Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    93s
  • max time network
    125s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    08/04/2024, 15:34

General

  • Target

    e7cc4a29fa823bf57ee5f99e43b9d986_JaffaCakes118.exe

  • Size

    192KB

  • MD5

    e7cc4a29fa823bf57ee5f99e43b9d986

  • SHA1

    00d55acce61a1052cec7b4f2d3111cc7d128f985

  • SHA256

    df76c72f32bf0e7425c60ef338865e2d80bb2b9da20cc5ff0c08885cdf512cef

  • SHA512

    57bfa7004d879d18d152b579261f9b7af1758d1bbfeb03a27b60d88453868d7a4073376d8cebd273bf12a512004f2391c92566e23c6ff86d31a47980deb01360

  • SSDEEP

    3072:Yih7oP8Q+ywQnOjE8GpiBJOLrhgwMuAfohtYzzE/G5lHtpFP:YiBoe3Qnf8qiBJ/8uJF5lHtpF

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 64 IoCs
  • Loads dropped DLL 64 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\e7cc4a29fa823bf57ee5f99e43b9d986_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\e7cc4a29fa823bf57ee5f99e43b9d986_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1908
    • C:\Users\Admin\AppData\Local\Temp\Unicorn-30491.exe
      C:\Users\Admin\AppData\Local\Temp\Unicorn-30491.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2012
      • C:\Users\Admin\AppData\Local\Temp\Unicorn-5576.exe
        C:\Users\Admin\AppData\Local\Temp\Unicorn-5576.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2976
        • C:\Users\Admin\AppData\Local\Temp\Unicorn-33802.exe
          C:\Users\Admin\AppData\Local\Temp\Unicorn-33802.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2544
          • C:\Users\Admin\AppData\Local\Temp\Unicorn-50387.exe
            C:\Users\Admin\AppData\Local\Temp\Unicorn-50387.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2880
            • C:\Users\Admin\AppData\Local\Temp\Unicorn-22121.exe
              C:\Users\Admin\AppData\Local\Temp\Unicorn-22121.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              PID:1968
              • C:\Users\Admin\AppData\Local\Temp\Unicorn-4881.exe
                C:\Users\Admin\AppData\Local\Temp\Unicorn-4881.exe
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetWindowsHookEx
                PID:1828
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-40543.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-40543.exe
                  8⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:1608
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-7123.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-7123.exe
                    9⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:1316
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-38483.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-38483.exe
                      10⤵
                      • Executes dropped EXE
                      • Suspicious use of SetWindowsHookEx
                      PID:1444
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-35738.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-35738.exe
                        11⤵
                          PID:1744
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-9538.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-9538.exe
                            12⤵
                              PID:2228
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-6365.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-6365.exe
                        9⤵
                          PID:2552
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-13791.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-13791.exe
                        8⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:2496
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-8233.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-8233.exe
                      7⤵
                      • Executes dropped EXE
                      • Suspicious use of SetWindowsHookEx
                      PID:2788
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-53693.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-53693.exe
                        8⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:2616
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-13220.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-13220.exe
                    6⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of SetWindowsHookEx
                    PID:440
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-7678.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-7678.exe
                      7⤵
                      • Executes dropped EXE
                      • Suspicious use of SetWindowsHookEx
                      PID:2000
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-61861.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-61861.exe
                        8⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:1368
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-1363.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-1363.exe
                          9⤵
                            PID:856
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-22343.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-22343.exe
                        7⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:2096
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-30336.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-30336.exe
                          8⤵
                            PID:584
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-43280.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-43280.exe
                              9⤵
                                PID:1328
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-9847.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-9847.exe
                        5⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Suspicious use of SetWindowsHookEx
                        PID:584
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-12473.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-12473.exe
                          6⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:328
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-41612.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-41612.exe
                            7⤵
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            PID:2576
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-257.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-257.exe
                          6⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:2632
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-16418.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-16418.exe
                            7⤵
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            PID:792
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-58156.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-58156.exe
                              8⤵
                                PID:1972
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-58435.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-58435.exe
                                  9⤵
                                    PID:764
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-63947.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-63947.exe
                                7⤵
                                  PID:476
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-22144.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-22144.exe
                                    8⤵
                                      PID:2188
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-59110.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-59110.exe
                              4⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • Suspicious use of SetWindowsHookEx
                              • Suspicious use of WriteProcessMemory
                              PID:1648
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-41965.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-41965.exe
                                5⤵
                                • Executes dropped EXE
                                PID:2876
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-5576.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-5576.exe
                            3⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Suspicious use of SetWindowsHookEx
                            • Suspicious use of WriteProcessMemory
                            PID:2708
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-9546.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-9546.exe
                              4⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • Suspicious use of SetWindowsHookEx
                              • Suspicious use of WriteProcessMemory
                              PID:2736
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-1124.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-1124.exe
                                5⤵
                                • Executes dropped EXE
                                • Loads dropped DLL
                                • Suspicious use of SetWindowsHookEx
                                PID:1516
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-21410.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-21410.exe
                                  6⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetWindowsHookEx
                                  PID:1884
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-30128.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-30128.exe
                                    7⤵
                                    • Executes dropped EXE
                                    • Suspicious use of SetWindowsHookEx
                                    PID:2492
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-56874.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-56874.exe
                                      8⤵
                                      • Executes dropped EXE
                                      • Suspicious use of SetWindowsHookEx
                                      PID:892
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-9339.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-9339.exe
                                        9⤵
                                          PID:1588
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-19741.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-19741.exe
                                            10⤵
                                              PID:2612
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-55011.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-55011.exe
                                          8⤵
                                            PID:2676
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-52961.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-52961.exe
                                          7⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetWindowsHookEx
                                          PID:980
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-31798.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-31798.exe
                                        6⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetWindowsHookEx
                                        PID:2040
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-51814.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-51814.exe
                                      5⤵
                                      • Executes dropped EXE
                                      • Suspicious use of SetWindowsHookEx
                                      PID:2944
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-34752.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-34752.exe
                                        6⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetWindowsHookEx
                                        PID:1940
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-27383.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-27383.exe
                                          7⤵
                                          • Suspicious use of SetWindowsHookEx
                                          PID:1680
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-30459.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-30459.exe
                                    4⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • Suspicious use of SetWindowsHookEx
                                    PID:2268
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-5649.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-5649.exe
                                      5⤵
                                      • Executes dropped EXE
                                      • Suspicious use of SetWindowsHookEx
                                      PID:1088
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-21960.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-21960.exe
                                        6⤵
                                        • Executes dropped EXE
                                        PID:2436
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-6391.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-6391.exe
                                        6⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetWindowsHookEx
                                        PID:2068
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-47611.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-47611.exe
                                          7⤵
                                            PID:2428
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-39660.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-39660.exe
                                              8⤵
                                                PID:1668
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-15647.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-15647.exe
                                                  9⤵
                                                    PID:1464
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-51295.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-51295.exe
                                            5⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetWindowsHookEx
                                            PID:2468
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-34911.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-34911.exe
                                      2⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Suspicious use of SetWindowsHookEx
                                      • Suspicious use of WriteProcessMemory
                                      PID:2648
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-937.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-937.exe
                                        3⤵
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        • Suspicious use of SetWindowsHookEx
                                        • Suspicious use of WriteProcessMemory
                                        PID:2600
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-47372.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-47372.exe
                                          4⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          • Suspicious use of SetWindowsHookEx
                                          PID:2780
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-50325.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-50325.exe
                                            5⤵
                                            • Executes dropped EXE
                                            • Loads dropped DLL
                                            • Suspicious use of SetWindowsHookEx
                                            PID:2256
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-43283.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-43283.exe
                                              6⤵
                                              • Executes dropped EXE
                                              • Suspicious use of SetWindowsHookEx
                                              PID:1056
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-10247.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-10247.exe
                                                7⤵
                                                • Executes dropped EXE
                                                • Suspicious use of SetWindowsHookEx
                                                PID:2712
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-19755.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-19755.exe
                                                  8⤵
                                                    PID:2732
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-10802.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-10802.exe
                                                6⤵
                                                • Executes dropped EXE
                                                • Suspicious use of SetWindowsHookEx
                                                PID:1888
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-13101.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-13101.exe
                                                  7⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:1760
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-6194.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-6194.exe
                                                  7⤵
                                                    PID:1136
                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-22398.exe
                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-22398.exe
                                                      8⤵
                                                        PID:1208
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-6889.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-6889.exe
                                                  5⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:976
                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-60024.exe
                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-60024.exe
                                                    6⤵
                                                    • Executes dropped EXE
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:2404
                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-48898.exe
                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-48898.exe
                                                      7⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:904
                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-10299.exe
                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-10299.exe
                                                        8⤵
                                                          PID:1096
                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-26998.exe
                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-26998.exe
                                                        7⤵
                                                          PID:1956
                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-17932.exe
                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-17932.exe
                                                        6⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:1188
                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-60200.exe
                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-60200.exe
                                                    4⤵
                                                    • Executes dropped EXE
                                                    • Loads dropped DLL
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:2524
                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-46298.exe
                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-46298.exe
                                                      5⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:2344
                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-26776.exe
                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-26776.exe
                                                        6⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:1636
                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-18063.exe
                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-18063.exe
                                                          7⤵
                                                            PID:2700
                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-37409.exe
                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-37409.exe
                                                              8⤵
                                                                PID:2272
                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-15872.exe
                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-15872.exe
                                                              7⤵
                                                                PID:1700
                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-40734.exe
                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-40734.exe
                                                            5⤵
                                                            • Executes dropped EXE
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:1628
                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-48535.exe
                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-48535.exe
                                                              6⤵
                                                                PID:3048
                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-11170.exe
                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-11170.exe
                                                          3⤵
                                                          • Executes dropped EXE
                                                          • Loads dropped DLL
                                                          • Suspicious use of SetWindowsHookEx
                                                          • Suspicious use of WriteProcessMemory
                                                          PID:1588
                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-13568.exe
                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-13568.exe
                                                            4⤵
                                                            • Executes dropped EXE
                                                            • Loads dropped DLL
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:1116
                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-30154.exe
                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-30154.exe
                                                              5⤵
                                                              • Executes dropped EXE
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:3008
                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-21083.exe
                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-21083.exe
                                                                6⤵
                                                                • Executes dropped EXE
                                                                • Suspicious use of SetWindowsHookEx
                                                                PID:2432
                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-65042.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-65042.exe
                                                                  7⤵
                                                                  • Executes dropped EXE
                                                                  • Suspicious use of SetWindowsHookEx
                                                                  PID:2168
                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-25332.exe
                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-25332.exe
                                                                6⤵
                                                                • Executes dropped EXE
                                                                • Suspicious use of SetWindowsHookEx
                                                                PID:1800
                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-17543.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-17543.exe
                                                                  7⤵
                                                                    PID:832
                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-48760.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-48760.exe
                                                                      8⤵
                                                                        PID:1632
                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-55763.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-55763.exe
                                                                  5⤵
                                                                  • Executes dropped EXE
                                                                  • Suspicious use of SetWindowsHookEx
                                                                  PID:2800
                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-63890.exe
                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-63890.exe
                                                                    6⤵
                                                                    • Executes dropped EXE
                                                                    • Suspicious use of SetWindowsHookEx
                                                                    PID:1576
                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-62240.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-62240.exe
                                                                      7⤵
                                                                        PID:1548
                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-47045.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-47045.exe
                                                                  4⤵
                                                                  • Executes dropped EXE
                                                                  • Suspicious use of SetWindowsHookEx
                                                                  PID:920
                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-46848.exe
                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-46848.exe
                                                                    5⤵
                                                                    • Executes dropped EXE
                                                                    • Suspicious use of SetWindowsHookEx
                                                                    PID:2776
                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-14554.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-14554.exe
                                                                      6⤵
                                                                        PID:2440

                                                            Network

                                                            MITRE ATT&CK Matrix

                                                            Replay Monitor

                                                            Loading Replay Monitor...

                                                            Downloads

                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-11170.exe

                                                              Filesize

                                                              192KB

                                                              MD5

                                                              ab73808a28983e5f442db86225310e88

                                                              SHA1

                                                              3428a06d5f44c724973d983bd2974ceb7f323484

                                                              SHA256

                                                              62ed203f35508fe0d16e2acd7f498bdd380d67cf726814d7c870789c20576294

                                                              SHA512

                                                              8646c3c3eb2ee28747940dcb467afe3dd33c727b4f6f848dab86df9c939c4c6fc8d5913d6c6216cb4e5489d4326335a8e75f2c94ef665a4e4e046f5a0ae28369

                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-21960.exe

                                                              Filesize

                                                              192KB

                                                              MD5

                                                              bbc1b746064865642469f8efea6c2a2c

                                                              SHA1

                                                              7ffd55752af5689d85af7c453d741b56250c7fee

                                                              SHA256

                                                              56fcccc6b6cfc6adb7207e2e92a586aa58b0c94b5e857446e791dff7bab4cd72

                                                              SHA512

                                                              0a9cf0beb88ed74cec109f7ed930944816d41b089dd530c437b26e8068aec432e7287115a58ca7f589e4f8e2edcff42cc21d9449e708491bd8c79a4c3107f8fa

                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-30128.exe

                                                              Filesize

                                                              192KB

                                                              MD5

                                                              9c9c66ede78d8cf4946d865991a59249

                                                              SHA1

                                                              7a5087c4d07c03eab223c9e58b9fb181d6feb4d7

                                                              SHA256

                                                              90d6cc3ab80d50abefb208a8b76d2588db0394a8ca0048f406f6882cf8217d32

                                                              SHA512

                                                              4712e958e4de02cb37d87b6501240f1b66751c6502355fca2025c6c9a16ec05d89e90f3fb3f3fcc3e1eaa9b958b20298d7b4ca356a80e45ac3d4e16cbe7b3e02

                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-5649.exe

                                                              Filesize

                                                              192KB

                                                              MD5

                                                              784e57d40c14b2a9a045d8debb0e7bb8

                                                              SHA1

                                                              382130bb1db965ad70608efc04af12249c0c58d4

                                                              SHA256

                                                              c7392698ffd7dee1975ee8c55d0e5c5717d2d4798e51cb48dbec616960dbdf35

                                                              SHA512

                                                              f6380f2d8e945a7d48d17bd0eb02f3033966f412ca5fb8402dfc4d71ec572eeec1dacb4a837431e17805c7d38fe658a9a5cbf71294fca12eecac09ba95217ee5

                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-1124.exe

                                                              Filesize

                                                              192KB

                                                              MD5

                                                              106669f1c235cf899a4e920961ec2b60

                                                              SHA1

                                                              f15367318dd7854d83f846403983516253ffe641

                                                              SHA256

                                                              a206ce1b46f91d348b00686c14e60f460cf7af82179113af08737780cabb8b4d

                                                              SHA512

                                                              2874398d096b668f317441b985044e02205b58cb8569acc658db4253ad3bdc373739b7306df4a9d6d2415a6623003263eaed431fa648ca5629300f082192cc56

                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-13568.exe

                                                              Filesize

                                                              192KB

                                                              MD5

                                                              4e8bf8317c8732ceedbdb4c96183374c

                                                              SHA1

                                                              6139c010073fdf2bc5f540113c4ad28572a58bd5

                                                              SHA256

                                                              7af82d6aa650cba7a6b4ec6b4cb3ed9b8c9aa06da59ffd693b85cb0df44f2f86

                                                              SHA512

                                                              01452b10c3d81726c72ebf95675437ae4e633bea8604418d288f7a8a6d19723ef580bb9d972c22500e21525f531482f67cf93aef6dea0d883c7ae0d38baf9b2b

                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-22121.exe

                                                              Filesize

                                                              192KB

                                                              MD5

                                                              1d287ed8e1e1f5b4ddbf1391e7a75167

                                                              SHA1

                                                              20733833e7c31adc1aef955194244c43c85bc1c2

                                                              SHA256

                                                              8b143d47affc23d4252fdca69106ebe272d255a0d9563169c9a7e82b0d954d35

                                                              SHA512

                                                              4173e45196f12969f60c699c060c2dc8965283aa88f20a0b58562764564abec50641fcd9023114bedcaebb4ebe417d224d7701295466557894e59a3e4c0db591

                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-30459.exe

                                                              Filesize

                                                              192KB

                                                              MD5

                                                              e96cadff5cbace8a85f04c9f4b63e5ce

                                                              SHA1

                                                              3f04e68dbbf3735a11e3d011b0a195fd200a4970

                                                              SHA256

                                                              b0d9818b9c6d5528831cd5da0aaf125060265faebedf697a425d2e09c3a97c59

                                                              SHA512

                                                              91903e2fa70dcaf992382e7fc97163d8d7402e44eaba66636dd5262385e1619559b379a16a055aa2114adb2f6768701374acbd9429b64a9fd362ef69a7a0ab94

                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-30491.exe

                                                              Filesize

                                                              192KB

                                                              MD5

                                                              1f01e6a37d731e332b639452470a0b9d

                                                              SHA1

                                                              3589c053ae2dacfc706422883e228850fac6850b

                                                              SHA256

                                                              5b14484933fb066883c49d0306f869ccd9e8b7075cdd5b3a6f16ba43288903e3

                                                              SHA512

                                                              eb22cc3dc2566abf05209ffb5ce2e58d1dd45d362bc7b063baeee4a5cf0e9a8e8b9d403844ee845bc6d565ecab68c9bfa901069f640a833f215e5f78e900fdd0

                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-33802.exe

                                                              Filesize

                                                              192KB

                                                              MD5

                                                              f79c8be755b362130deb23db4d808612

                                                              SHA1

                                                              e6ce01e7b59c63f42c1a56248deae58416ceb5c1

                                                              SHA256

                                                              637e19f1bbc8fe79cfd916baa8b779130eb56c7fd3edaba156d2823262fb3c29

                                                              SHA512

                                                              d020b4c6ffa9ec180231be02f5fc49daa2a89b6df0cf82b654234ed01bf9af479d41c620e1cb37ac083aee177a7e4383f0490aa794c0ea8ff84180336b03ee7a

                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-34911.exe

                                                              Filesize

                                                              192KB

                                                              MD5

                                                              0a3d3153b59f1cc3038a592580362296

                                                              SHA1

                                                              45590bc4c84c1d48a55aa7999018a7133fa66be2

                                                              SHA256

                                                              a09d4289ab77ae45439d0cc7d8f9eff5dae9fcf274055c2faf351e44ee95e889

                                                              SHA512

                                                              aa9555a55660cc92b2bc8f5497fbe47d58260ea8e51177092f95faea02544428b7a0463245d2e06c381e7525b8102cd725ec3747f3e30ffe7087e819414772a0

                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-41965.exe

                                                              Filesize

                                                              192KB

                                                              MD5

                                                              fe6f690ad2f7d484ba1448e279c0a2db

                                                              SHA1

                                                              cad4d4381c61e82e48dd921539fdefe5e4260275

                                                              SHA256

                                                              fdc5715dde9efa787a456e4c6320f804af294db91c75dc79ada5ea23470f51bf

                                                              SHA512

                                                              a6f276d95e957a5bb5d08b1f8149089be95db996069df42130dc301bd647f65a0a23cdd5b146439574ef52351a7646d3faca87012571db06e7ad7b3b6bc6f976

                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-47372.exe

                                                              Filesize

                                                              192KB

                                                              MD5

                                                              86d0ba42c7bbe392e6a4f7368ec7d1e3

                                                              SHA1

                                                              e33fa3f1c876d429bd768ccbbcc191cd6556758c

                                                              SHA256

                                                              e397cc9a3fcffc40dcc269b26dcfb718a69e103a945325ed310c3baba5664571

                                                              SHA512

                                                              e08fa0c93065f978848a9a0233902b604143b3fc4f21c324622d2c038c5f19c2cd206648422bd2dbb3835068bd8723c234a7a196c225a0efd128d54eb51de576

                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-50325.exe

                                                              Filesize

                                                              192KB

                                                              MD5

                                                              64569efaea75b741ff82880f2924de98

                                                              SHA1

                                                              323894947f07763147eecd97f7e782ac4e8f7207

                                                              SHA256

                                                              374be688c64a016021a2c8cd3055564bf6c5cb69ad289e33661e7160db42bebf

                                                              SHA512

                                                              9fa2e57c46d878f3b99a9b8cb1da7b6646c4c15b270da7287b7afdb9d00a761c84e3590efbfb3ae17d1b41207d840f7ba796c103f4c9c2b122d9b957779cfa7e

                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-50387.exe

                                                              Filesize

                                                              192KB

                                                              MD5

                                                              34dfa595497a91fde2f5e34d735e4835

                                                              SHA1

                                                              cdfe989926547fc833f372c1be1c4b34cfc2589a

                                                              SHA256

                                                              47a1f221133e8c4e8b6da469c1b5625262ce9b31452277dd1afada0adc518cf1

                                                              SHA512

                                                              27dc68a89011eb947122f1ac8b062c90b2749771ed86ef380c67a3736ab52be903887d13a231bdcf3576da54b0bda89160511207fe95a9ce9c0e6170ee9e3a1c

                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-5576.exe

                                                              Filesize

                                                              192KB

                                                              MD5

                                                              39f22e023db8c4f9a93c127152767d62

                                                              SHA1

                                                              2330ae99dcb5363f2a840f68bce07b738be1282e

                                                              SHA256

                                                              ea03b641f5572d2f0069a3d81a3baaecbaa085d0ba2976a4d5f6c6f14f294fcd

                                                              SHA512

                                                              a550c3f1cc0f255be6f1b9f425441610388e9cb248ccd4b49bd2dc0a0abeaeb791b40a619da7eae0291aafaeda3a185cb7149b8f37ad5a71524388a290e04d96

                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-59110.exe

                                                              Filesize

                                                              192KB

                                                              MD5

                                                              0b1916be7dae23bcc4ab7b32c864ee2b

                                                              SHA1

                                                              884d9f5009387bd3637818ec5a7813b7a9054c2b

                                                              SHA256

                                                              e0ed998dcf8e9fcdca98566bba6d260c874129f8037589d3dc716d5fc643eae9

                                                              SHA512

                                                              5cd151f5204d9b22f29ba706eee3730d46549f1bc30fcd4b507ebae837545fcbffcef4c76d80c06bd24efbc3d5a66510c10d43314c4504ed2f0fcbe28822c31c

                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-937.exe

                                                              Filesize

                                                              192KB

                                                              MD5

                                                              a59793f374a8f19a7f178dd44b28e41a

                                                              SHA1

                                                              de8ff4ee7c95d59b19f6bb4a1d1f948ba8075074

                                                              SHA256

                                                              ee296ac44f19208d766f212f6a32b6553f5c46acedaa0e03940bed9d6d77ae4e

                                                              SHA512

                                                              12badfd2eec9a936b73cbbb0b85781db000c24acc97490a9c21a8f019a43a46ad6afe595ad0b1e38d0de6e8033d84d022bddde6dff6916c3553f17fc152f9000

                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-9546.exe

                                                              Filesize

                                                              192KB

                                                              MD5

                                                              4f5d6862f1a23f242b7878d7f50aa894

                                                              SHA1

                                                              6880202cb54485976702ce0ab5b23648e356c939

                                                              SHA256

                                                              c3649ecd3b80686cf1822fc3ebc6e502cd1d1e0efe5fe8557ca36631204babb4

                                                              SHA512

                                                              095828b4d67162977f60125dd1426ce5e8b44e69c244c5427acd2d32b6365b058743f6008338c92208368e8be6253541b484571f2a8ffdcb3f9c66ee99318fd6

                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-9847.exe

                                                              Filesize

                                                              192KB

                                                              MD5

                                                              d8bda10f4e32d5c003591e1c4c0286fe

                                                              SHA1

                                                              6c5fa82d49020d0eb94a7f8046737f0b549aa72e

                                                              SHA256

                                                              90a3000b17e63d34bbcecca19b2778ff8125e1d58b9d63ec51dfc2f829d64cd6

                                                              SHA512

                                                              1b3fe7dd4bd23d6338aac43ccfbe31f3e9c5931e33fef53e45d88c02c811bf5b80c7e99965019f6af54cc32c9747f70958088012c0987b948d4ef9d17685047c