCakes118.exe 2976 Unicorn-26212.exe 1296 Unicorn-19243.exe 2604 Unicorn-39340.exe 2952 Unicorn-60441.exe 2752 Unicorn-44660.exe 2732 Unicorn-23493.exe 2516 Unicorn-28776.exe 2880 Unicorn-62195.exe 2532 Unicorn-36944.exe 1596 Unicorn-20608.exe 1776 Unicorn-33414.exe 800 Unicorn-46347.exe 1808 Unicorn-55070.exe 1544 Unicorn-30286.exe 496 Unicorn-59943.exe 2100 Unicorn-6336.exe 1176 Unicorn-14826.exe 2276 Unicorn-7213.exe 452 Unicorn-34261.exe 2160 Unicorn-6227.exe 3056 Unicorn-64385.exe 1996 Unicorn-31521.exe 2124 Unicorn-23907.exe 1040 Unicorn-35413.exe 2008 Unicorn-39497.exe 2012 Unicorn-35967.exe 892 Unicorn-10716.exe 816 Unicorn-59917.exe 2784 Unicorn-56627.exe 2748 Unicorn-57416.exe 2940 Unicorn-32720.exe 2960 Unicorn-53887.exe 3060 Unicorn-41080.exe 2716 Unicorn-20468.exe 2708 Unicorn-16938.exe 2700 Unicorn-20276.exe 2460 Unicorn-20830.exe 2484 Unicorn-24168.exe 1676 Unicorn-46487.exe 1468 Unicorn-11723.exe 2344 Unicorn-8386.exe 2976 Unicorn-44588.exe 1600 Unicorn-13814.exe 1868 Unicorn-815.exe 2216 Unicorn-21895.exe 2392 Unicorn-1282.exe 1804 Unicorn-30617.exe 2068 Unicorn-62434.exe 1208 Unicorn-63181.exe 2172 Unicorn-8874.exe 2760 Unicorn-45906.exe 2432 Unicorn-9512.exe 2272 Unicorn-38698.exe 2656 Unicorn-1536.exe 2732 Unicorn-53882.exe 3016 Unicorn-9320.exe 1388 Unicorn-6025.exe 1692 Unicorn-37354.exe 1012 Unicorn-26254.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2940 wrote to memory of 2976 2940 1edd14e68bf76aba638f331685de0e60_JaffaCakes118.exe 28 PID 2940 wrote to memory of 2976 2940 1edd14e68bf76aba638f331685de0e60_JaffaCakes118.exe 28 PID 2940 wrote to memory of 2976 2940 1edd14e68bf76aba638f331685de0e60_JaffaCakes118.exe 28 PID 2940 wrote to memory of 2976 2940 1edd14e68bf76aba638f331685de0e60_JaffaCakes118.exe 28 PID 2976 wrote to memory of 1296 2976 Unicorn-26212.exe 29 PID 2976 wrote to memory of 1296 2976 Unicorn-26212.exe 29 PID 2976 wrote to memory of 1296 2976 Unicorn-26212.exe 29 PID 2976 wrote to memory of 1296 2976 Unicorn-26212.exe 29 PID 2940 wrote to memory of 2604 2940 1edd14e68bf76aba638f331685de0e60_JaffaCakes118.exe 30 PID 2940 wrote to memory of 2604 2940 1edd14e68bf76aba638f331685de0e60_JaffaCakes118.exe 30 PID 2940 wrote to memory of 2604 2940 1edd14e68bf76aba638f331685de0e60_JaffaCakes118.exe 30 PID 2940 wrote to memory of 2604 2940 1edd14e68bf76aba638f331685de0e60_JaffaCakes118.exe 30 PID 1296 wrote to memory of 2952 1296 Unicorn-19243.exe 31 PID 1296 wrote to memory of 2952 1296 Unicorn-19243.exe 31 PID 1296 wrote to memory of 2952 1296 Unicorn-19243.exe 31 PID 1296 wrote to memory of 2952 1296 Unicorn-19243.exe 31 PID 2976 wrote to memory of 2752 2976 Unicorn-26212.exe 32 PID 2976 wrote to memory of 2752 2976 Unicorn-26212.exe 32 PID 2976 wrote to memory of 2752 2976 Unicorn-26212.exe 32 PID 2976 wrote to memory of 2752 2976 Unicorn-26212.exe 32 PID 2604 wrote to memory of 2732 2604 Unicorn-39340.exe 33 PID 2604 wrote to memory of 2732 2604 Unicorn-39340.exe 33 PID 2604 wrote to memory of 2732 2604 Unicorn-39340.exe 33 PID 2604 wrote to memory of 2732 2604 Unicorn-39340.exe 33 PID 2952 wrote to memory of 2516 2952 Unicorn-60441.exe 34 PID 2952 wrote to memory of 2516 2952 Unicorn-60441.exe 34 PID 2952 wrote to memory of 2516 2952 Unicorn-60441.exe 34 PID 2952 wrote to memory of 2516 2952 Unicorn-60441.exe 34 PID 1296 wrote to memory of 2880 1296 Unicorn-19243.exe 35 PID 1296 wrote to memory of 2880 1296 Unicorn-19243.exe 35 PID 1296 wrote to memory of 2880 1296 Unicorn-19243.exe 35 PID 1296 wrote to memory of 2880 1296 Unicorn-19243.exe 35 PID 2752 wrote to memory of 1596 2752 Unicorn-44660.exe 36 PID 2752 wrote to memory of 1596 2752 Unicorn-44660.exe 36 PID 2752 wrote to memory of 1596 2752 Unicorn-44660.exe 36 PID 2752 wrote to memory of 1596 2752 Unicorn-44660.exe 36 PID 2732 wrote to memory of 2532 2732 Unicorn-23493.exe 37 PID 2732 wrote to memory of 2532 2732 Unicorn-23493.exe 37 PID 2732 wrote to memory of 2532 2732 Unicorn-23493.exe 37 PID 2732 wrote to memory of 2532 2732 Unicorn-23493.exe 37 PID 2604 wrote to memory of 1776 2604 Unicorn-39340.exe 38 PID 2604 wrote to memory of 1776 2604 Unicorn-39340.exe 38 PID 2604 wrote to memory of 1776 2604 Unicorn-39340.exe 38 PID 2604 wrote to memory of 1776 2604 Unicorn-39340.exe 38 PID 2516 wrote to memory of 800 2516 Unicorn-28776.exe 39 PID 2516 wrote to memory of 800 2516 Unicorn-28776.exe 39 PID 2516 wrote to memory of 800 2516 Unicorn-28776.exe 39 PID 2516 wrote to memory of 800 2516 Unicorn-28776.exe 39 PID 2952 wrote to memory of 1808 2952 Unicorn-60441.exe 40 PID 2952 wrote to memory of 1808 2952 Unicorn-60441.exe 40 PID 2952 wrote to memory of 1808 2952 Unicorn-60441.exe 40 PID 2952 wrote to memory of 1808 2952 Unicorn-60441.exe 40 PID 2532 wrote to memory of 1544 2532 Unicorn-36944.exe 41 PID 2532 wrote to memory of 1544 2532 Unicorn-36944.exe 41 PID 2532 wrote to memory of 1544 2532 Unicorn-36944.exe 41 PID 2532 wrote to memory of 1544 2532 Unicorn-36944.exe 41 PID 2732 wrote to memory of 2100 2732 Unicorn-23493.exe 42 PID 2732 wrote to memory of 2100 2732 Unicorn-23493.exe 42 PID 2732 wrote to memory of 2100 2732 Unicorn-23493.exe 42 PID 2732 wrote to memory of 2100 2732 Unicorn-23493.exe 42 PID 2880 wrote to memory of 496 2880 Unicorn-62195.exe 43 PID 2880 wrote to memory of 496 2880 Unicorn-62195.exe 43 PID 2880 wrote to memory of 496 2880 Unicorn-62195.exe 43 PID 2880 wrote to memory of 496 2880 Unicorn-62195.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\1edd14e68bf76aba638f331685de0e60_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\1edd14e68bf76aba638f331685de0e60_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26212.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26212.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-19243.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19243.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60441.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60441.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-28776.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28776.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46347.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46347.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:800 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34261.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34261.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:452 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-19124.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19124.exe8⤵
- Executes dropped EXE
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21895.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21895.exe9⤵
- Suspicious use of SetWindowsHookEx
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-55273.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55273.exe10⤵PID:3024
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35407.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35407.exe9⤵PID:2664
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35926.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35926.exe10⤵PID:2168
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15717.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15717.exe11⤵PID:2960
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30617.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30617.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1804 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35813.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35813.exe9⤵PID:2900
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52698.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52698.exe10⤵PID:2204
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56627.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56627.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2784 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-1282.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1282.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2392 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2392 -s 2449⤵
- Program crash
PID:2304
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15947.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15947.exe8⤵PID:2488
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6227.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6227.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-41080.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41080.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3060 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62434.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62434.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-364.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-364.exe9⤵PID:1560
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1536.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1536.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2656
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55070.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55070.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-64385.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64385.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3056 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-57416.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57416.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2748 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21978.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21978.exe8⤵
- Executes dropped EXE
PID:904
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18448.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18448.exe7⤵
- Executes dropped EXE
PID:2912
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53887.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53887.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6025.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6025.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1388
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62195.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62195.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-59943.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59943.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:496 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35413.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35413.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1040 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-20276.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20276.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-8874.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8874.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10663.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10663.exe9⤵PID:2584
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63181.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63181.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1208
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20830.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20830.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5833.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5833.exe7⤵
- Executes dropped EXE
PID:1008
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19631.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19631.exe5⤵
- Executes dropped EXE
PID:564
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44660.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44660.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2752 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-20608.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20608.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1596 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1596 -s 2445⤵
- Loads dropped DLL
- Program crash
PID:1172
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7213.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7213.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10716.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10716.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:892 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-815.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-815.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51573.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51573.exe7⤵PID:2920
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35407.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35407.exe6⤵PID:2684
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46487.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46487.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1676 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38698.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38698.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23177.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23177.exe7⤵PID:2232
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21899.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21899.exe8⤵PID:1320
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16606.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16606.exe6⤵PID:2428
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41930.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41930.exe7⤵PID:2040
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39340.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39340.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23493.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23493.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-36944.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36944.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2532 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30286.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30286.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1544 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-31521.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31521.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-20468.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20468.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2716 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2716 -s 2448⤵
- Program crash
PID:2896
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16938.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16938.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26254.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26254.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1012 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48849.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48849.exe8⤵PID:2904
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23907.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23907.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2124 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-32720.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32720.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45906.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45906.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2760 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2760 -s 2408⤵
- Program crash
PID:2512
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19839.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19839.exe7⤵PID:2508
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9512.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9512.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2432
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6336.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6336.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-59917.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59917.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:816 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11723.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11723.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1468 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-29954.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29954.exe7⤵PID:2964
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31707.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31707.exe6⤵PID:3048
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 816 -s 2406⤵
- Program crash
PID:2580
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13814.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13814.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1600 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38314.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38314.exe6⤵
- Executes dropped EXE
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54270.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54270.exe7⤵PID:2672
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40576.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40576.exe8⤵PID:2944
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11066.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11066.exe9⤵PID:2860
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33414.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33414.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1776 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14826.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14826.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1176 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-39497.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39497.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-24168.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24168.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-53882.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53882.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2732
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9320.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9320.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3016
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8386.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8386.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37354.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37354.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1692 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-36492.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36492.exe7⤵PID:2752
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35967.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35967.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44588.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44588.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-29954.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29954.exe6⤵PID:2516
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31707.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31707.exe5⤵PID:3064
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
188KB
MD5f2a10e11cf8da0f3cc9d1edc16ce4fcf
SHA162ae5dc1d88cbfa08392efc46c989bc70effe4f8
SHA2562e58a674f7475c6137de0e09fcc89ba6f502fe65f3082481bb2992d43dee863e
SHA5127be735720c6852a34569e1ba470b3d214fdd2747ad9d55ef589a282039228b5b755a7d84795f03e1aa30552b6b5a4fed771f67520a9cda5f97c921e5b93f61c2
-
Filesize
188KB
MD52dea2cacf4c52a420d2235c7eebbd8dd
SHA116ddfec1e02ac5324c2f6318743152e49a437f91
SHA25649a8919a7b79e80d32616256ae17e30a2d63288abae0a7b923b4e44dfb23a467
SHA51234ec75a53600f1d8d98fe8c7276b1947176e145be2327251e0344b2ab5fcf545f1e98bd6d5c420632bdb3a0d54f6016ddc1043c471bd2a33e3cd7f8c5cdd357c
-
Filesize
188KB
MD5d0abac07db362de78a3c1a837bcae33f
SHA11c25aaf5e44b78096b7ae7a3180c6c9b939357d3
SHA256b0aebaa69599d701f16e2e71e8294bc419d74b760fe3824d3b215d6c69917023
SHA5129e4f64b3fcc80cfc31157ae150b62d400efac7bab30cb0a2d7ce8bfdaf22c3bde876211f7e320a44c255b81d3d3fb9cf1206b1f487381ca5910a3cf278bf3429
-
Filesize
188KB
MD58220b463a47e66ca5509f00f050145a6
SHA1ec849f51183ffa0fbdb76d9542009bbdb9b27bad
SHA256ebf5be8e0fdb6652538715616529ae1fda699c37e144f4ac91b8d404d3657eae
SHA512b478aeef3b854331edcd50cb12b0e4214ed12a78c4a7cf482fb5124cb4452aa2cc324c497d435e07648a0cce29a1188242e3d01a3840c7294d0dcd9486c2daa3
-
Filesize
188KB
MD5f1b38e77cf21a6b7c2d4456d6aee7a90
SHA120576ecbd14f2680cce5c91022f677a383983614
SHA256e9d96c4235b09bb1d33f98e8a8eeba7266603b2b80f68d3abc192b7b81414d0c
SHA512ca06fc0fe5ff386acbe20c3dd307502d2231c9e27bec18666b912caf1ab1f5da2dd97b88ec085fb8461d4546e1c841f0e07517236388e202157366ddeea2b7e7
-
Filesize
188KB
MD5cb71f89738a200f95d73de215d6e7b38
SHA1f0074af06b4933c505d5716b428ab55649cd5f4d
SHA256ddcbaebe25256059a8e73a695b3c12f226bcfa56d2e9e6b8a6e5d8896e2650fe
SHA512e0f3a010129249d36d6c21954975df2a0c5a784ca282416c9ea013fd50981ae7fae9e7f5e0a16f1816bd440c87b581daa706a99734d187c34dd6bcb7b70d4590
-
Filesize
188KB
MD540185c5d35b5f906713b7a9dd68f1452
SHA169b2f4fc1d30c679e85bb2584848720b1bcd19f9
SHA256707d28f5700f86ee2df52a0437be3501f2dd2e4e40f90788f68098760110986b
SHA5129e4a2d15cf6fc2730245b253fb55262ae49652f8d9ea8cd630a53490f5489926e5bed8ebe72d8992435966e62b76a1a13c12eb8e3edf01832b4b7724ed7b990d
-
Filesize
188KB
MD52b90afa9221abb62a8535b751fe15af6
SHA12c00f670390482902c77cc380a034d5e1bdde564
SHA256f46960a57b085e4eb8103a25db3516cb19980b963b015b432b55d9b7726b138b
SHA512c371ef3c2c6e94e14dacf1b9cb8145fdcfeae21208f34f62b7569ef4da0f630ef1a2e966cdd1a05874e9f67ecf2ccedcef26be802f198ce00bf860e08c774821
-
Filesize
188KB
MD52a8cccc0501f7b5704eeef5f9bc6a0d5
SHA1ec52933fd81adfd5e1160112bc17fa5365548192
SHA2561be9aed7f49ce26ce99ef54e1187a6f30d97ce7e9b707504df594b018f88816d
SHA512027800f9b173a2eef72744fb7781e589953031e5972cd9ef998103ee1c66a3ce984fb4383c47d19da32baee77c1262b806eb10489c9ae0c8597905de216076f7
-
Filesize
188KB
MD5877958f3ef239c9d42b797a4105f371c
SHA13f16d300ad19efb6f417487955b1ffa78b15a625
SHA2566d897de6327aa85b9ad9935925b131aaabb46028f951257a82a37b524557a7a6
SHA512c7ccf5e547a44169ad8952edb11bd1139bdf6aefe05549b71c6538b71ee427b0700a7040f9a704edb5a51ae282fe06f9744301aa15761b0d57ee7ff2f712d829
-
Filesize
188KB
MD51b4a6cb9131169ee30423eaa4c40d522
SHA17420a1e2e5d196937fae4e4d237452bc13d897cf
SHA256730a4c1456d70a8f15d51fb4f643be8b1ed3e1a256031feb41280dbb283e11a5
SHA5120ce2bb4b4bafd885bdde7f7b1048e1ac715aca04c579e28ce25d5c76820bf4d2f7a0e4b68352bbbc40806d7a9afbb1696a006654b5c55431567c502473e2bdc3
-
Filesize
188KB
MD5a8bcc982cf2f6524206f96f8f88dc957
SHA11bf83a7d6926ad2d545df060cb9834ad53484ddb
SHA2563c1648a89ea7729dbc5de152fc279703f47b6df9b66b409da397b350b71d3bfc
SHA51284234f3b6fb9a1845ffe71ee18d8d9c3d802f9dcfa2d1111b6236a920aa7fd660c1b69679a59b9c4dbeb023925676d19c3f26213898a66fcd117321ff86d1187
-
Filesize
188KB
MD5c918cbdceea5c7c1dadf7def91b3e8a4
SHA1bc8d740305ad249e618921bf0e0522ddf31768e3
SHA2569f32cef024ef3c566c5d28bdc54b4a5b490ef714a700075d2793de05789c9bfb
SHA512a03427aacfa09204920c31eb28a13b50cecf02c041d9f9ef8256e69d55b6c585326ce995f2030f901a7f887243e743a6cb66655e4ead00a9af79521c023bd3b0
-
Filesize
188KB
MD593a9ca352b95b1f53e9ad71608d1b45e
SHA1ba9d3297639c030ee5f8cdefc21f55bd2ad9a482
SHA25680639b347812f885db3ab2bcb732297b347b8033ceca212f56f1fc283e2bf268
SHA51220a859ad31f12ef6216f2d8f223996284c617f658f06998162568e1976f1c0dddb30211b17b624168ef6adc0bde1b6168039e2888bf5b40a89c62af8e49a9f89
-
Filesize
188KB
MD581e414f4492c2b5df6f981a67df2adad
SHA11c2d366fd281cc05d0f5427f0636b7d7a55a3aa2
SHA2562bcec4989f451685775f54d676c636fc897b34dd3b6d073239bdd8691b04a3f9
SHA512f2b9f481b59ea7e9fc9173e85a3f3c119d041e9c8e3f031452415ac6f613f18b37cee9f6723226ab671c191bd86f2003e082584cd5d3e1f2ffc17ee991e1fe2c
-
Filesize
188KB
MD554d5229e5bf89f277d2346b06118b277
SHA12ba319a9bf5a780ac59e5f01aa69886425995257
SHA256f7fda77ad2cd65930393591e41e719a905f632b118121c7f1753aac29e460874
SHA512787fb81dfc94ef030cca1ef85dd8f82ff1eff080f20012188661c34f0f4c2f25900696441322831ea388a40892462604ae7155fb87afe54adae47a19773a7f96
-
Filesize
188KB
MD5dca93376e56cb9ba6eb4ca6a14bacabe
SHA1828ce5ed7b3c2564c6b949d731bc48f6262a5350
SHA256c7d3e025b5d99290a03847ce92dbd6f1ef221dd60d66e8f52cae2d04d86520d9
SHA512733f82cad3944d9625c2a14ef54321d809518d1170b276891c917d712774015ca1a2f1c47bc82be9895633b4317ca8008979b6f97b23a7b19e8d9f1f8cbc1c47
-
Filesize
188KB
MD5b4b7f933a9c635b24bc0f6fe0c83f70d
SHA1de71111bd4b0b3f292f50c6eb9da2e117523babb
SHA256f09a6ba36178d6ff4702603aaa09251c680fd81c14d555560b3d311ce2735070
SHA512e7a2ce7beef1282145b16360a319e4eaa155a31182f6145c95f7eb5ff8e2bb322b6fd97a9f702a5ad828bd59288e4585ace5009db5b6f25d4c0cf884f8261bd3
-
Filesize
188KB
MD5204d7ebb3c62e4c1830b223b60decf7d
SHA1ef0c3c2639e12dacd4bc27c02c9ce70b0e001a8b
SHA256825f3f10bbde34b254d7afe52969450a24d8f4e00d1fd0368a46ff18bea31413
SHA5124037ba040b699352b2d6d0ca0f624df564b801f6bdec908a19c1f1c3c2fbc76351eeae1700e82a832e2afdac064e44081586125f7dba571e1176d82e7108385c
-
Filesize
188KB
MD500bf8102ab9fdfe3d9a60436633fd4b9
SHA13b67fe4e883ed933a4d38b23dafac2b13e45744c
SHA2562732e5f911dcc6ba96b4541d8b5ed79dc29a023225f937005c80087b39bbe290
SHA51271fcd5764e1e474e1a38b721d1cd97d9e576da7d9379a87b16ccb05cb32e617aa41f21cd4946aa06f505268cf1a1bfab1536dbb9b5d4bd08d399abc5a72749e3