Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
93s -
max time network
125s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
08/04/2024, 15:34
Static task
static1
Behavioral task
behavioral1
Sample
e7cc4a29fa823bf57ee5f99e43b9d986_JaffaCakes118.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
e7cc4a29fa823bf57ee5f99e43b9d986_JaffaCakes118.exe
Resource
win10v2004-20240226-en
General
-
Target
e7cc4a29fa823bf57ee5f99e43b9d986_JaffaCakes118.exe
-
Size
192KB
-
MD5
e7cc4a29fa823bf57ee5f99e43b9d986
-
SHA1
00d55acce61a1052cec7b4f2d3111cc7d128f985
-
SHA256
df76c72f32bf0e7425c60ef338865e2d80bb2b9da20cc5ff0c08885cdf512cef
-
SHA512
57bfa7004d879d18d152b579261f9b7af1758d1bbfeb03a27b60d88453868d7a4073376d8cebd273bf12a512004f2391c92566e23c6ff86d31a47980deb01360
-
SSDEEP
3072:Yih7oP8Q+ywQnOjE8GpiBJOLrhgwMuAfohtYzzE/G5lHtpFP:YiBoe3Qnf8qiBJ/8uJF5lHtpF
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2012 Unicorn-30491.exe 2976 Unicorn-5576.exe 2648 Unicorn-34911.exe 2544 Unicorn-33802.exe 2708 Unicorn-5576.exe 2600 Unicorn-937.exe 2880 Unicorn-50387.exe 1648 Unicorn-59110.exe 2736 Unicorn-9546.exe 2780 Unicorn-47372.exe 1588 Unicorn-11170.exe 1968 Unicorn-22121.exe 584 Unicorn-9847.exe 2876 Unicorn-41965.exe 1116 Unicorn-13568.exe 1516 Unicorn-1124.exe 2268 Unicorn-30459.exe 2256 Unicorn-50325.exe 2524 Unicorn-60200.exe 1828 Unicorn-4881.exe 440 Unicorn-13220.exe 328 Unicorn-12473.exe 3008 Unicorn-30154.exe 920 Unicorn-47045.exe 1088 Unicorn-5649.exe 1884 Unicorn-21410.exe 2344 Unicorn-46298.exe 1056 Unicorn-43283.exe 2944 Unicorn-51814.exe 976 Unicorn-6889.exe 1608 Unicorn-40543.exe 2788 Unicorn-8233.exe 2000 Unicorn-7678.exe 2576 Unicorn-41612.exe 2632 Unicorn-257.exe 2432 Unicorn-21083.exe 2800 Unicorn-55763.exe 2776 Unicorn-46848.exe 2436 Unicorn-21960.exe 2468 Unicorn-51295.exe 2492 Unicorn-30128.exe 2040 Unicorn-31798.exe 2404 Unicorn-60024.exe 2712 Unicorn-10247.exe 1888 Unicorn-10802.exe 1940 Unicorn-34752.exe 1636 Unicorn-26776.exe 1628 Unicorn-40734.exe 1316 Unicorn-7123.exe 2496 Unicorn-13791.exe 1368 Unicorn-61861.exe 2616 Unicorn-53693.exe 2068 Unicorn-6391.exe 2096 Unicorn-22343.exe 1576 Unicorn-63890.exe 2168 Unicorn-65042.exe 892 Unicorn-56874.exe 980 Unicorn-52961.exe 1800 Unicorn-25332.exe 792 Unicorn-16418.exe 904 Unicorn-48898.exe 1188 Unicorn-17932.exe 1760 Unicorn-13101.exe 1444 Unicorn-38483.exe -
Loads dropped DLL 64 IoCs
pid Process 1908 e7cc4a29fa823bf57ee5f99e43b9d986_JaffaCakes118.exe 1908 e7cc4a29fa823bf57ee5f99e43b9d986_JaffaCakes118.exe 2012 Unicorn-30491.exe 2012 Unicorn-30491.exe 1908 e7cc4a29fa823bf57ee5f99e43b9d986_JaffaCakes118.exe 1908 e7cc4a29fa823bf57ee5f99e43b9d986_JaffaCakes118.exe 2976 Unicorn-5576.exe 2012 Unicorn-30491.exe 2976 Unicorn-5576.exe 2012 Unicorn-30491.exe 2648 Unicorn-34911.exe 2648 Unicorn-34911.exe 2544 Unicorn-33802.exe 2544 Unicorn-33802.exe 2976 Unicorn-5576.exe 2976 Unicorn-5576.exe 2708 Unicorn-5576.exe 2708 Unicorn-5576.exe 2600 Unicorn-937.exe 2600 Unicorn-937.exe 2648 Unicorn-34911.exe 2648 Unicorn-34911.exe 2880 Unicorn-50387.exe 2880 Unicorn-50387.exe 2544 Unicorn-33802.exe 2544 Unicorn-33802.exe 1648 Unicorn-59110.exe 1648 Unicorn-59110.exe 1588 Unicorn-11170.exe 1588 Unicorn-11170.exe 2736 Unicorn-9546.exe 2736 Unicorn-9546.exe 2708 Unicorn-5576.exe 2708 Unicorn-5576.exe 2780 Unicorn-47372.exe 2780 Unicorn-47372.exe 2600 Unicorn-937.exe 2600 Unicorn-937.exe 1968 Unicorn-22121.exe 1968 Unicorn-22121.exe 2880 Unicorn-50387.exe 2880 Unicorn-50387.exe 584 Unicorn-9847.exe 584 Unicorn-9847.exe 1116 Unicorn-13568.exe 1116 Unicorn-13568.exe 1588 Unicorn-11170.exe 1588 Unicorn-11170.exe 2268 Unicorn-30459.exe 2268 Unicorn-30459.exe 1516 Unicorn-1124.exe 1516 Unicorn-1124.exe 2524 Unicorn-60200.exe 2524 Unicorn-60200.exe 2736 Unicorn-9546.exe 2736 Unicorn-9546.exe 2256 Unicorn-50325.exe 2256 Unicorn-50325.exe 2780 Unicorn-47372.exe 2780 Unicorn-47372.exe 1828 Unicorn-4881.exe 1828 Unicorn-4881.exe 440 Unicorn-13220.exe 1968 Unicorn-22121.exe -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 1908 e7cc4a29fa823bf57ee5f99e43b9d986_JaffaCakes118.exe 2012 Unicorn-30491.exe 2976 Unicorn-5576.exe 2648 Unicorn-34911.exe 2544 Unicorn-33802.exe 2708 Unicorn-5576.exe 2600 Unicorn-937.exe 2880 Unicorn-50387.exe 1648 Unicorn-59110.exe 2736 Unicorn-9546.exe 2780 Unicorn-47372.exe 1588 Unicorn-11170.exe 1968 Unicorn-22121.exe 584 Unicorn-9847.exe 1116 Unicorn-13568.exe 2268 Unicorn-30459.exe 2256 Unicorn-50325.exe 2524 Unicorn-60200.exe 1516 Unicorn-1124.exe 1828 Unicorn-4881.exe 440 Unicorn-13220.exe 328 Unicorn-12473.exe 3008 Unicorn-30154.exe 920 Unicorn-47045.exe 1088 Unicorn-5649.exe 1884 Unicorn-21410.exe 976 Unicorn-6889.exe 2944 Unicorn-51814.exe 1056 Unicorn-43283.exe 2344 Unicorn-46298.exe 1608 Unicorn-40543.exe 2788 Unicorn-8233.exe 2000 Unicorn-7678.exe 2800 Unicorn-55763.exe 2432 Unicorn-21083.exe 2576 Unicorn-41612.exe 2632 Unicorn-257.exe 2468 Unicorn-51295.exe 2776 Unicorn-46848.exe 1888 Unicorn-10802.exe 2492 Unicorn-30128.exe 2404 Unicorn-60024.exe 2040 Unicorn-31798.exe 1636 Unicorn-26776.exe 1940 Unicorn-34752.exe 2712 Unicorn-10247.exe 1628 Unicorn-40734.exe 1316 Unicorn-7123.exe 2616 Unicorn-53693.exe 1368 Unicorn-61861.exe 2496 Unicorn-13791.exe 2068 Unicorn-6391.exe 2096 Unicorn-22343.exe 1576 Unicorn-63890.exe 892 Unicorn-56874.exe 2168 Unicorn-65042.exe 1800 Unicorn-25332.exe 980 Unicorn-52961.exe 792 Unicorn-16418.exe 904 Unicorn-48898.exe 1188 Unicorn-17932.exe 1760 Unicorn-13101.exe 1444 Unicorn-38483.exe 1680 Unicorn-27383.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1908 wrote to memory of 2012 1908 e7cc4a29fa823bf57ee5f99e43b9d986_JaffaCakes118.exe 28 PID 1908 wrote to memory of 2012 1908 e7cc4a29fa823bf57ee5f99e43b9d986_JaffaCakes118.exe 28 PID 1908 wrote to memory of 2012 1908 e7cc4a29fa823bf57ee5f99e43b9d986_JaffaCakes118.exe 28 PID 1908 wrote to memory of 2012 1908 e7cc4a29fa823bf57ee5f99e43b9d986_JaffaCakes118.exe 28 PID 2012 wrote to memory of 2976 2012 Unicorn-30491.exe 29 PID 2012 wrote to memory of 2976 2012 Unicorn-30491.exe 29 PID 2012 wrote to memory of 2976 2012 Unicorn-30491.exe 29 PID 2012 wrote to memory of 2976 2012 Unicorn-30491.exe 29 PID 1908 wrote to memory of 2648 1908 e7cc4a29fa823bf57ee5f99e43b9d986_JaffaCakes118.exe 30 PID 1908 wrote to memory of 2648 1908 e7cc4a29fa823bf57ee5f99e43b9d986_JaffaCakes118.exe 30 PID 1908 wrote to memory of 2648 1908 e7cc4a29fa823bf57ee5f99e43b9d986_JaffaCakes118.exe 30 PID 1908 wrote to memory of 2648 1908 e7cc4a29fa823bf57ee5f99e43b9d986_JaffaCakes118.exe 30 PID 2012 wrote to memory of 2708 2012 Unicorn-30491.exe 32 PID 2012 wrote to memory of 2708 2012 Unicorn-30491.exe 32 PID 2012 wrote to memory of 2708 2012 Unicorn-30491.exe 32 PID 2976 wrote to memory of 2544 2976 Unicorn-5576.exe 31 PID 2012 wrote to memory of 2708 2012 Unicorn-30491.exe 32 PID 2976 wrote to memory of 2544 2976 Unicorn-5576.exe 31 PID 2976 wrote to memory of 2544 2976 Unicorn-5576.exe 31 PID 2976 wrote to memory of 2544 2976 Unicorn-5576.exe 31 PID 2648 wrote to memory of 2600 2648 Unicorn-34911.exe 33 PID 2648 wrote to memory of 2600 2648 Unicorn-34911.exe 33 PID 2648 wrote to memory of 2600 2648 Unicorn-34911.exe 33 PID 2648 wrote to memory of 2600 2648 Unicorn-34911.exe 33 PID 2544 wrote to memory of 2880 2544 Unicorn-33802.exe 34 PID 2544 wrote to memory of 2880 2544 Unicorn-33802.exe 34 PID 2544 wrote to memory of 2880 2544 Unicorn-33802.exe 34 PID 2544 wrote to memory of 2880 2544 Unicorn-33802.exe 34 PID 2976 wrote to memory of 1648 2976 Unicorn-5576.exe 35 PID 2976 wrote to memory of 1648 2976 Unicorn-5576.exe 35 PID 2976 wrote to memory of 1648 2976 Unicorn-5576.exe 35 PID 2976 wrote to memory of 1648 2976 Unicorn-5576.exe 35 PID 2708 wrote to memory of 2736 2708 Unicorn-5576.exe 36 PID 2708 wrote to memory of 2736 2708 Unicorn-5576.exe 36 PID 2708 wrote to memory of 2736 2708 Unicorn-5576.exe 36 PID 2708 wrote to memory of 2736 2708 Unicorn-5576.exe 36 PID 2600 wrote to memory of 2780 2600 Unicorn-937.exe 37 PID 2600 wrote to memory of 2780 2600 Unicorn-937.exe 37 PID 2600 wrote to memory of 2780 2600 Unicorn-937.exe 37 PID 2600 wrote to memory of 2780 2600 Unicorn-937.exe 37 PID 2648 wrote to memory of 1588 2648 Unicorn-34911.exe 38 PID 2648 wrote to memory of 1588 2648 Unicorn-34911.exe 38 PID 2648 wrote to memory of 1588 2648 Unicorn-34911.exe 38 PID 2648 wrote to memory of 1588 2648 Unicorn-34911.exe 38 PID 2880 wrote to memory of 1968 2880 Unicorn-50387.exe 39 PID 2880 wrote to memory of 1968 2880 Unicorn-50387.exe 39 PID 2880 wrote to memory of 1968 2880 Unicorn-50387.exe 39 PID 2880 wrote to memory of 1968 2880 Unicorn-50387.exe 39 PID 2544 wrote to memory of 584 2544 Unicorn-33802.exe 40 PID 2544 wrote to memory of 584 2544 Unicorn-33802.exe 40 PID 2544 wrote to memory of 584 2544 Unicorn-33802.exe 40 PID 2544 wrote to memory of 584 2544 Unicorn-33802.exe 40 PID 1648 wrote to memory of 2876 1648 Unicorn-59110.exe 41 PID 1648 wrote to memory of 2876 1648 Unicorn-59110.exe 41 PID 1648 wrote to memory of 2876 1648 Unicorn-59110.exe 41 PID 1648 wrote to memory of 2876 1648 Unicorn-59110.exe 41 PID 1588 wrote to memory of 1116 1588 Unicorn-11170.exe 42 PID 1588 wrote to memory of 1116 1588 Unicorn-11170.exe 42 PID 1588 wrote to memory of 1116 1588 Unicorn-11170.exe 42 PID 1588 wrote to memory of 1116 1588 Unicorn-11170.exe 42 PID 2736 wrote to memory of 1516 2736 Unicorn-9546.exe 43 PID 2736 wrote to memory of 1516 2736 Unicorn-9546.exe 43 PID 2736 wrote to memory of 1516 2736 Unicorn-9546.exe 43 PID 2736 wrote to memory of 1516 2736 Unicorn-9546.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\e7cc4a29fa823bf57ee5f99e43b9d986_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\e7cc4a29fa823bf57ee5f99e43b9d986_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30491.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30491.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5576.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5576.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2976 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-33802.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33802.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50387.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50387.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22121.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22121.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-4881.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4881.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1828 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40543.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40543.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1608 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-7123.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7123.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1316 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38483.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38483.exe10⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1444 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35738.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35738.exe11⤵PID:1744
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9538.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9538.exe12⤵PID:2228
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6365.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6365.exe9⤵PID:2552
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13791.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13791.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2496
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8233.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8233.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-53693.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53693.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2616
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13220.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13220.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:440 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-7678.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7678.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2000 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61861.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61861.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1368 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-1363.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1363.exe9⤵PID:856
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22343.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22343.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2096 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30336.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30336.exe8⤵PID:584
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43280.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43280.exe9⤵PID:1328
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9847.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9847.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:584 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12473.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12473.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:328 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-41612.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41612.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2576
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-257.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-257.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2632 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16418.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16418.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:792 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58156.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58156.exe8⤵PID:1972
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58435.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58435.exe9⤵PID:764
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63947.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63947.exe7⤵PID:476
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22144.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22144.exe8⤵PID:2188
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59110.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59110.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1648 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-41965.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41965.exe5⤵
- Executes dropped EXE
PID:2876
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5576.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5576.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9546.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9546.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-1124.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1124.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21410.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21410.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30128.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30128.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-56874.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56874.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:892 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9339.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9339.exe9⤵PID:1588
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19741.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19741.exe10⤵PID:2612
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55011.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55011.exe8⤵PID:2676
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52961.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52961.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:980
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31798.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31798.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2040
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51814.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51814.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2944 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34752.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34752.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27383.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27383.exe7⤵
- Suspicious use of SetWindowsHookEx
PID:1680
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30459.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30459.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2268 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5649.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5649.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1088 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21960.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21960.exe6⤵
- Executes dropped EXE
PID:2436
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6391.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6391.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2068 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47611.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47611.exe7⤵PID:2428
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39660.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39660.exe8⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15647.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15647.exe9⤵PID:1464
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51295.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51295.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2468
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34911.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34911.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2648 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-937.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-937.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2600 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47372.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47372.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50325.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50325.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-43283.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43283.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1056 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10247.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10247.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-19755.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19755.exe8⤵PID:2732
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10802.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10802.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1888 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13101.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13101.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1760
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6194.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6194.exe7⤵PID:1136
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22398.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22398.exe8⤵PID:1208
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6889.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6889.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:976 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60024.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60024.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2404 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48898.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48898.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:904 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10299.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10299.exe8⤵PID:1096
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26998.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26998.exe7⤵PID:1956
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17932.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17932.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1188
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60200.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60200.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2524 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46298.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46298.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2344 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26776.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26776.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18063.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18063.exe7⤵PID:2700
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-37409.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37409.exe8⤵PID:2272
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15872.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15872.exe7⤵PID:1700
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40734.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40734.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1628 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48535.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48535.exe6⤵PID:3048
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11170.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11170.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1588 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13568.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13568.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1116 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30154.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30154.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21083.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21083.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2432 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-65042.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65042.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2168
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-25332.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25332.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17543.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17543.exe7⤵PID:832
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48760.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48760.exe8⤵PID:1632
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55763.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55763.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-63890.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63890.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1576 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62240.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62240.exe7⤵PID:1548
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47045.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47045.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:920 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46848.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46848.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14554.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14554.exe6⤵PID:2440
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
192KB
MD5ab73808a28983e5f442db86225310e88
SHA13428a06d5f44c724973d983bd2974ceb7f323484
SHA25662ed203f35508fe0d16e2acd7f498bdd380d67cf726814d7c870789c20576294
SHA5128646c3c3eb2ee28747940dcb467afe3dd33c727b4f6f848dab86df9c939c4c6fc8d5913d6c6216cb4e5489d4326335a8e75f2c94ef665a4e4e046f5a0ae28369
-
Filesize
192KB
MD5bbc1b746064865642469f8efea6c2a2c
SHA17ffd55752af5689d85af7c453d741b56250c7fee
SHA25656fcccc6b6cfc6adb7207e2e92a586aa58b0c94b5e857446e791dff7bab4cd72
SHA5120a9cf0beb88ed74cec109f7ed930944816d41b089dd530c437b26e8068aec432e7287115a58ca7f589e4f8e2edcff42cc21d9449e708491bd8c79a4c3107f8fa
-
Filesize
192KB
MD59c9c66ede78d8cf4946d865991a59249
SHA17a5087c4d07c03eab223c9e58b9fb181d6feb4d7
SHA25690d6cc3ab80d50abefb208a8b76d2588db0394a8ca0048f406f6882cf8217d32
SHA5124712e958e4de02cb37d87b6501240f1b66751c6502355fca2025c6c9a16ec05d89e90f3fb3f3fcc3e1eaa9b958b20298d7b4ca356a80e45ac3d4e16cbe7b3e02
-
Filesize
192KB
MD5784e57d40c14b2a9a045d8debb0e7bb8
SHA1382130bb1db965ad70608efc04af12249c0c58d4
SHA256c7392698ffd7dee1975ee8c55d0e5c5717d2d4798e51cb48dbec616960dbdf35
SHA512f6380f2d8e945a7d48d17bd0eb02f3033966f412ca5fb8402dfc4d71ec572eeec1dacb4a837431e17805c7d38fe658a9a5cbf71294fca12eecac09ba95217ee5
-
Filesize
192KB
MD5106669f1c235cf899a4e920961ec2b60
SHA1f15367318dd7854d83f846403983516253ffe641
SHA256a206ce1b46f91d348b00686c14e60f460cf7af82179113af08737780cabb8b4d
SHA5122874398d096b668f317441b985044e02205b58cb8569acc658db4253ad3bdc373739b7306df4a9d6d2415a6623003263eaed431fa648ca5629300f082192cc56
-
Filesize
192KB
MD54e8bf8317c8732ceedbdb4c96183374c
SHA16139c010073fdf2bc5f540113c4ad28572a58bd5
SHA2567af82d6aa650cba7a6b4ec6b4cb3ed9b8c9aa06da59ffd693b85cb0df44f2f86
SHA51201452b10c3d81726c72ebf95675437ae4e633bea8604418d288f7a8a6d19723ef580bb9d972c22500e21525f531482f67cf93aef6dea0d883c7ae0d38baf9b2b
-
Filesize
192KB
MD51d287ed8e1e1f5b4ddbf1391e7a75167
SHA120733833e7c31adc1aef955194244c43c85bc1c2
SHA2568b143d47affc23d4252fdca69106ebe272d255a0d9563169c9a7e82b0d954d35
SHA5124173e45196f12969f60c699c060c2dc8965283aa88f20a0b58562764564abec50641fcd9023114bedcaebb4ebe417d224d7701295466557894e59a3e4c0db591
-
Filesize
192KB
MD5e96cadff5cbace8a85f04c9f4b63e5ce
SHA13f04e68dbbf3735a11e3d011b0a195fd200a4970
SHA256b0d9818b9c6d5528831cd5da0aaf125060265faebedf697a425d2e09c3a97c59
SHA51291903e2fa70dcaf992382e7fc97163d8d7402e44eaba66636dd5262385e1619559b379a16a055aa2114adb2f6768701374acbd9429b64a9fd362ef69a7a0ab94
-
Filesize
192KB
MD51f01e6a37d731e332b639452470a0b9d
SHA13589c053ae2dacfc706422883e228850fac6850b
SHA2565b14484933fb066883c49d0306f869ccd9e8b7075cdd5b3a6f16ba43288903e3
SHA512eb22cc3dc2566abf05209ffb5ce2e58d1dd45d362bc7b063baeee4a5cf0e9a8e8b9d403844ee845bc6d565ecab68c9bfa901069f640a833f215e5f78e900fdd0
-
Filesize
192KB
MD5f79c8be755b362130deb23db4d808612
SHA1e6ce01e7b59c63f42c1a56248deae58416ceb5c1
SHA256637e19f1bbc8fe79cfd916baa8b779130eb56c7fd3edaba156d2823262fb3c29
SHA512d020b4c6ffa9ec180231be02f5fc49daa2a89b6df0cf82b654234ed01bf9af479d41c620e1cb37ac083aee177a7e4383f0490aa794c0ea8ff84180336b03ee7a
-
Filesize
192KB
MD50a3d3153b59f1cc3038a592580362296
SHA145590bc4c84c1d48a55aa7999018a7133fa66be2
SHA256a09d4289ab77ae45439d0cc7d8f9eff5dae9fcf274055c2faf351e44ee95e889
SHA512aa9555a55660cc92b2bc8f5497fbe47d58260ea8e51177092f95faea02544428b7a0463245d2e06c381e7525b8102cd725ec3747f3e30ffe7087e819414772a0
-
Filesize
192KB
MD5fe6f690ad2f7d484ba1448e279c0a2db
SHA1cad4d4381c61e82e48dd921539fdefe5e4260275
SHA256fdc5715dde9efa787a456e4c6320f804af294db91c75dc79ada5ea23470f51bf
SHA512a6f276d95e957a5bb5d08b1f8149089be95db996069df42130dc301bd647f65a0a23cdd5b146439574ef52351a7646d3faca87012571db06e7ad7b3b6bc6f976
-
Filesize
192KB
MD586d0ba42c7bbe392e6a4f7368ec7d1e3
SHA1e33fa3f1c876d429bd768ccbbcc191cd6556758c
SHA256e397cc9a3fcffc40dcc269b26dcfb718a69e103a945325ed310c3baba5664571
SHA512e08fa0c93065f978848a9a0233902b604143b3fc4f21c324622d2c038c5f19c2cd206648422bd2dbb3835068bd8723c234a7a196c225a0efd128d54eb51de576
-
Filesize
192KB
MD564569efaea75b741ff82880f2924de98
SHA1323894947f07763147eecd97f7e782ac4e8f7207
SHA256374be688c64a016021a2c8cd3055564bf6c5cb69ad289e33661e7160db42bebf
SHA5129fa2e57c46d878f3b99a9b8cb1da7b6646c4c15b270da7287b7afdb9d00a761c84e3590efbfb3ae17d1b41207d840f7ba796c103f4c9c2b122d9b957779cfa7e
-
Filesize
192KB
MD534dfa595497a91fde2f5e34d735e4835
SHA1cdfe989926547fc833f372c1be1c4b34cfc2589a
SHA25647a1f221133e8c4e8b6da469c1b5625262ce9b31452277dd1afada0adc518cf1
SHA51227dc68a89011eb947122f1ac8b062c90b2749771ed86ef380c67a3736ab52be903887d13a231bdcf3576da54b0bda89160511207fe95a9ce9c0e6170ee9e3a1c
-
Filesize
192KB
MD539f22e023db8c4f9a93c127152767d62
SHA12330ae99dcb5363f2a840f68bce07b738be1282e
SHA256ea03b641f5572d2f0069a3d81a3baaecbaa085d0ba2976a4d5f6c6f14f294fcd
SHA512a550c3f1cc0f255be6f1b9f425441610388e9cb248ccd4b49bd2dc0a0abeaeb791b40a619da7eae0291aafaeda3a185cb7149b8f37ad5a71524388a290e04d96
-
Filesize
192KB
MD50b1916be7dae23bcc4ab7b32c864ee2b
SHA1884d9f5009387bd3637818ec5a7813b7a9054c2b
SHA256e0ed998dcf8e9fcdca98566bba6d260c874129f8037589d3dc716d5fc643eae9
SHA5125cd151f5204d9b22f29ba706eee3730d46549f1bc30fcd4b507ebae837545fcbffcef4c76d80c06bd24efbc3d5a66510c10d43314c4504ed2f0fcbe28822c31c
-
Filesize
192KB
MD5a59793f374a8f19a7f178dd44b28e41a
SHA1de8ff4ee7c95d59b19f6bb4a1d1f948ba8075074
SHA256ee296ac44f19208d766f212f6a32b6553f5c46acedaa0e03940bed9d6d77ae4e
SHA51212badfd2eec9a936b73cbbb0b85781db000c24acc97490a9c21a8f019a43a46ad6afe595ad0b1e38d0de6e8033d84d022bddde6dff6916c3553f17fc152f9000
-
Filesize
192KB
MD54f5d6862f1a23f242b7878d7f50aa894
SHA16880202cb54485976702ce0ab5b23648e356c939
SHA256c3649ecd3b80686cf1822fc3ebc6e502cd1d1e0efe5fe8557ca36631204babb4
SHA512095828b4d67162977f60125dd1426ce5e8b44e69c244c5427acd2d32b6365b058743f6008338c92208368e8be6253541b484571f2a8ffdcb3f9c66ee99318fd6
-
Filesize
192KB
MD5d8bda10f4e32d5c003591e1c4c0286fe
SHA16c5fa82d49020d0eb94a7f8046737f0b549aa72e
SHA25690a3000b17e63d34bbcecca19b2778ff8125e1d58b9d63ec51dfc2f829d64cd6
SHA5121b3fe7dd4bd23d6338aac43ccfbe31f3e9c5931e33fef53e45d88c02c811bf5b80c7e99965019f6af54cc32c9747f70958088012c0987b948d4ef9d17685047c