Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
29/03/2024, 15:45
Static task
static1
Behavioral task
behavioral1
Sample
25f94aed8f5366619d88e7d216cca106_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
25f94aed8f5366619d88e7d216cca106_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
25f94aed8f5366619d88e7d216cca106_JaffaCakes118.exe
-
Size
196KB
-
MD5
25f94aed8f5366619d88e7d216cca106
-
SHA1
ecbbf94a22ef5b5b98bd78937fa64a9c5556a856
-
SHA256
d1597ef6cb64b6aef7c3aa4da97480534aec7836683fe4be151036fda27de4da
-
SHA512
37043c04cf676cf5289aa9e285313f0841edc0d29b9b989804f1183ffd7d3421fd0e23e83bc3ca4116ff3ec2811389349d62671d97dbc6757e391ff4fe7cf965
-
SSDEEP
3072:6re0oqPktuAUjbN19d3iqH8p62vbr9KGT7NFx7TWRU2lVvMK:6rJoFjkbpdSqH84E9n2lVvM
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2052 Unicorn-60976.exe 2768 Unicorn-12112.exe 2680 Unicorn-40146.exe 2456 Unicorn-35507.exe 2516 Unicorn-11557.exe 2356 Unicorn-16047.exe 2100 Unicorn-56176.exe 2764 Unicorn-28334.exe 1952 Unicorn-15335.exe 1308 Unicorn-36502.exe 1432 Unicorn-60452.exe 2304 Unicorn-2829.exe 2000 Unicorn-52222.exe 944 Unicorn-7660.exe 764 Unicorn-45014.exe 2652 Unicorn-53929.exe 2592 Unicorn-61905.exe 2320 Unicorn-16234.exe 1924 Unicorn-34791.exe 1988 Unicorn-10841.exe 2512 Unicorn-11438.exe 1580 Unicorn-53026.exe 1976 Unicorn-52279.exe 2852 Unicorn-44303.exe 2976 Unicorn-48558.exe 2088 Unicorn-43727.exe 2728 Unicorn-23499.exe 2260 Unicorn-65086.exe 1164 Unicorn-64531.exe 2216 Unicorn-46524.exe 2204 Unicorn-11246.exe 1808 Unicorn-27028.exe 2436 Unicorn-23136.exe 2484 Unicorn-55808.exe 2812 Unicorn-56555.exe 2640 Unicorn-24183.exe 2624 Unicorn-26644.exe 2760 Unicorn-48688.exe 2672 Unicorn-51148.exe 564 Unicorn-49840.exe 2856 Unicorn-45201.exe 2780 Unicorn-25335.exe 668 Unicorn-4168.exe 812 Unicorn-24973.exe 828 Unicorn-5107.exe 904 Unicorn-24973.exe 2032 Unicorn-2305.exe 3016 Unicorn-47977.exe 860 Unicorn-43338.exe 1188 Unicorn-12180.exe 2664 Unicorn-4780.exe 2960 Unicorn-24646.exe 1956 Unicorn-696.exe 1828 Unicorn-47287.exe 1964 Unicorn-41265.exe 2844 Unicorn-5816.exe 2360 Unicorn-60767.exe 2344 Unicorn-43165.exe 2772 Unicorn-34805.exe 572 Unicorn-10850.exe 1920 Unicorn-55583.exe 2256 Unicorn-13471.exe 2596 Unicorn-54561.exe 2728 Unicorn-13121.exe -
Loads dropped DLL 64 IoCs
pid Process 2804 25f94aed8f5366619d88e7d216cca106_JaffaCakes118.exe 2804 25f94aed8f5366619d88e7d216cca106_JaffaCakes118.exe 2052 Unicorn-60976.exe 2804 25f94aed8f5366619d88e7d216cca106_JaffaCakes118.exe 2804 25f94aed8f5366619d88e7d216cca106_JaffaCakes118.exe 2052 Unicorn-60976.exe 2680 Unicorn-40146.exe 2680 Unicorn-40146.exe 2052 Unicorn-60976.exe 2052 Unicorn-60976.exe 2768 Unicorn-12112.exe 2768 Unicorn-12112.exe 2456 Unicorn-35507.exe 2680 Unicorn-40146.exe 2456 Unicorn-35507.exe 2680 Unicorn-40146.exe 2516 Unicorn-11557.exe 2516 Unicorn-11557.exe 2768 Unicorn-12112.exe 2356 Unicorn-16047.exe 2356 Unicorn-16047.exe 2768 Unicorn-12112.exe 2764 Unicorn-28334.exe 2764 Unicorn-28334.exe 2100 Unicorn-56176.exe 2100 Unicorn-56176.exe 2456 Unicorn-35507.exe 2456 Unicorn-35507.exe 1308 Unicorn-36502.exe 1308 Unicorn-36502.exe 2516 Unicorn-11557.exe 2516 Unicorn-11557.exe 2356 Unicorn-16047.exe 2356 Unicorn-16047.exe 1432 Unicorn-60452.exe 1432 Unicorn-60452.exe 1944 WerFault.exe 1944 WerFault.exe 1944 WerFault.exe 1944 WerFault.exe 1944 WerFault.exe 1944 WerFault.exe 1944 WerFault.exe 2304 Unicorn-2829.exe 2304 Unicorn-2829.exe 2764 Unicorn-28334.exe 2764 Unicorn-28334.exe 2000 Unicorn-52222.exe 2100 Unicorn-56176.exe 2000 Unicorn-52222.exe 2100 Unicorn-56176.exe 944 Unicorn-7660.exe 944 Unicorn-7660.exe 764 Unicorn-45014.exe 764 Unicorn-45014.exe 1308 Unicorn-36502.exe 1308 Unicorn-36502.exe 2592 Unicorn-61905.exe 2592 Unicorn-61905.exe 2320 Unicorn-16234.exe 2320 Unicorn-16234.exe 1432 Unicorn-60452.exe 1432 Unicorn-60452.exe 2652 Unicorn-53929.exe -
Program crash 11 IoCs
pid pid_target Process procid_target 1944 1952 WerFault.exe 36 2988 2088 WerFault.exe 54 1832 2216 WerFault.exe 58 1756 2484 WerFault.exe 63 1768 2760 WerFault.exe 67 2052 1964 WerFault.exe 89 1092 2664 WerFault.exe 84 2276 2360 WerFault.exe 91 880 1188 WerFault.exe 80 1252 2504 WerFault.exe 107 940 572 WerFault.exe 96 -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2804 25f94aed8f5366619d88e7d216cca106_JaffaCakes118.exe 2052 Unicorn-60976.exe 2680 Unicorn-40146.exe 2768 Unicorn-12112.exe 2456 Unicorn-35507.exe 2516 Unicorn-11557.exe 2356 Unicorn-16047.exe 2100 Unicorn-56176.exe 2764 Unicorn-28334.exe 1308 Unicorn-36502.exe 1952 Unicorn-15335.exe 1432 Unicorn-60452.exe 2304 Unicorn-2829.exe 2000 Unicorn-52222.exe 944 Unicorn-7660.exe 764 Unicorn-45014.exe 2592 Unicorn-61905.exe 2652 Unicorn-53929.exe 2320 Unicorn-16234.exe 1924 Unicorn-34791.exe 1988 Unicorn-10841.exe 2512 Unicorn-11438.exe 1580 Unicorn-53026.exe 1976 Unicorn-52279.exe 2852 Unicorn-44303.exe 2976 Unicorn-48558.exe 2088 Unicorn-43727.exe 2728 Unicorn-23499.exe 1164 Unicorn-64531.exe 2260 Unicorn-65086.exe 2204 Unicorn-11246.exe 2216 Unicorn-46524.exe 1808 Unicorn-27028.exe 2436 Unicorn-23136.exe 2484 Unicorn-55808.exe 2640 Unicorn-24183.exe 2760 Unicorn-48688.exe 564 Unicorn-49840.exe 2856 Unicorn-45201.exe 2624 Unicorn-26644.exe 904 Unicorn-24973.exe 812 Unicorn-24973.exe 828 Unicorn-5107.exe 2780 Unicorn-25335.exe 2032 Unicorn-2305.exe 860 Unicorn-43338.exe 2960 Unicorn-24646.exe 2664 Unicorn-4780.exe 1828 Unicorn-47287.exe 2672 Unicorn-51148.exe 1964 Unicorn-41265.exe 1956 Unicorn-696.exe 3016 Unicorn-47977.exe 2360 Unicorn-60767.exe 1188 Unicorn-12180.exe 1920 Unicorn-55583.exe 2844 Unicorn-5816.exe 2256 Unicorn-13471.exe 2344 Unicorn-43165.exe 2772 Unicorn-34805.exe 572 Unicorn-10850.exe 2596 Unicorn-54561.exe 2728 Unicorn-13121.exe 1948 Unicorn-6702.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2804 wrote to memory of 2052 2804 25f94aed8f5366619d88e7d216cca106_JaffaCakes118.exe 28 PID 2804 wrote to memory of 2052 2804 25f94aed8f5366619d88e7d216cca106_JaffaCakes118.exe 28 PID 2804 wrote to memory of 2052 2804 25f94aed8f5366619d88e7d216cca106_JaffaCakes118.exe 28 PID 2804 wrote to memory of 2052 2804 25f94aed8f5366619d88e7d216cca106_JaffaCakes118.exe 28 PID 2804 wrote to memory of 2768 2804 25f94aed8f5366619d88e7d216cca106_JaffaCakes118.exe 30 PID 2804 wrote to memory of 2768 2804 25f94aed8f5366619d88e7d216cca106_JaffaCakes118.exe 30 PID 2804 wrote to memory of 2768 2804 25f94aed8f5366619d88e7d216cca106_JaffaCakes118.exe 30 PID 2804 wrote to memory of 2768 2804 25f94aed8f5366619d88e7d216cca106_JaffaCakes118.exe 30 PID 2052 wrote to memory of 2680 2052 Unicorn-60976.exe 29 PID 2052 wrote to memory of 2680 2052 Unicorn-60976.exe 29 PID 2052 wrote to memory of 2680 2052 Unicorn-60976.exe 29 PID 2052 wrote to memory of 2680 2052 Unicorn-60976.exe 29 PID 2680 wrote to memory of 2456 2680 Unicorn-40146.exe 31 PID 2680 wrote to memory of 2456 2680 Unicorn-40146.exe 31 PID 2680 wrote to memory of 2456 2680 Unicorn-40146.exe 31 PID 2680 wrote to memory of 2456 2680 Unicorn-40146.exe 31 PID 2052 wrote to memory of 2516 2052 Unicorn-60976.exe 32 PID 2052 wrote to memory of 2516 2052 Unicorn-60976.exe 32 PID 2052 wrote to memory of 2516 2052 Unicorn-60976.exe 32 PID 2052 wrote to memory of 2516 2052 Unicorn-60976.exe 32 PID 2768 wrote to memory of 2356 2768 Unicorn-12112.exe 33 PID 2768 wrote to memory of 2356 2768 Unicorn-12112.exe 33 PID 2768 wrote to memory of 2356 2768 Unicorn-12112.exe 33 PID 2768 wrote to memory of 2356 2768 Unicorn-12112.exe 33 PID 2456 wrote to memory of 2100 2456 Unicorn-35507.exe 34 PID 2456 wrote to memory of 2100 2456 Unicorn-35507.exe 34 PID 2456 wrote to memory of 2100 2456 Unicorn-35507.exe 34 PID 2456 wrote to memory of 2100 2456 Unicorn-35507.exe 34 PID 2680 wrote to memory of 2764 2680 Unicorn-40146.exe 35 PID 2680 wrote to memory of 2764 2680 Unicorn-40146.exe 35 PID 2680 wrote to memory of 2764 2680 Unicorn-40146.exe 35 PID 2680 wrote to memory of 2764 2680 Unicorn-40146.exe 35 PID 2516 wrote to memory of 1952 2516 Unicorn-11557.exe 36 PID 2516 wrote to memory of 1952 2516 Unicorn-11557.exe 36 PID 2516 wrote to memory of 1952 2516 Unicorn-11557.exe 36 PID 2516 wrote to memory of 1952 2516 Unicorn-11557.exe 36 PID 2356 wrote to memory of 1432 2356 Unicorn-16047.exe 38 PID 2356 wrote to memory of 1432 2356 Unicorn-16047.exe 38 PID 2356 wrote to memory of 1432 2356 Unicorn-16047.exe 38 PID 2356 wrote to memory of 1432 2356 Unicorn-16047.exe 38 PID 2768 wrote to memory of 1308 2768 Unicorn-12112.exe 37 PID 2768 wrote to memory of 1308 2768 Unicorn-12112.exe 37 PID 2768 wrote to memory of 1308 2768 Unicorn-12112.exe 37 PID 2768 wrote to memory of 1308 2768 Unicorn-12112.exe 37 PID 2764 wrote to memory of 2304 2764 Unicorn-28334.exe 39 PID 2764 wrote to memory of 2304 2764 Unicorn-28334.exe 39 PID 2764 wrote to memory of 2304 2764 Unicorn-28334.exe 39 PID 2764 wrote to memory of 2304 2764 Unicorn-28334.exe 39 PID 2100 wrote to memory of 2000 2100 Unicorn-56176.exe 40 PID 2100 wrote to memory of 2000 2100 Unicorn-56176.exe 40 PID 2100 wrote to memory of 2000 2100 Unicorn-56176.exe 40 PID 2100 wrote to memory of 2000 2100 Unicorn-56176.exe 40 PID 2456 wrote to memory of 944 2456 Unicorn-35507.exe 41 PID 2456 wrote to memory of 944 2456 Unicorn-35507.exe 41 PID 2456 wrote to memory of 944 2456 Unicorn-35507.exe 41 PID 2456 wrote to memory of 944 2456 Unicorn-35507.exe 41 PID 1308 wrote to memory of 764 1308 Unicorn-36502.exe 42 PID 1308 wrote to memory of 764 1308 Unicorn-36502.exe 42 PID 1308 wrote to memory of 764 1308 Unicorn-36502.exe 42 PID 1308 wrote to memory of 764 1308 Unicorn-36502.exe 42 PID 2516 wrote to memory of 2592 2516 Unicorn-11557.exe 44 PID 2516 wrote to memory of 2592 2516 Unicorn-11557.exe 44 PID 2516 wrote to memory of 2592 2516 Unicorn-11557.exe 44 PID 2516 wrote to memory of 2592 2516 Unicorn-11557.exe 44
Processes
-
C:\Users\Admin\AppData\Local\Temp\25f94aed8f5366619d88e7d216cca106_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\25f94aed8f5366619d88e7d216cca106_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2804 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60976.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60976.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2052 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40146.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40146.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2680 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35507.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35507.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-56176.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56176.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2100 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-52222.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52222.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11438.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11438.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2512 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23136.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23136.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2436 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-24646.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24646.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-43165.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43165.exe10⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2344
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4780.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4780.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2664 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2664 -s 2249⤵
- Program crash
PID:1092
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-56555.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56555.exe7⤵
- Executes dropped EXE
PID:2812
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53026.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53026.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-55808.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55808.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2484 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2484 -s 2408⤵
- Program crash
PID:1756
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-696.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-696.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1956
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7660.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7660.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:944 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-52279.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52279.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1976 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26644.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26644.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2624 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13054.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13054.exe8⤵PID:2312
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24183.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24183.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47287.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47287.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1828 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60767.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60767.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2360 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2360 -s 2089⤵
- Program crash
PID:2276
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28334.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28334.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-2829.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2829.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2304 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34791.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34791.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46524.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46524.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2216 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2216 -s 2408⤵
- Program crash
PID:1832
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47977.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47977.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3016 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49204.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49204.exe8⤵PID:760
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11246.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11246.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2204 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-2305.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2305.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34805.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34805.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2772
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10841.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10841.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27028.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27028.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1808 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-43338.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43338.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:860 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-55583.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55583.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13471.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13471.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13121.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13121.exe10⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6702.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6702.exe11⤵
- Suspicious use of SetWindowsHookEx
PID:1948 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12073.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12073.exe12⤵PID:1924
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10361.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10361.exe13⤵PID:1488
-
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12180.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12180.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1188 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1188 -s 2247⤵
- Program crash
PID:880
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11557.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11557.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15335.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15335.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1952 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1952 -s 2405⤵
- Loads dropped DLL
- Program crash
PID:1944
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61905.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61905.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-43727.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43727.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2088 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2088 -s 2446⤵
- Program crash
PID:2988
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25335.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25335.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11720.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11720.exe6⤵PID:2932
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12112.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12112.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16047.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16047.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2356 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60452.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60452.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1432 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16234.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16234.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2320 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23499.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23499.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2728 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-4168.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4168.exe7⤵
- Executes dropped EXE
PID:668
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49840.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49840.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:564 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-41265.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41265.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1964 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 2248⤵
- Program crash
PID:2052
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65086.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65086.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-24973.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24973.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:904 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10850.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10850.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:572 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 572 -s 2248⤵
- Program crash
PID:940
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53929.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53929.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-64531.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64531.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1164 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-24973.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24973.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:812 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13012.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13012.exe7⤵PID:2540
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5107.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5107.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:828 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5816.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5816.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34160.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34160.exe7⤵PID:2504
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2504 -s 2448⤵
- Program crash
PID:1252
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36502.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36502.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45014.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45014.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:764 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44303.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44303.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2852 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51148.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51148.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2672 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54561.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54561.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2596
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48688.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48688.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2760 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2760 -s 2246⤵
- Program crash
PID:1768
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48558.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48558.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45201.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45201.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-65156.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65156.exe6⤵PID:624
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
196KB
MD55aaaa0c4752846ac50b58aba2cd7ea34
SHA1a5ad159cf9e247eb580e57d6dd543f819cf2f497
SHA256a3eee4660aaf1a35b7f291b70ef3711014b918a701e9991b9780c5ccc3618525
SHA5129abbbfc034b08ced7549354084d3dbcc4c2ec25620ed245bdf448c9cf657cf8ce1f7f498e726f28c2e21509e1a324a4349062d05ff89bbc92fb025ee08b3c771
-
Filesize
196KB
MD5448c4ba7dbdbc697be468b5ff2b93188
SHA17b9377f621bf282c438e39a493840d4bdc1c2a69
SHA256b50dcb400ef98b38b1bf47158b6c829c571a1f89b8af561e3d719d98b015e71c
SHA512eeaf09a463392a6732e5e95cd85168bc86cc1e80171109a0d7b318b456e76bc11701e3be1fb84975e4c8171118cc0c2647cd685c67465b3755f401e1da859a64
-
Filesize
196KB
MD53ca9f2202e9949a8c3473f26861c0beb
SHA1b4a3585351eeed6a0f0e25a07c68a5b797dafa82
SHA2561c8a4e49409098a4077e4ae77ad199763968520fea3153b463b81a9050dfdf23
SHA512316db20e25cef6f32d018ca46adc2ef3abbf6868f45df64febebd5f88cc0986833680b45f443565347e9538f517cadfcd177b08937518c27434fd6eea0a673d0
-
Filesize
196KB
MD595ece58a3d5f40f54fdacf2d8371e351
SHA1fc306b1cbd7e2ef3eb18eb80b000760458c85605
SHA256c7b6a4cb7f16082deb45a57f6568d902fbf85129666b999505f95d29dc100637
SHA5126a0f62737350e3d25053f58ac77e4c996849607c71b5bb4bed4c87bec8c9123acb2f20f983a3680484f85cc073a52787d42a8e6f75f549ceec55995ab6a7e313
-
Filesize
196KB
MD57a253ab50a8b67cbaa1d5e05832d6449
SHA15818a10705e0192e338333c80b8522d0799ca015
SHA2569c724d25bfdf2889b0b27e3b40c07548cbacc58c3d147eca8483e803f0f07f60
SHA512bfddba5d083456692f54901d28d59fc32cc3768e29f0a2a01507051e3c37702b2af149cf76725abe9634c70ba53975918d4c9e384749483f6335cc865b025f57
-
Filesize
196KB
MD56e0c4af8a9015c36ef06dd4d5534a9b5
SHA13b9dc54c2d71d6a2a2c71d445c7f340626ed1fdc
SHA2562994984f05d92c60221027e1cf51e227cabcde2c0b953c3ac06b5216954f67f4
SHA512932f9f727c584adfc334dbff50a706debc039e2142e970ea00519f4824852582afffc1416416f3c2d7f7838450d09338d2a064875e4a8e20fff5eb575f2b8b7f
-
Filesize
196KB
MD54ac9d4f2681b3b26582a07c1a9ff6875
SHA1b20d822f6c54f541352552761dbb985d5de4f7d6
SHA256b37e76f38a8df20673e461981e988c4485f8abab29e31e4eb9e38f1a44b0f712
SHA5126a560a51ac6b3176168a2f6d7feb773cc64a08caad9217c5415dc69d54050b714466aa38a7d8024f1180c482dd9dec3c135e1e2a22e5146020071c6d5e98fa8c
-
Filesize
196KB
MD5c2c64ba2100980dd2ea1be3ea1652994
SHA1acf18334ca1daffbde47bf8cabef5075d51919d3
SHA2566690b7bc9f487ed264e747ab2ce288b9073e3e4c6f0f88cbfe067259c342152b
SHA512c1477d563cf88d9d011eb9c2797bebd0ef7f33de40420708fb3081bbdf28f143b7cbe0f89dbf2f255e82709763bd30d37f319d1a6f135ebbd62af4528bc75961
-
Filesize
196KB
MD51ca2f3b52a6af715860513a9511aa019
SHA102d02319e4d85eb52898465f57d850730d5ac1ef
SHA256a94d6156073ea8ac1b5978778401b99a09e5b64cb020e97330a1612b549b964e
SHA51245859ece2d0ee42f7ef1d22e217089fe84d8055cd8159e7322be51536786ea6c073aa0747a305c1f37e06bb454bb960d80364a8d98e8c86ccfd658c717d5158c
-
Filesize
196KB
MD550dbe1dd5e9e7ca8975a77b8e4e372c1
SHA13d3e72f73a4b04ce8c675d9d25c32d5578f15eee
SHA2566eec175b1869908625a741d3165941e61e324535abbe3c00a03896b80e7e3a37
SHA512d1a3b1bc74d9bd2c2caee53a77f1848af4fc2667e6d0624055195c292175f558b3e63513aacaf7d59694c9d6f765c8810b3ceadfd7088fdb498d8978d6be85f4
-
Filesize
196KB
MD5f78bdd63ca7c9c33057bd82a4eca350a
SHA1cdc49074203071e67636d6481b3508a44782c8b5
SHA2567db619d4c1ca492abd9f39447fa80a3c07d343d6955c8261a9f6de1a81271866
SHA512e090f54d58850cb0634e93d6be292b6cd21064230de215ae96e699e6fdfb6f708e9322091a8d3244a3fb3f2698f27ac82bd57e3234e0935a5308ceaa58da3aad
-
Filesize
196KB
MD5420d4b2886a7a4a5dcc226e05640d8b8
SHA196903570ba32a83565fec59bafb66aefb8363c97
SHA2564b4d8d85c7294211e0b33b2ef8b0ef955fca210dc79ab667bf84d29c3d4cf526
SHA512b990ecf2900fb0795462a7eb973045a2134d82b0ec033c36f2799effebfe7725a681b929792a67a86983d5b24fbc329fd6a1f0dc83a70a7923a271296bb75fbd
-
Filesize
196KB
MD54a7fe5a3b6ffbf717b06c06640615489
SHA106eb21d26bce1b1e08bea42ff2479aed8816d722
SHA256c86e5aecf17fde88862b2d0257632624cb200f8dd42a468ebfcce1a9645380db
SHA5121445e8c41e5196a2675e92cd1ce08345d5da73e51137c366273c90f7e5d7e047c88aa75613bf6a0bb3b201ebe379f1fd1bc22c11313c873f770d78fbd5857a58
-
Filesize
196KB
MD5ec65eb68293faf597f7e6f1bb75b867b
SHA1eab02f3477e61a2965161697492e3fb9ee0870d0
SHA256a80f08692555fb50a37b7a3967df026733a645417284fb83889acdd2c5f8e2f0
SHA51222bc89d4b49b60f52b7981017ce9c5705b50cab9116d2bc206b9164e04ad51baa803710ba9af97b742d4fb6e31b47f6bde0b3ab4cfd20ce028ea5be5ee72f471
-
Filesize
196KB
MD5b6af1c365a47aadbb94dd2087883cfc9
SHA17251feff42f76dcaa5bd29b24f70fe59d7eff777
SHA256f4b93791e2efa04d624ed013ce197de7e4513fb55b9e2c0581a307d087432f3b
SHA5122ee2ebc25f9ad345a43c927e0375baa36f1bdf93b56b6c04cd775d37a23d995d6508bb08d66303e07dc5a18fa86b53737246f9b4fa8d25de43561015dbded5d3
-
Filesize
196KB
MD5a7f94a68a308aca7a9e4325e552c8195
SHA1fbd036d51f792025b710ec73ff7a15f991cb8ff9
SHA2565d26f2eeb3a9d7bfc434de0ba0d0dca401aecf7d0d46619ebd64e3e5cbbf51af
SHA512518ad2e288c54b7b702307127db78ef73ca8547687e633c57a282d9bd52f2a7d6feaf11920faedcc1bfd694408e1fe924ba6926ad0a3b1869cd6e6eca50737f3
-
Filesize
196KB
MD5f2fb7765b817897c275a218326817e7c
SHA103b3811adb1be05692bfc1578dc4df40754ecadf
SHA2561c9275c47a96cdf894a95b447654e7bf746fcdc4b1c84ef08c6197a97e47b770
SHA512ec564b9b1f2c46414767ba3f251944c9433d605022a5b521215e5ecf8a83a098753f9f1a66b8497b87bd959b6c79fa9e5263df87bd2c526b80491bbd27a33e24
-
Filesize
196KB
MD50415aaf753b3e3e5d956f4ed44403a9d
SHA1a0102b9f39236c2f4c4c15460fea8e9dc634ecc0
SHA256db12f6ad76f56ead5f8a1616550a185640eee8b9a88dee046a7cfa883623f6ef
SHA512affaa002d31d0ac3d409ef933c56d918db38415aada19e82efe495a82e629c45ebf6838c5e1e2ff624dd98c504efc8b737e573b6c419dcfd0545bc3322181131
-
Filesize
196KB
MD52cfd2d7be80bdd7dcbe0d53941d62c2e
SHA1db15f880743c7d0c1f60cba92ece845e8ac43368
SHA256dd81dc088b817a8e297cc75c389f224495edd2257f35671f55b29dd9cb1f5c16
SHA5120f94e22e84bfe8a84bf1fd0db40d6ac8be30d52a20da5913e5e97f42a505edbde33a576e5d47045ea1fd13d0eb21d75727e4a34fccea552ac277bde5a5646ccb
-
Filesize
196KB
MD53c0ee39d3315ab60b2b49faa62a965af
SHA1d02b4e56c359cdc7168929e40586eb8fd2b7928e
SHA2564d90e37554ad75e74698b397b2c34d5879bcb60628764984903887ea3e228310
SHA512a6a22dacab0ca3fd47ed90d6bf3ea3d6ef1a8c43973d7ca0602010bfc4ccb7d25dc6467b49650389ef3d94c9d4a1de6a967f0539afd913a2d21552e12049688e