Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    143s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    29/03/2024, 15:45

General

  • Target

    25f94aed8f5366619d88e7d216cca106_JaffaCakes118.exe

  • Size

    196KB

  • MD5

    25f94aed8f5366619d88e7d216cca106

  • SHA1

    ecbbf94a22ef5b5b98bd78937fa64a9c5556a856

  • SHA256

    d1597ef6cb64b6aef7c3aa4da97480534aec7836683fe4be151036fda27de4da

  • SHA512

    37043c04cf676cf5289aa9e285313f0841edc0d29b9b989804f1183ffd7d3421fd0e23e83bc3ca4116ff3ec2811389349d62671d97dbc6757e391ff4fe7cf965

  • SSDEEP

    3072:6re0oqPktuAUjbN19d3iqH8p62vbr9KGT7NFx7TWRU2lVvMK:6rJoFjkbpdSqH84E9n2lVvM

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 64 IoCs
  • Loads dropped DLL 64 IoCs
  • Program crash 11 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\25f94aed8f5366619d88e7d216cca106_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\25f94aed8f5366619d88e7d216cca106_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2804
    • C:\Users\Admin\AppData\Local\Temp\Unicorn-60976.exe
      C:\Users\Admin\AppData\Local\Temp\Unicorn-60976.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2052
      • C:\Users\Admin\AppData\Local\Temp\Unicorn-40146.exe
        C:\Users\Admin\AppData\Local\Temp\Unicorn-40146.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2680
        • C:\Users\Admin\AppData\Local\Temp\Unicorn-35507.exe
          C:\Users\Admin\AppData\Local\Temp\Unicorn-35507.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2456
          • C:\Users\Admin\AppData\Local\Temp\Unicorn-56176.exe
            C:\Users\Admin\AppData\Local\Temp\Unicorn-56176.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2100
            • C:\Users\Admin\AppData\Local\Temp\Unicorn-52222.exe
              C:\Users\Admin\AppData\Local\Temp\Unicorn-52222.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              PID:2000
              • C:\Users\Admin\AppData\Local\Temp\Unicorn-11438.exe
                C:\Users\Admin\AppData\Local\Temp\Unicorn-11438.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:2512
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-23136.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-23136.exe
                  8⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:2436
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-24646.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-24646.exe
                    9⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:2960
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-43165.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-43165.exe
                      10⤵
                      • Executes dropped EXE
                      • Suspicious use of SetWindowsHookEx
                      PID:2344
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-4780.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-4780.exe
                  8⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:2664
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 2664 -s 224
                    9⤵
                    • Program crash
                    PID:1092
              • C:\Users\Admin\AppData\Local\Temp\Unicorn-56555.exe
                C:\Users\Admin\AppData\Local\Temp\Unicorn-56555.exe
                7⤵
                • Executes dropped EXE
                PID:2812
            • C:\Users\Admin\AppData\Local\Temp\Unicorn-53026.exe
              C:\Users\Admin\AppData\Local\Temp\Unicorn-53026.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:1580
              • C:\Users\Admin\AppData\Local\Temp\Unicorn-55808.exe
                C:\Users\Admin\AppData\Local\Temp\Unicorn-55808.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:2484
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2484 -s 240
                  8⤵
                  • Program crash
                  PID:1756
              • C:\Users\Admin\AppData\Local\Temp\Unicorn-696.exe
                C:\Users\Admin\AppData\Local\Temp\Unicorn-696.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:1956
          • C:\Users\Admin\AppData\Local\Temp\Unicorn-7660.exe
            C:\Users\Admin\AppData\Local\Temp\Unicorn-7660.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            PID:944
            • C:\Users\Admin\AppData\Local\Temp\Unicorn-52279.exe
              C:\Users\Admin\AppData\Local\Temp\Unicorn-52279.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:1976
              • C:\Users\Admin\AppData\Local\Temp\Unicorn-26644.exe
                C:\Users\Admin\AppData\Local\Temp\Unicorn-26644.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:2624
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-13054.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-13054.exe
                  8⤵
                    PID:2312
              • C:\Users\Admin\AppData\Local\Temp\Unicorn-24183.exe
                C:\Users\Admin\AppData\Local\Temp\Unicorn-24183.exe
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:2640
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-47287.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-47287.exe
                  7⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:1828
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-60767.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-60767.exe
                    8⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:2360
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 2360 -s 208
                      9⤵
                      • Program crash
                      PID:2276
          • C:\Users\Admin\AppData\Local\Temp\Unicorn-28334.exe
            C:\Users\Admin\AppData\Local\Temp\Unicorn-28334.exe
            4⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2764
            • C:\Users\Admin\AppData\Local\Temp\Unicorn-2829.exe
              C:\Users\Admin\AppData\Local\Temp\Unicorn-2829.exe
              5⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              PID:2304
              • C:\Users\Admin\AppData\Local\Temp\Unicorn-34791.exe
                C:\Users\Admin\AppData\Local\Temp\Unicorn-34791.exe
                6⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:1924
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-46524.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-46524.exe
                  7⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:2216
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 2216 -s 240
                    8⤵
                    • Program crash
                    PID:1832
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-47977.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-47977.exe
                  7⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:3016
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-49204.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-49204.exe
                    8⤵
                      PID:760
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-11246.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-11246.exe
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:2204
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-2305.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-2305.exe
                    7⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:2032
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-34805.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-34805.exe
                      8⤵
                      • Executes dropped EXE
                      • Suspicious use of SetWindowsHookEx
                      PID:2772
              • C:\Users\Admin\AppData\Local\Temp\Unicorn-10841.exe
                C:\Users\Admin\AppData\Local\Temp\Unicorn-10841.exe
                5⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:1988
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-27028.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-27028.exe
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:1808
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-43338.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-43338.exe
                    7⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:860
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-55583.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-55583.exe
                      8⤵
                      • Executes dropped EXE
                      • Suspicious use of SetWindowsHookEx
                      PID:1920
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-13471.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-13471.exe
                        9⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:2256
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-13121.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-13121.exe
                          10⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:2728
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-6702.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-6702.exe
                            11⤵
                            • Suspicious use of SetWindowsHookEx
                            PID:1948
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-12073.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-12073.exe
                              12⤵
                                PID:1924
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-10361.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-10361.exe
                                  13⤵
                                    PID:1488
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-12180.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-12180.exe
                      6⤵
                      • Executes dropped EXE
                      • Suspicious use of SetWindowsHookEx
                      PID:1188
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 1188 -s 224
                        7⤵
                        • Program crash
                        PID:880
              • C:\Users\Admin\AppData\Local\Temp\Unicorn-11557.exe
                C:\Users\Admin\AppData\Local\Temp\Unicorn-11557.exe
                3⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:2516
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-15335.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-15335.exe
                  4⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:1952
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 1952 -s 240
                    5⤵
                    • Loads dropped DLL
                    • Program crash
                    PID:1944
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-61905.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-61905.exe
                  4⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of SetWindowsHookEx
                  PID:2592
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-43727.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-43727.exe
                    5⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:2088
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 2088 -s 244
                      6⤵
                      • Program crash
                      PID:2988
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-25335.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-25335.exe
                    5⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:2780
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-11720.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-11720.exe
                      6⤵
                        PID:2932
              • C:\Users\Admin\AppData\Local\Temp\Unicorn-12112.exe
                C:\Users\Admin\AppData\Local\Temp\Unicorn-12112.exe
                2⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:2768
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-16047.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-16047.exe
                  3⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:2356
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-60452.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-60452.exe
                    4⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of SetWindowsHookEx
                    PID:1432
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-16234.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-16234.exe
                      5⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Suspicious use of SetWindowsHookEx
                      PID:2320
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-23499.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-23499.exe
                        6⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:2728
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-4168.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-4168.exe
                          7⤵
                          • Executes dropped EXE
                          PID:668
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-49840.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-49840.exe
                        6⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:564
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-41265.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-41265.exe
                          7⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:1964
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 224
                            8⤵
                            • Program crash
                            PID:2052
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-65086.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-65086.exe
                      5⤵
                      • Executes dropped EXE
                      • Suspicious use of SetWindowsHookEx
                      PID:2260
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-24973.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-24973.exe
                        6⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:904
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-10850.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-10850.exe
                          7⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:572
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 572 -s 224
                            8⤵
                            • Program crash
                            PID:940
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-53929.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-53929.exe
                    4⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of SetWindowsHookEx
                    PID:2652
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-64531.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-64531.exe
                      5⤵
                      • Executes dropped EXE
                      • Suspicious use of SetWindowsHookEx
                      PID:1164
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-24973.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-24973.exe
                        6⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:812
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-13012.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-13012.exe
                          7⤵
                            PID:2540
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-5107.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-5107.exe
                        5⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:828
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-5816.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-5816.exe
                          6⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:2844
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-34160.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-34160.exe
                            7⤵
                              PID:2504
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 2504 -s 244
                                8⤵
                                • Program crash
                                PID:1252
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-36502.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-36502.exe
                      3⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Suspicious use of SetWindowsHookEx
                      • Suspicious use of WriteProcessMemory
                      PID:1308
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-45014.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-45014.exe
                        4⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Suspicious use of SetWindowsHookEx
                        PID:764
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-44303.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-44303.exe
                          5⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:2852
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-51148.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-51148.exe
                            6⤵
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            PID:2672
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-54561.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-54561.exe
                              7⤵
                              • Executes dropped EXE
                              • Suspicious use of SetWindowsHookEx
                              PID:2596
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-48688.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-48688.exe
                          5⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:2760
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 2760 -s 224
                            6⤵
                            • Program crash
                            PID:1768
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-48558.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-48558.exe
                        4⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:2976
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-45201.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-45201.exe
                          5⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:2856
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-65156.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-65156.exe
                            6⤵
                              PID:624

                  Network

                  MITRE ATT&CK Matrix

                  Replay Monitor

                  Loading Replay Monitor...

                  Downloads

                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-16234.exe

                    Filesize

                    196KB

                    MD5

                    5aaaa0c4752846ac50b58aba2cd7ea34

                    SHA1

                    a5ad159cf9e247eb580e57d6dd543f819cf2f497

                    SHA256

                    a3eee4660aaf1a35b7f291b70ef3711014b918a701e9991b9780c5ccc3618525

                    SHA512

                    9abbbfc034b08ced7549354084d3dbcc4c2ec25620ed245bdf448c9cf657cf8ce1f7f498e726f28c2e21509e1a324a4349062d05ff89bbc92fb025ee08b3c771

                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-36502.exe

                    Filesize

                    196KB

                    MD5

                    448c4ba7dbdbc697be468b5ff2b93188

                    SHA1

                    7b9377f621bf282c438e39a493840d4bdc1c2a69

                    SHA256

                    b50dcb400ef98b38b1bf47158b6c829c571a1f89b8af561e3d719d98b015e71c

                    SHA512

                    eeaf09a463392a6732e5e95cd85168bc86cc1e80171109a0d7b318b456e76bc11701e3be1fb84975e4c8171118cc0c2647cd685c67465b3755f401e1da859a64

                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-45014.exe

                    Filesize

                    196KB

                    MD5

                    3ca9f2202e9949a8c3473f26861c0beb

                    SHA1

                    b4a3585351eeed6a0f0e25a07c68a5b797dafa82

                    SHA256

                    1c8a4e49409098a4077e4ae77ad199763968520fea3153b463b81a9050dfdf23

                    SHA512

                    316db20e25cef6f32d018ca46adc2ef3abbf6868f45df64febebd5f88cc0986833680b45f443565347e9538f517cadfcd177b08937518c27434fd6eea0a673d0

                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-56176.exe

                    Filesize

                    196KB

                    MD5

                    95ece58a3d5f40f54fdacf2d8371e351

                    SHA1

                    fc306b1cbd7e2ef3eb18eb80b000760458c85605

                    SHA256

                    c7b6a4cb7f16082deb45a57f6568d902fbf85129666b999505f95d29dc100637

                    SHA512

                    6a0f62737350e3d25053f58ac77e4c996849607c71b5bb4bed4c87bec8c9123acb2f20f983a3680484f85cc073a52787d42a8e6f75f549ceec55995ab6a7e313

                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-5816.exe

                    Filesize

                    196KB

                    MD5

                    7a253ab50a8b67cbaa1d5e05832d6449

                    SHA1

                    5818a10705e0192e338333c80b8522d0799ca015

                    SHA256

                    9c724d25bfdf2889b0b27e3b40c07548cbacc58c3d147eca8483e803f0f07f60

                    SHA512

                    bfddba5d083456692f54901d28d59fc32cc3768e29f0a2a01507051e3c37702b2af149cf76725abe9634c70ba53975918d4c9e384749483f6335cc865b025f57

                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-6702.exe

                    Filesize

                    196KB

                    MD5

                    6e0c4af8a9015c36ef06dd4d5534a9b5

                    SHA1

                    3b9dc54c2d71d6a2a2c71d445c7f340626ed1fdc

                    SHA256

                    2994984f05d92c60221027e1cf51e227cabcde2c0b953c3ac06b5216954f67f4

                    SHA512

                    932f9f727c584adfc334dbff50a706debc039e2142e970ea00519f4824852582afffc1416416f3c2d7f7838450d09338d2a064875e4a8e20fff5eb575f2b8b7f

                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-7660.exe

                    Filesize

                    196KB

                    MD5

                    4ac9d4f2681b3b26582a07c1a9ff6875

                    SHA1

                    b20d822f6c54f541352552761dbb985d5de4f7d6

                    SHA256

                    b37e76f38a8df20673e461981e988c4485f8abab29e31e4eb9e38f1a44b0f712

                    SHA512

                    6a560a51ac6b3176168a2f6d7feb773cc64a08caad9217c5415dc69d54050b714466aa38a7d8024f1180c482dd9dec3c135e1e2a22e5146020071c6d5e98fa8c

                  • \Users\Admin\AppData\Local\Temp\Unicorn-11557.exe

                    Filesize

                    196KB

                    MD5

                    c2c64ba2100980dd2ea1be3ea1652994

                    SHA1

                    acf18334ca1daffbde47bf8cabef5075d51919d3

                    SHA256

                    6690b7bc9f487ed264e747ab2ce288b9073e3e4c6f0f88cbfe067259c342152b

                    SHA512

                    c1477d563cf88d9d011eb9c2797bebd0ef7f33de40420708fb3081bbdf28f143b7cbe0f89dbf2f255e82709763bd30d37f319d1a6f135ebbd62af4528bc75961

                  • \Users\Admin\AppData\Local\Temp\Unicorn-12112.exe

                    Filesize

                    196KB

                    MD5

                    1ca2f3b52a6af715860513a9511aa019

                    SHA1

                    02d02319e4d85eb52898465f57d850730d5ac1ef

                    SHA256

                    a94d6156073ea8ac1b5978778401b99a09e5b64cb020e97330a1612b549b964e

                    SHA512

                    45859ece2d0ee42f7ef1d22e217089fe84d8055cd8159e7322be51536786ea6c073aa0747a305c1f37e06bb454bb960d80364a8d98e8c86ccfd658c717d5158c

                  • \Users\Admin\AppData\Local\Temp\Unicorn-15335.exe

                    Filesize

                    196KB

                    MD5

                    50dbe1dd5e9e7ca8975a77b8e4e372c1

                    SHA1

                    3d3e72f73a4b04ce8c675d9d25c32d5578f15eee

                    SHA256

                    6eec175b1869908625a741d3165941e61e324535abbe3c00a03896b80e7e3a37

                    SHA512

                    d1a3b1bc74d9bd2c2caee53a77f1848af4fc2667e6d0624055195c292175f558b3e63513aacaf7d59694c9d6f765c8810b3ceadfd7088fdb498d8978d6be85f4

                  • \Users\Admin\AppData\Local\Temp\Unicorn-16047.exe

                    Filesize

                    196KB

                    MD5

                    f78bdd63ca7c9c33057bd82a4eca350a

                    SHA1

                    cdc49074203071e67636d6481b3508a44782c8b5

                    SHA256

                    7db619d4c1ca492abd9f39447fa80a3c07d343d6955c8261a9f6de1a81271866

                    SHA512

                    e090f54d58850cb0634e93d6be292b6cd21064230de215ae96e699e6fdfb6f708e9322091a8d3244a3fb3f2698f27ac82bd57e3234e0935a5308ceaa58da3aad

                  • \Users\Admin\AppData\Local\Temp\Unicorn-2829.exe

                    Filesize

                    196KB

                    MD5

                    420d4b2886a7a4a5dcc226e05640d8b8

                    SHA1

                    96903570ba32a83565fec59bafb66aefb8363c97

                    SHA256

                    4b4d8d85c7294211e0b33b2ef8b0ef955fca210dc79ab667bf84d29c3d4cf526

                    SHA512

                    b990ecf2900fb0795462a7eb973045a2134d82b0ec033c36f2799effebfe7725a681b929792a67a86983d5b24fbc329fd6a1f0dc83a70a7923a271296bb75fbd

                  • \Users\Admin\AppData\Local\Temp\Unicorn-28334.exe

                    Filesize

                    196KB

                    MD5

                    4a7fe5a3b6ffbf717b06c06640615489

                    SHA1

                    06eb21d26bce1b1e08bea42ff2479aed8816d722

                    SHA256

                    c86e5aecf17fde88862b2d0257632624cb200f8dd42a468ebfcce1a9645380db

                    SHA512

                    1445e8c41e5196a2675e92cd1ce08345d5da73e51137c366273c90f7e5d7e047c88aa75613bf6a0bb3b201ebe379f1fd1bc22c11313c873f770d78fbd5857a58

                  • \Users\Admin\AppData\Local\Temp\Unicorn-35507.exe

                    Filesize

                    196KB

                    MD5

                    ec65eb68293faf597f7e6f1bb75b867b

                    SHA1

                    eab02f3477e61a2965161697492e3fb9ee0870d0

                    SHA256

                    a80f08692555fb50a37b7a3967df026733a645417284fb83889acdd2c5f8e2f0

                    SHA512

                    22bc89d4b49b60f52b7981017ce9c5705b50cab9116d2bc206b9164e04ad51baa803710ba9af97b742d4fb6e31b47f6bde0b3ab4cfd20ce028ea5be5ee72f471

                  • \Users\Admin\AppData\Local\Temp\Unicorn-40146.exe

                    Filesize

                    196KB

                    MD5

                    b6af1c365a47aadbb94dd2087883cfc9

                    SHA1

                    7251feff42f76dcaa5bd29b24f70fe59d7eff777

                    SHA256

                    f4b93791e2efa04d624ed013ce197de7e4513fb55b9e2c0581a307d087432f3b

                    SHA512

                    2ee2ebc25f9ad345a43c927e0375baa36f1bdf93b56b6c04cd775d37a23d995d6508bb08d66303e07dc5a18fa86b53737246f9b4fa8d25de43561015dbded5d3

                  • \Users\Admin\AppData\Local\Temp\Unicorn-52222.exe

                    Filesize

                    196KB

                    MD5

                    a7f94a68a308aca7a9e4325e552c8195

                    SHA1

                    fbd036d51f792025b710ec73ff7a15f991cb8ff9

                    SHA256

                    5d26f2eeb3a9d7bfc434de0ba0d0dca401aecf7d0d46619ebd64e3e5cbbf51af

                    SHA512

                    518ad2e288c54b7b702307127db78ef73ca8547687e633c57a282d9bd52f2a7d6feaf11920faedcc1bfd694408e1fe924ba6926ad0a3b1869cd6e6eca50737f3

                  • \Users\Admin\AppData\Local\Temp\Unicorn-53929.exe

                    Filesize

                    196KB

                    MD5

                    f2fb7765b817897c275a218326817e7c

                    SHA1

                    03b3811adb1be05692bfc1578dc4df40754ecadf

                    SHA256

                    1c9275c47a96cdf894a95b447654e7bf746fcdc4b1c84ef08c6197a97e47b770

                    SHA512

                    ec564b9b1f2c46414767ba3f251944c9433d605022a5b521215e5ecf8a83a098753f9f1a66b8497b87bd959b6c79fa9e5263df87bd2c526b80491bbd27a33e24

                  • \Users\Admin\AppData\Local\Temp\Unicorn-60452.exe

                    Filesize

                    196KB

                    MD5

                    0415aaf753b3e3e5d956f4ed44403a9d

                    SHA1

                    a0102b9f39236c2f4c4c15460fea8e9dc634ecc0

                    SHA256

                    db12f6ad76f56ead5f8a1616550a185640eee8b9a88dee046a7cfa883623f6ef

                    SHA512

                    affaa002d31d0ac3d409ef933c56d918db38415aada19e82efe495a82e629c45ebf6838c5e1e2ff624dd98c504efc8b737e573b6c419dcfd0545bc3322181131

                  • \Users\Admin\AppData\Local\Temp\Unicorn-60976.exe

                    Filesize

                    196KB

                    MD5

                    2cfd2d7be80bdd7dcbe0d53941d62c2e

                    SHA1

                    db15f880743c7d0c1f60cba92ece845e8ac43368

                    SHA256

                    dd81dc088b817a8e297cc75c389f224495edd2257f35671f55b29dd9cb1f5c16

                    SHA512

                    0f94e22e84bfe8a84bf1fd0db40d6ac8be30d52a20da5913e5e97f42a505edbde33a576e5d47045ea1fd13d0eb21d75727e4a34fccea552ac277bde5a5646ccb

                  • \Users\Admin\AppData\Local\Temp\Unicorn-61905.exe

                    Filesize

                    196KB

                    MD5

                    3c0ee39d3315ab60b2b49faa62a965af

                    SHA1

                    d02b4e56c359cdc7168929e40586eb8fd2b7928e

                    SHA256

                    4d90e37554ad75e74698b397b2c34d5879bcb60628764984903887ea3e228310

                    SHA512

                    a6a22dacab0ca3fd47ed90d6bf3ea3d6ef1a8c43973d7ca0602010bfc4ccb7d25dc6467b49650389ef3d94c9d4a1de6a967f0539afd913a2d21552e12049688e