Analysis

  • max time kernel
    82s
  • max time network
    123s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    04-04-2024 16:57

General

  • Target

    bdaaffad1fb488b6e29b972f32a95d7f_JaffaCakes118.exe

  • Size

    192KB

  • MD5

    bdaaffad1fb488b6e29b972f32a95d7f

  • SHA1

    e5a781214d10b7b3db1239c3e2bf4601bde7827f

  • SHA256

    6a59333938ed04857b904eb08dce6deeb4a95e72774c1aee74822c5361e5a69b

  • SHA512

    8639f05fc5da92e1e3984506e7ba3b854199bbb175414751ea77c59e1eb907f4f0406c6036074dac24d1065b4a4197acdf1b81850a4a4c7205dc45845d49fe31

  • SSDEEP

    3072:aDhSoJLblw6XkH0/O/lNXJEb1n4MIwINilxHyk8vwlv1p1t:aDYojjXkoOtNXJ9pA2wlv1p1

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 64 IoCs
  • Loads dropped DLL 64 IoCs
  • Program crash 2 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\bdaaffad1fb488b6e29b972f32a95d7f_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\bdaaffad1fb488b6e29b972f32a95d7f_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2440
    • C:\Users\Admin\AppData\Local\Temp\Unicorn-52742.exe
      C:\Users\Admin\AppData\Local\Temp\Unicorn-52742.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2836
      • C:\Users\Admin\AppData\Local\Temp\Unicorn-54169.exe
        C:\Users\Admin\AppData\Local\Temp\Unicorn-54169.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2588
        • C:\Users\Admin\AppData\Local\Temp\Unicorn-32077.exe
          C:\Users\Admin\AppData\Local\Temp\Unicorn-32077.exe
          4⤵
          • Executes dropped EXE
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:3004
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 3004 -s 240
            5⤵
            • Loads dropped DLL
            • Program crash
            PID:108
      • C:\Users\Admin\AppData\Local\Temp\Unicorn-43094.exe
        C:\Users\Admin\AppData\Local\Temp\Unicorn-43094.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2380
        • C:\Users\Admin\AppData\Local\Temp\Unicorn-23355.exe
          C:\Users\Admin\AppData\Local\Temp\Unicorn-23355.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:1280
          • C:\Users\Admin\AppData\Local\Temp\Unicorn-32914.exe
            C:\Users\Admin\AppData\Local\Temp\Unicorn-32914.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2152
            • C:\Users\Admin\AppData\Local\Temp\Unicorn-53692.exe
              C:\Users\Admin\AppData\Local\Temp\Unicorn-53692.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              PID:1404
              • C:\Users\Admin\AppData\Local\Temp\Unicorn-18171.exe
                C:\Users\Admin\AppData\Local\Temp\Unicorn-18171.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:3028
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-39886.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-39886.exe
                  8⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:2348
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-16508.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-16508.exe
                    9⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:916
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-10197.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-10197.exe
                      10⤵
                        PID:700
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-35448.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-35448.exe
                      9⤵
                        PID:1724
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-42824.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-42824.exe
                          10⤵
                            PID:1584
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-4052.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-4052.exe
                              11⤵
                                PID:2576
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-12978.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-12978.exe
                          8⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:2988
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-6222.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-6222.exe
                            9⤵
                              PID:2012
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-33232.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-33232.exe
                          7⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:2416
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-4255.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-4255.exe
                            8⤵
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            PID:848
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-37634.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-37634.exe
                              9⤵
                                PID:1244
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-38380.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-38380.exe
                              8⤵
                                PID:2224
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-55674.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-55674.exe
                            6⤵
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            PID:1840
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-16342.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-16342.exe
                              7⤵
                              • Executes dropped EXE
                              • Suspicious use of SetWindowsHookEx
                              PID:2816
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-41863.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-41863.exe
                                8⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                PID:2092
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-11986.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-11986.exe
                                  9⤵
                                    PID:1492
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-21421.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-21421.exe
                                7⤵
                                • Executes dropped EXE
                                PID:1968
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-54247.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-54247.exe
                            5⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Suspicious use of SetWindowsHookEx
                            PID:560
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-34507.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-34507.exe
                              6⤵
                              • Executes dropped EXE
                              • Suspicious use of SetWindowsHookEx
                              PID:552
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-7296.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-7296.exe
                                7⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                PID:2696
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-14582.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-14582.exe
                                  8⤵
                                    PID:2980
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-38688.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-38688.exe
                                      9⤵
                                        PID:2628
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-32324.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-32324.exe
                                          10⤵
                                            PID:1792
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-25807.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-25807.exe
                                              11⤵
                                                PID:2340
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-52968.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-52968.exe
                                      6⤵
                                      • Executes dropped EXE
                                      • Suspicious use of SetWindowsHookEx
                                      PID:2648
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-41479.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-41479.exe
                                        7⤵
                                          PID:2252
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-53012.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-53012.exe
                                    4⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • Suspicious use of SetWindowsHookEx
                                    PID:2796
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-33272.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-33272.exe
                                      5⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Suspicious use of SetWindowsHookEx
                                      PID:1132
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-22255.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-22255.exe
                                        6⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetWindowsHookEx
                                        PID:1664
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-27141.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-27141.exe
                                          7⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetWindowsHookEx
                                          PID:2272
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-17515.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-17515.exe
                                            8⤵
                                              PID:1004
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-3191.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-3191.exe
                                          6⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetWindowsHookEx
                                          PID:344
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-62091.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-62091.exe
                                            7⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetWindowsHookEx
                                            PID:780
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-44297.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-44297.exe
                                              8⤵
                                                PID:1544
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -u -p 780 -s 380
                                                8⤵
                                                • Program crash
                                                PID:2236
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-56336.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-56336.exe
                                              7⤵
                                                PID:2128
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-38979.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-38979.exe
                                                  8⤵
                                                    PID:2560
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-23769.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-23769.exe
                                              5⤵
                                              • Executes dropped EXE
                                              • Suspicious use of SetWindowsHookEx
                                              PID:2872
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-35885.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-35885.exe
                                                6⤵
                                                • Executes dropped EXE
                                                • Suspicious use of SetWindowsHookEx
                                                PID:2040
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-31111.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-31111.exe
                                                  7⤵
                                                    PID:1944
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-62892.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-62892.exe
                                          2⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          • Suspicious use of SetWindowsHookEx
                                          • Suspicious use of WriteProcessMemory
                                          PID:2592
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-58876.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-58876.exe
                                            3⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            • Suspicious use of SetWindowsHookEx
                                            • Suspicious use of WriteProcessMemory
                                            PID:2260
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-39691.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-39691.exe
                                              4⤵
                                              • Executes dropped EXE
                                              • Loads dropped DLL
                                              • Suspicious use of SetWindowsHookEx
                                              • Suspicious use of WriteProcessMemory
                                              PID:2664
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-23677.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-23677.exe
                                                5⤵
                                                • Executes dropped EXE
                                                • Loads dropped DLL
                                                • Suspicious use of SetWindowsHookEx
                                                PID:1996
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-5451.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-5451.exe
                                                  6⤵
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:3052
                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-6878.exe
                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-6878.exe
                                                    7⤵
                                                    • Executes dropped EXE
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:1628
                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-27717.exe
                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-27717.exe
                                                      8⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:2084
                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-4722.exe
                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-4722.exe
                                                        9⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:2656
                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-21805.exe
                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-21805.exe
                                                      8⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:3068
                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-30810.exe
                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-30810.exe
                                                        9⤵
                                                          PID:996
                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-15443.exe
                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-15443.exe
                                                      7⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:2404
                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-25683.exe
                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-25683.exe
                                                        8⤵
                                                          PID:1452
                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-12284.exe
                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-12284.exe
                                                            9⤵
                                                              PID:640
                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-11517.exe
                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-11517.exe
                                                        6⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:1496
                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-47753.exe
                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-47753.exe
                                                          7⤵
                                                          • Executes dropped EXE
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:1992
                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-53539.exe
                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-53539.exe
                                                            8⤵
                                                              PID:1524
                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-21613.exe
                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-21613.exe
                                                            7⤵
                                                              PID:2600
                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-26488.exe
                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-26488.exe
                                                                8⤵
                                                                  PID:1564
                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-10282.exe
                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-10282.exe
                                                            5⤵
                                                            • Executes dropped EXE
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:2892
                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-2794.exe
                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-2794.exe
                                                              6⤵
                                                              • Executes dropped EXE
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:2724
                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-51645.exe
                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-51645.exe
                                                                7⤵
                                                                • Executes dropped EXE
                                                                • Suspicious use of SetWindowsHookEx
                                                                PID:2596
                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-41287.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-41287.exe
                                                                  8⤵
                                                                  • Executes dropped EXE
                                                                  • Suspicious use of SetWindowsHookEx
                                                                  PID:2216
                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-35413.exe
                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-35413.exe
                                                                    9⤵
                                                                      PID:2488
                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-42335.exe
                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-42335.exe
                                                                        10⤵
                                                                          PID:1716
                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-54748.exe
                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-54748.exe
                                                                            11⤵
                                                                              PID:2080
                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-33673.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-33673.exe
                                                                      7⤵
                                                                        PID:2148
                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-7275.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-7275.exe
                                                                      6⤵
                                                                      • Executes dropped EXE
                                                                      • Suspicious use of SetWindowsHookEx
                                                                      PID:1580
                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-34427.exe
                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-34427.exe
                                                                        7⤵
                                                                          PID:2476
                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-27067.exe
                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-27067.exe
                                                                            8⤵
                                                                              PID:1708
                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-28507.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-28507.exe
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      • Loads dropped DLL
                                                                      • Suspicious use of SetWindowsHookEx
                                                                      PID:1636
                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-30148.exe
                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-30148.exe
                                                                        5⤵
                                                                        • Executes dropped EXE
                                                                        • Suspicious use of SetWindowsHookEx
                                                                        PID:2712
                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-60163.exe
                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-60163.exe
                                                                          6⤵
                                                                          • Executes dropped EXE
                                                                          • Suspicious use of SetWindowsHookEx
                                                                          PID:2144
                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-47753.exe
                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-47753.exe
                                                                            7⤵
                                                                            • Executes dropped EXE
                                                                            • Suspicious use of SetWindowsHookEx
                                                                            PID:2000
                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-26067.exe
                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-26067.exe
                                                                              8⤵
                                                                                PID:2524
                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-62994.exe
                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-62994.exe
                                                                              7⤵
                                                                                PID:2240
                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-3383.exe
                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-3383.exe
                                                                              6⤵
                                                                              • Executes dropped EXE
                                                                              • Suspicious use of SetWindowsHookEx
                                                                              PID:2004
                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-50379.exe
                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-50379.exe
                                                                                7⤵
                                                                                  PID:1548
                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-36488.exe
                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-36488.exe
                                                                                    8⤵
                                                                                      PID:2180
                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-17929.exe
                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-17929.exe
                                                                                        9⤵
                                                                                          PID:2588
                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-27469.exe
                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-27469.exe
                                                                                  5⤵
                                                                                  • Executes dropped EXE
                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                  PID:2604
                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-24209.exe
                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-24209.exe
                                                                                    6⤵
                                                                                    • Executes dropped EXE
                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                    PID:2200
                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-41479.exe
                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-41479.exe
                                                                                      7⤵
                                                                                        PID:2748
                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-14561.exe
                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-14561.exe
                                                                                      6⤵
                                                                                        PID:2368
                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-57295.exe
                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-57295.exe
                                                                                          7⤵
                                                                                            PID:1980
                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-11657.exe
                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-11657.exe
                                                                                    3⤵
                                                                                    • Executes dropped EXE
                                                                                    • Loads dropped DLL
                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                    • Suspicious use of WriteProcessMemory
                                                                                    PID:1436
                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-40205.exe
                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-40205.exe
                                                                                      4⤵
                                                                                      • Executes dropped EXE
                                                                                      • Loads dropped DLL
                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                      PID:1980
                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-21980.exe
                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-21980.exe
                                                                                        5⤵
                                                                                        • Executes dropped EXE
                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                        PID:952
                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-64247.exe
                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-64247.exe
                                                                                          6⤵
                                                                                          • Executes dropped EXE
                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                          PID:1884
                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-27469.exe
                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-27469.exe
                                                                                        5⤵
                                                                                        • Executes dropped EXE
                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                        PID:2904
                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-60965.exe
                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-60965.exe
                                                                                          6⤵
                                                                                          • Executes dropped EXE
                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                          PID:1892
                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-30151.exe
                                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-30151.exe
                                                                                            7⤵
                                                                                              PID:2624
                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-15328.exe
                                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-15328.exe
                                                                                                8⤵
                                                                                                  PID:1364
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-28656.exe
                                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-28656.exe
                                                                                                    9⤵
                                                                                                      PID:2328
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-16757.exe
                                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-16757.exe
                                                                                                        10⤵
                                                                                                          PID:2264
                                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-14561.exe
                                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-14561.exe
                                                                                                  6⤵
                                                                                                    PID:2532
                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-22534.exe
                                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-22534.exe
                                                                                                4⤵
                                                                                                • Executes dropped EXE
                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                PID:1460
                                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-39167.exe
                                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-39167.exe
                                                                                                  5⤵
                                                                                                  • Executes dropped EXE
                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                  PID:2560
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-24209.exe
                                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-24209.exe
                                                                                                    6⤵
                                                                                                    • Executes dropped EXE
                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                    PID:2164
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-17214.exe
                                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-17214.exe
                                                                                                      7⤵
                                                                                                        PID:1036
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-26810.exe
                                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-26810.exe
                                                                                                          8⤵
                                                                                                            PID:1504
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-34218.exe
                                                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-34218.exe
                                                                                                              9⤵
                                                                                                                PID:2192
                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-32662.exe
                                                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-32662.exe
                                                                                                                  10⤵
                                                                                                                    PID:2156
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-41291.exe
                                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-41291.exe
                                                                                                          5⤵
                                                                                                          • Executes dropped EXE
                                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                                          PID:1560
                                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-21168.exe
                                                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-21168.exe
                                                                                                            6⤵
                                                                                                            • Executes dropped EXE
                                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                                            PID:2180
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-33742.exe
                                                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-33742.exe
                                                                                                              7⤵
                                                                                                                PID:2428
                                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-55869.exe
                                                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-55869.exe
                                                                                                              6⤵
                                                                                                                PID:1720
                                                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-4062.exe
                                                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-4062.exe
                                                                                                                  7⤵
                                                                                                                    PID:2528
                                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-32662.exe
                                                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-32662.exe
                                                                                                                      8⤵
                                                                                                                        PID:1740

                                                                                                        Network

                                                                                                        MITRE ATT&CK Matrix

                                                                                                        Replay Monitor

                                                                                                        Loading Replay Monitor...

                                                                                                        Downloads

                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-11657.exe

                                                                                                          Filesize

                                                                                                          192KB

                                                                                                          MD5

                                                                                                          799347fe8a6f6cefa29061a5e0005b76

                                                                                                          SHA1

                                                                                                          18377dd47132ec0599a7246d551ac1d62b04ac60

                                                                                                          SHA256

                                                                                                          300fa49f9ebdbf564c8dcaa18a24663994a11daa999d1e16ee8d27085040bae0

                                                                                                          SHA512

                                                                                                          22ead00f1d526765c01e95f788daa2bc2ae208b0c9fe948595620be27f0a23ee40aa0efc9e163e17a27a2fc86ccbe82e4a370b463ed95ced8bf599030dc762ab

                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-23677.exe

                                                                                                          Filesize

                                                                                                          192KB

                                                                                                          MD5

                                                                                                          6ac6f96d13c3b5d8ba4c1b5401198abf

                                                                                                          SHA1

                                                                                                          13ffd265484d47df4abe4dedc6afc78baecd9708

                                                                                                          SHA256

                                                                                                          a1831af5c21d2a0c17b414b41e6c06590bf4ccbe1dc858227dfaebbb1b48aa51

                                                                                                          SHA512

                                                                                                          0cc4486c0bfec1383bef148c613d2166b35d2d1326a3b8ad522ae895fadb0b637f6010a6ea2ce69e6fee222e7c7cd29e1aefe6378054d141782cc02dfa534bd7

                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-32914.exe

                                                                                                          Filesize

                                                                                                          192KB

                                                                                                          MD5

                                                                                                          5907f4d721c9eef78a18a576c4c44836

                                                                                                          SHA1

                                                                                                          3c31b9e5081a7b36a14f29cd2870d59774142df1

                                                                                                          SHA256

                                                                                                          0768d1b3fb9fda7767adf47d43d60f46dc751097e5db9041426c6fed20f1e9e7

                                                                                                          SHA512

                                                                                                          fe9a61dd8df9437729e647e54b13ac0f28cc029f9cbc2a6d81c5512fb2b1299b43fd198bf0549c836802eaddee3d1ce02dcd11efbb9af834b2f072d001152dc0

                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-54247.exe

                                                                                                          Filesize

                                                                                                          192KB

                                                                                                          MD5

                                                                                                          4f8662564ef6a174606f69e58d9da930

                                                                                                          SHA1

                                                                                                          c3e48cf7fe9a3eae214e67ab83bce1ed0ed4bdc9

                                                                                                          SHA256

                                                                                                          17771dc741460b840439245326864ad6e87ba6d408bb0a11ed80dcd2834fb156

                                                                                                          SHA512

                                                                                                          a83deaac506fd6ca2c7308d1374cede91a26b870b5cf6029cf89993e1d5c21878e48fda5246b5edee9a630b9a5ce09b86253a02bfb80de07c9ac5381480422d1

                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-5451.exe

                                                                                                          Filesize

                                                                                                          192KB

                                                                                                          MD5

                                                                                                          eee9c715b0269329795c84f3b121971b

                                                                                                          SHA1

                                                                                                          ab319530331d15f18b45f0f12bee68f76e99c62b

                                                                                                          SHA256

                                                                                                          5152bc2a1d44dc3867c275f54418bacc9ab6d6489cf28e9832ecbc1260f148f7

                                                                                                          SHA512

                                                                                                          37874ba3899211ba6f6c4cb143a2f57b0fce279cde16113339be8ee59dfb8cb5d1fb81b48d5aaf1fb177ae27ff9706796f4cb89e877caf2d9033f13e54c11542

                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-62892.exe

                                                                                                          Filesize

                                                                                                          192KB

                                                                                                          MD5

                                                                                                          ede8817d08d9f28cd60159dff899be02

                                                                                                          SHA1

                                                                                                          37c23a5ad38eed72051876b5c5af78e09581cdd8

                                                                                                          SHA256

                                                                                                          4039d7fd0a966812f9dc7f0188e975edb1932a3dbed850704e2a73e7cc58210a

                                                                                                          SHA512

                                                                                                          1376ba6c38980832a33cef43935827c8a38e0ffaee3ce53aac6e24ebfadd16e88fcec94f1f5a8e6626ff74487d0ff29e576781c46aa91fd6fbbce3b59d25e328

                                                                                                        • \Users\Admin\AppData\Local\Temp\Unicorn-23355.exe

                                                                                                          Filesize

                                                                                                          192KB

                                                                                                          MD5

                                                                                                          0769762cac07e884439e8e0cacc576ff

                                                                                                          SHA1

                                                                                                          b71cf892dc29021baacbb6fc64c962dc422e2451

                                                                                                          SHA256

                                                                                                          ac0903c703fc2984d1f78a6ece0e45111f26e69d124c0a4e6ef4965dece0c3bb

                                                                                                          SHA512

                                                                                                          9647920e4ef40f580c87a8825d07e6ea69b3bd664abbec12d936919b48fa36121c1c10c1cc2d91fe8941d39649bfdbb8c30ab6c632266cb27ec70d6026134164

                                                                                                        • \Users\Admin\AppData\Local\Temp\Unicorn-28507.exe

                                                                                                          Filesize

                                                                                                          192KB

                                                                                                          MD5

                                                                                                          a56a8cd5695aa59f13c083cc7b2985ea

                                                                                                          SHA1

                                                                                                          4861d262f66637065ba496aee354dfebca705bb5

                                                                                                          SHA256

                                                                                                          26b13aaa545547a176fee1a9e64116f43e15537a8af808aa8f82306f04b44cf5

                                                                                                          SHA512

                                                                                                          3e0dee8cd8457df93e0c19d160dcad26fd773fb2ea211d337ee37132cd17ba773dda83a40b14ba3efb1a436f5a8d837716cfa1a3159d2b9f8f7ba3e0d87b4bba

                                                                                                        • \Users\Admin\AppData\Local\Temp\Unicorn-32077.exe

                                                                                                          Filesize

                                                                                                          192KB

                                                                                                          MD5

                                                                                                          2a35862e038e601a113350e474b0f8a8

                                                                                                          SHA1

                                                                                                          33785bb70e5ecdd9330da610443eb753f10d96f0

                                                                                                          SHA256

                                                                                                          f75357d3359c31a8fcffcb16778aff1f2a3e9ec5269d98d4e01b36fa6bdeb08c

                                                                                                          SHA512

                                                                                                          4156ec806fd937f4253ed93a96932737779f9e5e8a3365ed3dabd3dbbf7fcc75ea7f432f520348fea663ea30b30ea78d1dbc59834287fd3f839df0ebfa2da388

                                                                                                        • \Users\Admin\AppData\Local\Temp\Unicorn-39691.exe

                                                                                                          Filesize

                                                                                                          192KB

                                                                                                          MD5

                                                                                                          2a0b67a7f3bef82104a39dae3272af6e

                                                                                                          SHA1

                                                                                                          22c1386466da881d20dab9733cc84271ec65cc43

                                                                                                          SHA256

                                                                                                          32423a145bca9d736f649575f435e8b5b01fa089ba7b260ffbc6c753d9aafb36

                                                                                                          SHA512

                                                                                                          39ea3bfa6f4945c895331e73802edcc1c9e0fb776ab6f9b0787fed7709e8cfc94287ed907df4b282bf062e647aee8feecf7d8aae4776740d33690478fe4e7661

                                                                                                        • \Users\Admin\AppData\Local\Temp\Unicorn-40205.exe

                                                                                                          Filesize

                                                                                                          192KB

                                                                                                          MD5

                                                                                                          6b7480f49829cde82981e8b6038c1777

                                                                                                          SHA1

                                                                                                          6b6ff3cdebec2462bc041f73c5b03b171de02368

                                                                                                          SHA256

                                                                                                          23b85b88fb9657611dc69fa50b020eb1c7af50e548f2f64759da1680872a858f

                                                                                                          SHA512

                                                                                                          c5b642f3cb422793238314b317271dc79faf79ed6ed5e2c522c8e2b3ba7f57c2017482f6e6c6cb3e0b1d8cb41372d535e531a1638d7e141b1d73fee785a8660c

                                                                                                        • \Users\Admin\AppData\Local\Temp\Unicorn-43094.exe

                                                                                                          Filesize

                                                                                                          192KB

                                                                                                          MD5

                                                                                                          e2a5ad8e25d55b4acfc3ff2183b02d30

                                                                                                          SHA1

                                                                                                          8635759693691fa176ba49cb62fab3d2b9036243

                                                                                                          SHA256

                                                                                                          8e47535b57ceed474eea3e9ebd6b4a9dd1bfdfe849e336ac6fb24c725c57eb62

                                                                                                          SHA512

                                                                                                          fa0e0187917ba4c72a6bd9d0b03c7ec567925dc4578b6f63ad7d6f7bbacf138357ab634b456aa784a2fa34fb3bb52ff7857dfd4b631fa8e8842417b5a00d3232

                                                                                                        • \Users\Admin\AppData\Local\Temp\Unicorn-52742.exe

                                                                                                          Filesize

                                                                                                          192KB

                                                                                                          MD5

                                                                                                          6b117c56ec65f0b2b8708f6bf7075b1c

                                                                                                          SHA1

                                                                                                          a6be5ce52ca27839cbe0f66f1e21105076d7f739

                                                                                                          SHA256

                                                                                                          bdc52c2227548ce7a696051ea7b3295b74d9bc18643f41ed5395b2c96ce978d2

                                                                                                          SHA512

                                                                                                          b7f26129c04589f482ffced8a0c4f5f7fa61b1ee4fc536246cbc541d39920794c4b7897943c4ba76f04d87b833f739dbdc24d78bd1304c5a7eaccaa88dc0081a

                                                                                                        • \Users\Admin\AppData\Local\Temp\Unicorn-53012.exe

                                                                                                          Filesize

                                                                                                          192KB

                                                                                                          MD5

                                                                                                          ef8f01a42237902e309ba02b246febc2

                                                                                                          SHA1

                                                                                                          097d305384872efafd8c43a54983776424909eb0

                                                                                                          SHA256

                                                                                                          24cb3d0d2d2182e30937336167dde899bd7d7cc0af5145c5b17e8e932e820ef8

                                                                                                          SHA512

                                                                                                          6d71fa1875e9eebc17b0f0fc6e01316c3bcbad7a9957e5c66c6c2541581d64f938ce3311f833653941e63a24f7353cb7a8e0d9d200d37e6503b057a651401537

                                                                                                        • \Users\Admin\AppData\Local\Temp\Unicorn-53692.exe

                                                                                                          Filesize

                                                                                                          192KB

                                                                                                          MD5

                                                                                                          d4df3261b4887a86d2c6bb0b70d32cb2

                                                                                                          SHA1

                                                                                                          c373549025e3be737c105658422f2d4c358101df

                                                                                                          SHA256

                                                                                                          4523c9c407574d1c4e0830a4b937309ae3b1b3e0cad175901ee4c000d5c3becf

                                                                                                          SHA512

                                                                                                          7105b39124f6c090dd314844469379ca4895301ccdf04effafc4acafcfe76ba09c4c025b568f976788ca9918e9ce6b8c0b4534b020ca31c161a82ad7caab8a37

                                                                                                        • \Users\Admin\AppData\Local\Temp\Unicorn-54169.exe

                                                                                                          Filesize

                                                                                                          192KB

                                                                                                          MD5

                                                                                                          7a24b87b3739e2a2e16e922436f282ce

                                                                                                          SHA1

                                                                                                          539a2acc9e80d7a5aaeb1dcf703f0f99640941d5

                                                                                                          SHA256

                                                                                                          43e7a20b390fff6bc65fb00d0f1e142d0540e34936fd2f7c59c5d29d2fe544f9

                                                                                                          SHA512

                                                                                                          5ee3cf4bb79e7f651f474343d3c42b788302de717e9d7e15be0fe915ec1cbf3f8db5e70d175fe8e32c4e31adf13be6e45a1aef8299d2f4e6da9e05bf39abb8f0

                                                                                                        • \Users\Admin\AppData\Local\Temp\Unicorn-58876.exe

                                                                                                          Filesize

                                                                                                          192KB

                                                                                                          MD5

                                                                                                          49cfc34c70356403d3864b16b3e75a12

                                                                                                          SHA1

                                                                                                          f63ca356171a58a8e2c620fa75a6d5b059ee59ca

                                                                                                          SHA256

                                                                                                          e610dc30235f50a4183997a6393181156a4a721d14bf2c578edcb8ce07633c50

                                                                                                          SHA512

                                                                                                          2e6492cd088dfec5182901d646570de0fc7cbf4141d5e38bc0d478d0caeb3b2f8b765066b8f7d032ddd2c01395c16cd0e84e02ee908bce61ec835d38a00c0187