Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    149s
  • max time network
    118s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    05/04/2024, 15:25

General

  • Target

    d783da0fda3f3a8cfcd3c876a4380d78_JaffaCakes118.exe

  • Size

    192KB

  • MD5

    d783da0fda3f3a8cfcd3c876a4380d78

  • SHA1

    cfcc1ce548143a8e2a524fe6c79ad54555eabedc

  • SHA256

    7da17a92bb4aee8a19889963b72c9cfac4e3ff0278cb2b712b96cb734b771f78

  • SHA512

    9e6c5c8ae9d959ac6188b5a53c9317b9650d175a50f53d6bc8a205dccb75748b180c34e59858340e1b4b1d2bc54549aa1f0926740301165924d1fb04c80a9541

  • SSDEEP

    3072:r/v7oPayk0wQnqjP8uMFsJuXfjUwMQef8tYZxEsm5lHtpFG:r/ToYhQn08rFsJd+0Nm5lHtpF

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 64 IoCs
  • Loads dropped DLL 64 IoCs
  • Program crash 2 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\d783da0fda3f3a8cfcd3c876a4380d78_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\d783da0fda3f3a8cfcd3c876a4380d78_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1952
    • C:\Users\Admin\AppData\Local\Temp\Unicorn-41966.exe
      C:\Users\Admin\AppData\Local\Temp\Unicorn-41966.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2936
      • C:\Users\Admin\AppData\Local\Temp\Unicorn-2324.exe
        C:\Users\Admin\AppData\Local\Temp\Unicorn-2324.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2640
        • C:\Users\Admin\AppData\Local\Temp\Unicorn-63559.exe
          C:\Users\Admin\AppData\Local\Temp\Unicorn-63559.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2896
          • C:\Users\Admin\AppData\Local\Temp\Unicorn-48458.exe
            C:\Users\Admin\AppData\Local\Temp\Unicorn-48458.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1252
            • C:\Users\Admin\AppData\Local\Temp\Unicorn-12708.exe
              C:\Users\Admin\AppData\Local\Temp\Unicorn-12708.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              PID:1384
              • C:\Users\Admin\AppData\Local\Temp\Unicorn-30664.exe
                C:\Users\Admin\AppData\Local\Temp\Unicorn-30664.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:3016
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-10373.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-10373.exe
                  8⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:2920
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-25013.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-25013.exe
                    9⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:1424
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-63819.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-63819.exe
                      10⤵
                        PID:1652
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-48038.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-48038.exe
                      9⤵
                        PID:2592
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-37819.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-37819.exe
                      8⤵
                      • Executes dropped EXE
                      • Suspicious use of SetWindowsHookEx
                      PID:828
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-51961.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-51961.exe
                    7⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:2496
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-25205.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-25205.exe
                      8⤵
                      • Executes dropped EXE
                      • Suspicious use of SetWindowsHookEx
                      PID:1100
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-46059.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-46059.exe
                        9⤵
                          PID:2140
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-35302.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-35302.exe
                    6⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:2560
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-15417.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-15417.exe
                      7⤵
                      • Executes dropped EXE
                      • Suspicious use of SetWindowsHookEx
                      PID:2396
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-45049.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-45049.exe
                        8⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:2988
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-45796.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-45796.exe
                      7⤵
                      • Executes dropped EXE
                      • Suspicious use of SetWindowsHookEx
                      PID:1712
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-55660.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-55660.exe
                        8⤵
                          PID:860
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-3395.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-3395.exe
                            9⤵
                              PID:1848
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-50212.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-50212.exe
                      5⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Suspicious use of SetWindowsHookEx
                      PID:1248
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-54291.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-54291.exe
                        6⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:2932
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-6289.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-6289.exe
                          7⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:2664
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-124.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-124.exe
                            8⤵
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            PID:1892
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-13014.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-13014.exe
                          7⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:784
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-60626.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-60626.exe
                            8⤵
                              PID:1944
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-24332.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-24332.exe
                          6⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:2660
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-24328.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-24328.exe
                            7⤵
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            PID:1504
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-7980.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-7980.exe
                      4⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Suspicious use of SetWindowsHookEx
                      • Suspicious use of WriteProcessMemory
                      PID:2596
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-49657.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-49657.exe
                        5⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Suspicious use of SetWindowsHookEx
                        PID:2864
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-14218.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-14218.exe
                          6⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:1304
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-52558.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-52558.exe
                            7⤵
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            PID:2868
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-36881.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-36881.exe
                              8⤵
                              • Executes dropped EXE
                              • Suspicious use of SetWindowsHookEx
                              PID:2148
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-33351.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-33351.exe
                            7⤵
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            PID:1172
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-44700.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-44700.exe
                              8⤵
                                PID:2616
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-46312.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-46312.exe
                                  9⤵
                                    PID:928
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-43925.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-43925.exe
                                      10⤵
                                        PID:1084
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-20440.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-20440.exe
                                6⤵
                                • Executes dropped EXE
                                PID:2872
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-63974.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-63974.exe
                              5⤵
                              • Executes dropped EXE
                              • Suspicious use of SetWindowsHookEx
                              PID:404
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-53134.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-53134.exe
                                6⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                PID:2644
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-8759.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-8759.exe
                                  7⤵
                                    PID:1464
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-25650.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-25650.exe
                                  6⤵
                                    PID:2524
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-35525.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-35525.exe
                              3⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • Suspicious use of SetWindowsHookEx
                              • Suspicious use of WriteProcessMemory
                              PID:2440
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-3533.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-3533.exe
                                4⤵
                                • Executes dropped EXE
                                • Loads dropped DLL
                                • Suspicious use of SetWindowsHookEx
                                • Suspicious use of WriteProcessMemory
                                PID:1592
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-12900.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-12900.exe
                                  5⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Suspicious use of SetWindowsHookEx
                                  PID:2192
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-18303.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-18303.exe
                                    6⤵
                                    • Executes dropped EXE
                                    • Suspicious use of SetWindowsHookEx
                                    PID:2264
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-19694.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-19694.exe
                                      7⤵
                                      • Executes dropped EXE
                                      • Suspicious use of SetWindowsHookEx
                                      PID:1624
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-45516.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-45516.exe
                                        8⤵
                                          PID:1592
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-44700.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-44700.exe
                                            9⤵
                                              PID:2136
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-31860.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-31860.exe
                                                10⤵
                                                  PID:1240
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-62791.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-62791.exe
                                            7⤵
                                              PID:2500
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-35183.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-35183.exe
                                                8⤵
                                                  PID:1228
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-53113.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-53113.exe
                                              6⤵
                                              • Executes dropped EXE
                                              • Suspicious use of SetWindowsHookEx
                                              PID:2556
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-29372.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-29372.exe
                                                7⤵
                                                  PID:2948
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-47830.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-47830.exe
                                              5⤵
                                              • Executes dropped EXE
                                              • Suspicious use of SetWindowsHookEx
                                              PID:2828
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-24354.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-24354.exe
                                                6⤵
                                                • Executes dropped EXE
                                                • Suspicious use of SetWindowsHookEx
                                                PID:1572
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-62236.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-62236.exe
                                                  7⤵
                                                    PID:2680
                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-46312.exe
                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-46312.exe
                                                      8⤵
                                                        PID:2196
                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-51162.exe
                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-51162.exe
                                                    6⤵
                                                      PID:1672
                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-46312.exe
                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-46312.exe
                                                        7⤵
                                                          PID:1896
                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-38151.exe
                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-38151.exe
                                                    4⤵
                                                    • Executes dropped EXE
                                                    • Loads dropped DLL
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:1848
                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-51359.exe
                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-51359.exe
                                                      5⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:1748
                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-64234.exe
                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-64234.exe
                                                        6⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:1912
                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-5490.exe
                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-5490.exe
                                                          7⤵
                                                            PID:2936
                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-7865.exe
                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-7865.exe
                                                              8⤵
                                                                PID:2072
                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-9508.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-9508.exe
                                                                  9⤵
                                                                    PID:1372
                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-32308.exe
                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-32308.exe
                                                            5⤵
                                                            • Executes dropped EXE
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:1360
                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-17935.exe
                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-17935.exe
                                                              6⤵
                                                                PID:2464
                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-45207.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-45207.exe
                                                                  7⤵
                                                                    PID:1128
                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 2464 -s 236
                                                                    7⤵
                                                                    • Program crash
                                                                    PID:1752
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 1360 -s 216
                                                                  6⤵
                                                                  • Program crash
                                                                  PID:2876
                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-35743.exe
                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-35743.exe
                                                          2⤵
                                                          • Executes dropped EXE
                                                          • Loads dropped DLL
                                                          • Suspicious use of SetWindowsHookEx
                                                          • Suspicious use of WriteProcessMemory
                                                          PID:2672
                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-55391.exe
                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-55391.exe
                                                            3⤵
                                                            • Executes dropped EXE
                                                            • Loads dropped DLL
                                                            • Suspicious use of SetWindowsHookEx
                                                            • Suspicious use of WriteProcessMemory
                                                            PID:2360
                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-60902.exe
                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-60902.exe
                                                              4⤵
                                                              • Executes dropped EXE
                                                              • Loads dropped DLL
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:1764
                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-53933.exe
                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-53933.exe
                                                                5⤵
                                                                • Executes dropped EXE
                                                                • Loads dropped DLL
                                                                • Suspicious use of SetWindowsHookEx
                                                                PID:488
                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-26663.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-26663.exe
                                                                  6⤵
                                                                  • Executes dropped EXE
                                                                  • Suspicious use of SetWindowsHookEx
                                                                  PID:896
                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-20462.exe
                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-20462.exe
                                                                    7⤵
                                                                    • Executes dropped EXE
                                                                    • Suspicious use of SetWindowsHookEx
                                                                    PID:2980
                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-54260.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-54260.exe
                                                                      8⤵
                                                                        PID:2552
                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-51859.exe
                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-51859.exe
                                                                          9⤵
                                                                            PID:1956
                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-3395.exe
                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-3395.exe
                                                                              10⤵
                                                                                PID:1424
                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-5230.exe
                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-5230.exe
                                                                          7⤵
                                                                            PID:3008
                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-51135.exe
                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-51135.exe
                                                                              8⤵
                                                                                PID:1912
                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-49797.exe
                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-49797.exe
                                                                            6⤵
                                                                            • Executes dropped EXE
                                                                            • Suspicious use of SetWindowsHookEx
                                                                            PID:2024
                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-58583.exe
                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-58583.exe
                                                                              7⤵
                                                                                PID:2588
                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-47254.exe
                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-47254.exe
                                                                            5⤵
                                                                            • Executes dropped EXE
                                                                            • Suspicious use of SetWindowsHookEx
                                                                            PID:548
                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-53326.exe
                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-53326.exe
                                                                              6⤵
                                                                              • Executes dropped EXE
                                                                              • Suspicious use of SetWindowsHookEx
                                                                              PID:2320
                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-37014.exe
                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-37014.exe
                                                                                7⤵
                                                                                  PID:1020
                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-60268.exe
                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-60268.exe
                                                                                    8⤵
                                                                                      PID:1564
                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-6439.exe
                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-6439.exe
                                                                              4⤵
                                                                              • Executes dropped EXE
                                                                              • Loads dropped DLL
                                                                              • Suspicious use of SetWindowsHookEx
                                                                              PID:2804
                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-2158.exe
                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-2158.exe
                                                                                5⤵
                                                                                • Executes dropped EXE
                                                                                • Suspicious use of SetWindowsHookEx
                                                                                PID:1908
                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-35646.exe
                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-35646.exe
                                                                                  6⤵
                                                                                  • Executes dropped EXE
                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                  PID:2728
                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-32496.exe
                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-32496.exe
                                                                                    7⤵
                                                                                    • Executes dropped EXE
                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                    PID:2008
                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-47950.exe
                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-47950.exe
                                                                                      8⤵
                                                                                        PID:384
                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-59697.exe
                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-59697.exe
                                                                                          9⤵
                                                                                            PID:1612
                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-63497.exe
                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-63497.exe
                                                                                        7⤵
                                                                                          PID:1264
                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-34394.exe
                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-34394.exe
                                                                                        6⤵
                                                                                          PID:1544
                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-52537.exe
                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-52537.exe
                                                                                        5⤵
                                                                                        • Executes dropped EXE
                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                        PID:2716
                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-8183.exe
                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-8183.exe
                                                                                          6⤵
                                                                                            PID:908
                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-32868.exe
                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-32868.exe
                                                                                      3⤵
                                                                                      • Executes dropped EXE
                                                                                      • Loads dropped DLL
                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                      PID:1780
                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-53933.exe
                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-53933.exe
                                                                                        4⤵
                                                                                        • Executes dropped EXE
                                                                                        • Loads dropped DLL
                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                        PID:688
                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-38915.exe
                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-38915.exe
                                                                                          5⤵
                                                                                          • Executes dropped EXE
                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                          PID:792
                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-53134.exe
                                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-53134.exe
                                                                                            6⤵
                                                                                            • Executes dropped EXE
                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                            PID:2260
                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-5490.exe
                                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-5490.exe
                                                                                              7⤵
                                                                                                PID:2408
                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-51162.exe
                                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-51162.exe
                                                                                              6⤵
                                                                                                PID:2648
                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-61857.exe
                                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-61857.exe
                                                                                              5⤵
                                                                                              • Executes dropped EXE
                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                              PID:2796
                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-63819.exe
                                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-63819.exe
                                                                                                6⤵
                                                                                                  PID:2744
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-14002.exe
                                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-14002.exe
                                                                                                    7⤵
                                                                                                      PID:2656
                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-2713.exe
                                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-2713.exe
                                                                                                4⤵
                                                                                                • Executes dropped EXE
                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                PID:2020
                                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-23394.exe
                                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-23394.exe
                                                                                                  5⤵
                                                                                                  • Executes dropped EXE
                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                  PID:1260
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-62236.exe
                                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-62236.exe
                                                                                                    6⤵
                                                                                                      PID:2900
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-51162.exe
                                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-51162.exe
                                                                                                    5⤵
                                                                                                      PID:2296
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-44700.exe
                                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-44700.exe
                                                                                                        6⤵
                                                                                                          PID:2708

                                                                                              Network

                                                                                              MITRE ATT&CK Matrix

                                                                                              Replay Monitor

                                                                                              Loading Replay Monitor...

                                                                                              Downloads

                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-32868.exe

                                                                                                Filesize

                                                                                                192KB

                                                                                                MD5

                                                                                                886ae0f5efc5e165b6ace51b8d453f3a

                                                                                                SHA1

                                                                                                7ec98ed8cd6c4f3214fa30b84c9fccb75e0ad645

                                                                                                SHA256

                                                                                                a8be74531bc21b2390cba467bf9b456e66cc318f120178de55a8ebe2e5dd63ca

                                                                                                SHA512

                                                                                                872675c0c35effa6553e2f4d1621d6beae87fb27a9f4597243efa362bf682eb1318b95bf5b71e0b1111ccb041297f933a69700cefa1c05e13f4cc8fbd84cea39

                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-35525.exe

                                                                                                Filesize

                                                                                                192KB

                                                                                                MD5

                                                                                                9fd211f26fd9d752060bba24868fcdf9

                                                                                                SHA1

                                                                                                16baf5ed067c105ad536b73cfe18e57e8a15ed60

                                                                                                SHA256

                                                                                                672e057f0510be7378427a3775b176ff1177cd00558b86834146c10c0758543f

                                                                                                SHA512

                                                                                                08cec966065df3fe142b686ddde8bdacb923aaa2fd9a34441f73ea55fa368115ee9409b7e6b2e7c54d544455ab2b956782cda2e4225a241a8de3f62d7a4626a8

                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-48458.exe

                                                                                                Filesize

                                                                                                192KB

                                                                                                MD5

                                                                                                5658a3b00e1d1d273c63c90e2d7bd93d

                                                                                                SHA1

                                                                                                6cf94e9308a5291a06027e88b8b59571df123c0d

                                                                                                SHA256

                                                                                                11793b963c961ae8a681e51be9cf68aa5ac8dfbf92d85f922ef7128ce2d9ee26

                                                                                                SHA512

                                                                                                bc37d31c122c9df55c39bc9d8262ddc46575b07fceeca1a670e8ac28bd0bdfda826725a4120b7def5df36a817b6f8feacf7dd94cf0a25403e8f000627092ad9a

                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-49657.exe

                                                                                                Filesize

                                                                                                192KB

                                                                                                MD5

                                                                                                30a6e9e48dfdd60d1edc819106835c3b

                                                                                                SHA1

                                                                                                e70778875becdfba1f5767b3f0f4a70fbcb3fa5c

                                                                                                SHA256

                                                                                                42ad6a058394f37fb741b8b45f4971cd1cfa70aa18754933a1454ddca618f302

                                                                                                SHA512

                                                                                                280b9a898aa6632d49f15e94768fd2d5b6f00b5457e71cc4ad6af5d94b6a77a9a9af228c05f44017b2c0872a8d43eddf32234094bd187d083d4eaeb7cc8f32e1

                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-53933.exe

                                                                                                Filesize

                                                                                                192KB

                                                                                                MD5

                                                                                                1b53fe274d8240db20936f438d369490

                                                                                                SHA1

                                                                                                393676611e6d21d48bbf18be25ec8cbe87066b2e

                                                                                                SHA256

                                                                                                3091265d98254497105c24bd140a39404c89960a9ce65c52dfa3baaec222f528

                                                                                                SHA512

                                                                                                1be1d1692004c3909c34cd5689fb1057636ecf66f3e5e5cd3027aefb5a016885ba0a251ec8f103c099667c4cd1e73d44b246f63b746dbd215c32f998c8905bdf

                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-6289.exe

                                                                                                Filesize

                                                                                                192KB

                                                                                                MD5

                                                                                                ccc96976efbadc7d873d55408223671b

                                                                                                SHA1

                                                                                                27c00a63ddfde543e641cf68adea9377292fc926

                                                                                                SHA256

                                                                                                ebbdbd214b10b351292e34b8d95d056281fec77730d78b1d99851f7c33283fdd

                                                                                                SHA512

                                                                                                2acd7d39338525d4795c3dc6440f032f0df3b36ce05b9c8ccc6d16be01133c518c15d901db6dec531e8efaa398b5198290fd6b7ada4a4d6ac784a5a2b265ad29

                                                                                              • \Users\Admin\AppData\Local\Temp\Unicorn-12708.exe

                                                                                                Filesize

                                                                                                192KB

                                                                                                MD5

                                                                                                ade0abbbc26e1627a06d4ef0c3780450

                                                                                                SHA1

                                                                                                00240cc53a2f1646b3139677a3ca8f345f0c88c2

                                                                                                SHA256

                                                                                                833c1806fb6c84f27845d02384bbfbe9dc5f2265bb46bfcfad974c38678e71ff

                                                                                                SHA512

                                                                                                edd556f7a4d4b7873af9320cdae14c52e471d3d9fd7a985e0ff761e530e6ba3d0bef59bb80a468620e054005dbd6e7deeb0a5c78109d9175215f071d2d12c638

                                                                                              • \Users\Admin\AppData\Local\Temp\Unicorn-12900.exe

                                                                                                Filesize

                                                                                                192KB

                                                                                                MD5

                                                                                                814afa341c633157f6c7ae6f34c3a046

                                                                                                SHA1

                                                                                                166c376d49b259ce791b14d7ce6c2523f23253a2

                                                                                                SHA256

                                                                                                b973170b2582db80c116dfa8da0fb1e62b88766a88317dd40de1eb83e6770598

                                                                                                SHA512

                                                                                                a78ae91816df6601dfe234f22a5b4d0a4836e046ae728704edb7f3f785456c328bd1291f1cd2758d7ea01f37c0148bfdc6b14cb3395d44746876cf926035b171

                                                                                              • \Users\Admin\AppData\Local\Temp\Unicorn-2324.exe

                                                                                                Filesize

                                                                                                192KB

                                                                                                MD5

                                                                                                54fb19e9895f34f8df5211246f1f779f

                                                                                                SHA1

                                                                                                e2646dcaec018400504604f9466555968094ff45

                                                                                                SHA256

                                                                                                d8771129008facbb40718f7ab90abe4441792e988f4cbf09977b5efc4945ac90

                                                                                                SHA512

                                                                                                b4ec43cd6ab3facb54b6afb0a239a1aa7c7059b11e6ad48b35394641ba589e5711d49957f019cf288ad05b5f340d255023c7bd5e162adf1d075515f6ace2c768

                                                                                              • \Users\Admin\AppData\Local\Temp\Unicorn-3533.exe

                                                                                                Filesize

                                                                                                192KB

                                                                                                MD5

                                                                                                533420604b5cdad9da98d071debafdcf

                                                                                                SHA1

                                                                                                4fa3d2056bdec326f90ce66871b0ecefbe1626a6

                                                                                                SHA256

                                                                                                0ceb54249d8eb65c6f4140360a2e49509f5a3481d145c7f6e8b6d482067ed638

                                                                                                SHA512

                                                                                                ce501dad8261b1a54375ef463a9e3547d3f46db44bd14f3b4a4a4b78c7165693cb92ac1d7f65f5b0945cdf4da55caaa90c55d3f7b5af7aa8625da40f058041f5

                                                                                              • \Users\Admin\AppData\Local\Temp\Unicorn-35743.exe

                                                                                                Filesize

                                                                                                192KB

                                                                                                MD5

                                                                                                097cf973399b3a1ed8abcb6c48f65ff8

                                                                                                SHA1

                                                                                                0778b6b6163724b539cb32dcc519d97c4fcac6c3

                                                                                                SHA256

                                                                                                cbc51bec1908ee3f4920661ca89f5dee03b3cf522ef1a8d9799b2fb3ac2d4367

                                                                                                SHA512

                                                                                                5cb4b22878638b7a586693844c342b7fb1866da885e15eb2a730c30a260a26384e8345ca0407bddedfb2a83e1812541cb596cfa16d05131b9fe8d1b2843cc333

                                                                                              • \Users\Admin\AppData\Local\Temp\Unicorn-38151.exe

                                                                                                Filesize

                                                                                                192KB

                                                                                                MD5

                                                                                                2afeaa4fce25023fa80223808c73623c

                                                                                                SHA1

                                                                                                09090a64dff9785fad4e5aa0d7e94d5aaf0818be

                                                                                                SHA256

                                                                                                602c7006e1251519faa89c26df985e0fdf041b83b75586567aa4317e0e93560a

                                                                                                SHA512

                                                                                                b50a68ca0661ebba9b4e185ac0a877a8b3146020e5f5e819076b00148621e05e4737fc53f26254a03201f274bc1ef5be70639b769067c07f6df8a42a821213b3

                                                                                              • \Users\Admin\AppData\Local\Temp\Unicorn-41966.exe

                                                                                                Filesize

                                                                                                192KB

                                                                                                MD5

                                                                                                36fbb5137c1430096797b021c7559f13

                                                                                                SHA1

                                                                                                14023cbc65065579e44a62466ce8c35a65986e92

                                                                                                SHA256

                                                                                                a5cde7c3cc80c5b34847ce3dbf862cf08ae53226f707bb3e55cdc68ad7f61170

                                                                                                SHA512

                                                                                                52c24875db1f6035ee9c287479f55f6bdc575672dbd3f7ca30ebbfd7be73456ca7d9dd69b21f9c4e153ea6c2e23a08b1190535bb8854197d5c26a578ec5071ff

                                                                                              • \Users\Admin\AppData\Local\Temp\Unicorn-50212.exe

                                                                                                Filesize

                                                                                                192KB

                                                                                                MD5

                                                                                                1feb674f389e628afd6d7ee7307b8b08

                                                                                                SHA1

                                                                                                bd78118a3501068da47bfe5240dcacd79d646893

                                                                                                SHA256

                                                                                                55592da763021fb58fca5d841aa54c00cc18265ae9ff67153fc362c874ed2dc8

                                                                                                SHA512

                                                                                                3e0019f7a6ddd90dba61a04cbb1504f7509a83dbb11f64e180158fc40242311cbf315ec4c0217da85e7090a6b3a024a3cce8f301f9629fd81b8058f2242774a5

                                                                                              • \Users\Admin\AppData\Local\Temp\Unicorn-55391.exe

                                                                                                Filesize

                                                                                                192KB

                                                                                                MD5

                                                                                                6ee7be585ed347e5e99332ddae1bbc5f

                                                                                                SHA1

                                                                                                ba9bfe80a90106835d09a1edf8232bcca94ab288

                                                                                                SHA256

                                                                                                046ce3389c7010db3e9dbb9cdd48e455db98aecda1c364208b0f6d3c29133e4e

                                                                                                SHA512

                                                                                                1656c78b7d4364eb45e638a4e8ba5924dfdc429145aa6c3b19b16601038cca86d52248ffe8744437f41b485344ca31a61c31f51f487daa52f9df1bf43c12d0b4

                                                                                              • \Users\Admin\AppData\Local\Temp\Unicorn-60902.exe

                                                                                                Filesize

                                                                                                192KB

                                                                                                MD5

                                                                                                c9a0dc0f5e2fc0ed2e69815e11bf79a0

                                                                                                SHA1

                                                                                                d8b4af6066c85ee6bb9499d9131f40e3063ca782

                                                                                                SHA256

                                                                                                1a73d301f6892b03b6e375ce75d9bbd921a5dbdf39d8875ab7f088dcb2d5f5f1

                                                                                                SHA512

                                                                                                13c0e11590eb58274a042fe331c4092c67b23a9e370aee701d03bc5d1ee5adec33de7e5f354bf5a9afd6fcac73ec711e1f05aff6b7381a97d25869a3b3b2260c

                                                                                              • \Users\Admin\AppData\Local\Temp\Unicorn-63559.exe

                                                                                                Filesize

                                                                                                192KB

                                                                                                MD5

                                                                                                166cb1d432d7abdbd2edbe54fe69c10d

                                                                                                SHA1

                                                                                                fc22b3e0970de366019fbc03c2afdc0347defcd0

                                                                                                SHA256

                                                                                                5a8dcab1ba0bfaec5b481841f3fd2e063dfb2883aa44f2d61643e8b08594121c

                                                                                                SHA512

                                                                                                98466a394282993d48055bac9ed35da0b0a0749662b672f311dcc997e8f8ec082dc2344a58bf7346557f2889cb69addc26f373d0db70b089678356334bf70494

                                                                                              • \Users\Admin\AppData\Local\Temp\Unicorn-7980.exe

                                                                                                Filesize

                                                                                                192KB

                                                                                                MD5

                                                                                                69c5d2eb40266af6615a15bf15802ae6

                                                                                                SHA1

                                                                                                6a6fd9d5558979f4e57b50ce06fcca14401409c9

                                                                                                SHA256

                                                                                                5ef61963599dfbbcbd118c4923b580387e61ac0fded786b573ced2ccc7e9105b

                                                                                                SHA512

                                                                                                0975223fba87f2a9096d0b052c0c56683107b332abd87c330b644e4154df9b5bed36052a17aa035a76c67df3148c36d78f3a66ff2b0fc126ef07da1139eaa986