Analysis
-
max time kernel
150s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20231129-en -
resource tags
arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system -
submitted
16/04/2024, 09:34
Static task
static1
Behavioral task
behavioral1
Sample
f332f0571290d65a4b41b2f5fb478cb9_JaffaCakes118.exe
Resource
win7-20231129-en
Behavioral task
behavioral2
Sample
f332f0571290d65a4b41b2f5fb478cb9_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f332f0571290d65a4b41b2f5fb478cb9_JaffaCakes118.exe
-
Size
184KB
-
MD5
f332f0571290d65a4b41b2f5fb478cb9
-
SHA1
13795a5929597261a9dab0cb10526f7a5ce96c52
-
SHA256
7ec1784634e2f4d4f07e1c73a54edd63cb58f71503cc34df19a490aab9464b25
-
SHA512
7513b173c531027776696a9b7122c29df43b1ebfe8595237a2534e313be40357fddc119dc2fdbd0f122a75c50d361cf09fc76a235ed8ee4c35c0dfe432e3d62a
-
SSDEEP
3072:B+MGoET8gJ08kejWwzOSM8dbPB86Rip0fDMx+vdfSNlPupFO:B+houi8k5wKSM8kedENlPupF
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2744 Unicorn-24703.exe 2160 Unicorn-42274.exe 2556 Unicorn-919.exe 2700 Unicorn-22020.exe 2724 Unicorn-10322.exe 2620 Unicorn-38356.exe 2796 Unicorn-23219.exe 2956 Unicorn-64806.exe 2808 Unicorn-51807.exe 1436 Unicorn-6690.exe 2756 Unicorn-3161.exe 2776 Unicorn-32622.exe 876 Unicorn-33176.exe 1768 Unicorn-48958.exe 2284 Unicorn-28346.exe 1880 Unicorn-12564.exe 240 Unicorn-46218.exe 268 Unicorn-46218.exe 1636 Unicorn-50857.exe 2188 Unicorn-36932.exe 2884 Unicorn-45655.exe 1664 Unicorn-24488.exe 1612 Unicorn-20404.exe 956 Unicorn-22494.exe 2504 Unicorn-50528.exe 588 Unicorn-46999.exe 2396 Unicorn-34000.exe 2880 Unicorn-30470.exe 2996 Unicorn-1135.exe 2180 Unicorn-17472.exe 2332 Unicorn-18026.exe 3020 Unicorn-58587.exe 2540 Unicorn-42805.exe 3024 Unicorn-5302.exe 2572 Unicorn-10730.exe 2452 Unicorn-15369.exe 2872 Unicorn-39319.exe 2584 Unicorn-52126.exe 2484 Unicorn-52126.exe 2696 Unicorn-43211.exe 2492 Unicorn-51379.exe 2508 Unicorn-51379.exe 1908 Unicorn-19069.exe 1268 Unicorn-38935.exe 2280 Unicorn-55826.exe 1396 Unicorn-15775.exe 1248 Unicorn-16329.exe 1460 Unicorn-32111.exe 1680 Unicorn-12157.exe 3048 Unicorn-16604.exe 2032 Unicorn-16604.exe 1964 Unicorn-27918.exe 2624 Unicorn-15713.exe 824 Unicorn-35941.exe 1968 Unicorn-32411.exe 1040 Unicorn-3076.exe 412 Unicorn-7160.exe 2660 Unicorn-58260.exe 1480 Unicorn-12588.exe 1992 Unicorn-12588.exe 1972 Unicorn-58068.exe 1832 Unicorn-12396.exe 1416 Unicorn-12396.exe 2920 Unicorn-53792.exe -
Loads dropped DLL 64 IoCs
pid Process 2528 f332f0571290d65a4b41b2f5fb478cb9_JaffaCakes118.exe 2528 f332f0571290d65a4b41b2f5fb478cb9_JaffaCakes118.exe 2744 Unicorn-24703.exe 2744 Unicorn-24703.exe 2528 f332f0571290d65a4b41b2f5fb478cb9_JaffaCakes118.exe 2528 f332f0571290d65a4b41b2f5fb478cb9_JaffaCakes118.exe 2160 Unicorn-42274.exe 2160 Unicorn-42274.exe 2744 Unicorn-24703.exe 2744 Unicorn-24703.exe 2556 Unicorn-919.exe 2556 Unicorn-919.exe 2700 Unicorn-22020.exe 2160 Unicorn-42274.exe 2700 Unicorn-22020.exe 2160 Unicorn-42274.exe 2724 Unicorn-10322.exe 2724 Unicorn-10322.exe 2620 Unicorn-38356.exe 2620 Unicorn-38356.exe 2556 Unicorn-919.exe 2556 Unicorn-919.exe 2796 Unicorn-23219.exe 2796 Unicorn-23219.exe 2700 Unicorn-22020.exe 2700 Unicorn-22020.exe 2956 Unicorn-64806.exe 2956 Unicorn-64806.exe 2808 Unicorn-51807.exe 2808 Unicorn-51807.exe 2724 Unicorn-10322.exe 2724 Unicorn-10322.exe 2756 Unicorn-3161.exe 2756 Unicorn-3161.exe 1436 Unicorn-6690.exe 1436 Unicorn-6690.exe 2620 Unicorn-38356.exe 2620 Unicorn-38356.exe 2776 Unicorn-32622.exe 2776 Unicorn-32622.exe 2796 Unicorn-23219.exe 2796 Unicorn-23219.exe 876 Unicorn-33176.exe 876 Unicorn-33176.exe 1768 Unicorn-48958.exe 1768 Unicorn-48958.exe 2956 Unicorn-64806.exe 2956 Unicorn-64806.exe 2284 Unicorn-28346.exe 2284 Unicorn-28346.exe 2808 Unicorn-51807.exe 2808 Unicorn-51807.exe 268 Unicorn-46218.exe 268 Unicorn-46218.exe 2756 Unicorn-3161.exe 2756 Unicorn-3161.exe 1636 Unicorn-50857.exe 1636 Unicorn-50857.exe 1880 Unicorn-12564.exe 1880 Unicorn-12564.exe 1436 Unicorn-6690.exe 1436 Unicorn-6690.exe 2188 Unicorn-36932.exe 2188 Unicorn-36932.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 904 412 WerFault.exe 84 -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2528 f332f0571290d65a4b41b2f5fb478cb9_JaffaCakes118.exe 2744 Unicorn-24703.exe 2160 Unicorn-42274.exe 2556 Unicorn-919.exe 2700 Unicorn-22020.exe 2724 Unicorn-10322.exe 2620 Unicorn-38356.exe 2796 Unicorn-23219.exe 2956 Unicorn-64806.exe 2808 Unicorn-51807.exe 1436 Unicorn-6690.exe 2756 Unicorn-3161.exe 2776 Unicorn-32622.exe 876 Unicorn-33176.exe 1768 Unicorn-48958.exe 2284 Unicorn-28346.exe 268 Unicorn-46218.exe 1880 Unicorn-12564.exe 1636 Unicorn-50857.exe 240 Unicorn-46218.exe 2188 Unicorn-36932.exe 2884 Unicorn-45655.exe 1664 Unicorn-24488.exe 1612 Unicorn-20404.exe 956 Unicorn-22494.exe 2504 Unicorn-50528.exe 588 Unicorn-46999.exe 2396 Unicorn-34000.exe 2880 Unicorn-30470.exe 2996 Unicorn-1135.exe 2180 Unicorn-17472.exe 2332 Unicorn-18026.exe 3020 Unicorn-58587.exe 2540 Unicorn-42805.exe 3024 Unicorn-5302.exe 2572 Unicorn-10730.exe 2452 Unicorn-15369.exe 2484 Unicorn-52126.exe 2696 Unicorn-43211.exe 2872 Unicorn-39319.exe 2584 Unicorn-52126.exe 2492 Unicorn-51379.exe 1268 Unicorn-38935.exe 2508 Unicorn-51379.exe 2280 Unicorn-55826.exe 1396 Unicorn-15775.exe 1248 Unicorn-16329.exe 1908 Unicorn-19069.exe 1460 Unicorn-32111.exe 2032 Unicorn-16604.exe 1680 Unicorn-12157.exe 1964 Unicorn-27918.exe 3048 Unicorn-16604.exe 2624 Unicorn-15713.exe 1968 Unicorn-32411.exe 1480 Unicorn-12588.exe 2660 Unicorn-58260.exe 824 Unicorn-35941.exe 1040 Unicorn-3076.exe 1972 Unicorn-58068.exe 1992 Unicorn-12588.exe 412 Unicorn-7160.exe 2836 Unicorn-8675.exe 1416 Unicorn-12396.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2528 wrote to memory of 2744 2528 f332f0571290d65a4b41b2f5fb478cb9_JaffaCakes118.exe 28 PID 2528 wrote to memory of 2744 2528 f332f0571290d65a4b41b2f5fb478cb9_JaffaCakes118.exe 28 PID 2528 wrote to memory of 2744 2528 f332f0571290d65a4b41b2f5fb478cb9_JaffaCakes118.exe 28 PID 2528 wrote to memory of 2744 2528 f332f0571290d65a4b41b2f5fb478cb9_JaffaCakes118.exe 28 PID 2744 wrote to memory of 2160 2744 Unicorn-24703.exe 29 PID 2744 wrote to memory of 2160 2744 Unicorn-24703.exe 29 PID 2744 wrote to memory of 2160 2744 Unicorn-24703.exe 29 PID 2744 wrote to memory of 2160 2744 Unicorn-24703.exe 29 PID 2528 wrote to memory of 2556 2528 f332f0571290d65a4b41b2f5fb478cb9_JaffaCakes118.exe 30 PID 2528 wrote to memory of 2556 2528 f332f0571290d65a4b41b2f5fb478cb9_JaffaCakes118.exe 30 PID 2528 wrote to memory of 2556 2528 f332f0571290d65a4b41b2f5fb478cb9_JaffaCakes118.exe 30 PID 2528 wrote to memory of 2556 2528 f332f0571290d65a4b41b2f5fb478cb9_JaffaCakes118.exe 30 PID 2160 wrote to memory of 2700 2160 Unicorn-42274.exe 31 PID 2160 wrote to memory of 2700 2160 Unicorn-42274.exe 31 PID 2160 wrote to memory of 2700 2160 Unicorn-42274.exe 31 PID 2160 wrote to memory of 2700 2160 Unicorn-42274.exe 31 PID 2744 wrote to memory of 2724 2744 Unicorn-24703.exe 32 PID 2744 wrote to memory of 2724 2744 Unicorn-24703.exe 32 PID 2744 wrote to memory of 2724 2744 Unicorn-24703.exe 32 PID 2744 wrote to memory of 2724 2744 Unicorn-24703.exe 32 PID 2556 wrote to memory of 2620 2556 Unicorn-919.exe 33 PID 2556 wrote to memory of 2620 2556 Unicorn-919.exe 33 PID 2556 wrote to memory of 2620 2556 Unicorn-919.exe 33 PID 2556 wrote to memory of 2620 2556 Unicorn-919.exe 33 PID 2700 wrote to memory of 2796 2700 Unicorn-22020.exe 34 PID 2700 wrote to memory of 2796 2700 Unicorn-22020.exe 34 PID 2700 wrote to memory of 2796 2700 Unicorn-22020.exe 34 PID 2700 wrote to memory of 2796 2700 Unicorn-22020.exe 34 PID 2160 wrote to memory of 2956 2160 Unicorn-42274.exe 35 PID 2160 wrote to memory of 2956 2160 Unicorn-42274.exe 35 PID 2160 wrote to memory of 2956 2160 Unicorn-42274.exe 35 PID 2160 wrote to memory of 2956 2160 Unicorn-42274.exe 35 PID 2724 wrote to memory of 2808 2724 Unicorn-10322.exe 36 PID 2724 wrote to memory of 2808 2724 Unicorn-10322.exe 36 PID 2724 wrote to memory of 2808 2724 Unicorn-10322.exe 36 PID 2724 wrote to memory of 2808 2724 Unicorn-10322.exe 36 PID 2620 wrote to memory of 1436 2620 Unicorn-38356.exe 37 PID 2620 wrote to memory of 1436 2620 Unicorn-38356.exe 37 PID 2620 wrote to memory of 1436 2620 Unicorn-38356.exe 37 PID 2620 wrote to memory of 1436 2620 Unicorn-38356.exe 37 PID 2556 wrote to memory of 2756 2556 Unicorn-919.exe 38 PID 2556 wrote to memory of 2756 2556 Unicorn-919.exe 38 PID 2556 wrote to memory of 2756 2556 Unicorn-919.exe 38 PID 2556 wrote to memory of 2756 2556 Unicorn-919.exe 38 PID 2796 wrote to memory of 2776 2796 Unicorn-23219.exe 39 PID 2796 wrote to memory of 2776 2796 Unicorn-23219.exe 39 PID 2796 wrote to memory of 2776 2796 Unicorn-23219.exe 39 PID 2796 wrote to memory of 2776 2796 Unicorn-23219.exe 39 PID 2700 wrote to memory of 876 2700 Unicorn-22020.exe 40 PID 2700 wrote to memory of 876 2700 Unicorn-22020.exe 40 PID 2700 wrote to memory of 876 2700 Unicorn-22020.exe 40 PID 2700 wrote to memory of 876 2700 Unicorn-22020.exe 40 PID 2956 wrote to memory of 1768 2956 Unicorn-64806.exe 41 PID 2956 wrote to memory of 1768 2956 Unicorn-64806.exe 41 PID 2956 wrote to memory of 1768 2956 Unicorn-64806.exe 41 PID 2956 wrote to memory of 1768 2956 Unicorn-64806.exe 41 PID 2808 wrote to memory of 2284 2808 Unicorn-51807.exe 42 PID 2808 wrote to memory of 2284 2808 Unicorn-51807.exe 42 PID 2808 wrote to memory of 2284 2808 Unicorn-51807.exe 42 PID 2808 wrote to memory of 2284 2808 Unicorn-51807.exe 42 PID 2724 wrote to memory of 1880 2724 Unicorn-10322.exe 43 PID 2724 wrote to memory of 1880 2724 Unicorn-10322.exe 43 PID 2724 wrote to memory of 1880 2724 Unicorn-10322.exe 43 PID 2724 wrote to memory of 1880 2724 Unicorn-10322.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\f332f0571290d65a4b41b2f5fb478cb9_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f332f0571290d65a4b41b2f5fb478cb9_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-24703.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24703.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2744 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-42274.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42274.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22020.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22020.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2700 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23219.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23219.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-32622.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32622.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-36932.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36932.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2188 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58587.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58587.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3020 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12157.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12157.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-8587.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8587.exe10⤵PID:1264
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60305.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60305.exe11⤵PID:2580
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21394.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21394.exe9⤵PID:2732
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16604.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16604.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-8971.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8971.exe9⤵PID:2272
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7321.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7321.exe10⤵PID:2628
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52993.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52993.exe9⤵PID:1688
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42805.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42805.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50305.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50305.exe8⤵PID:1616
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45655.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45655.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5302.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5302.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3024 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35941.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35941.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:824 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-7321.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7321.exe9⤵PID:808
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32643.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32643.exe10⤵PID:984
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32411.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32411.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58530.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58530.exe8⤵PID:1544
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62713.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62713.exe9⤵PID:2596
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1913.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1913.exe10⤵PID:2224
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33176.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33176.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:876 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-24488.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24488.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10730.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10730.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2572 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12588.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12588.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1992
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15369.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15369.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2452 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27918.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27918.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-611.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-611.exe8⤵PID:2456
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9334.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9334.exe7⤵PID:2860
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64806.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64806.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2956 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48958.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48958.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-20404.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20404.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1612 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16604.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16604.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-33284.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33284.exe8⤵PID:1508
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52126.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52126.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17716.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17716.exe7⤵PID:1160
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50985.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50985.exe8⤵PID:1340
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52993.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52993.exe7⤵PID:892
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22494.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22494.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:956 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-39319.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39319.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2872 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12396.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12396.exe7⤵
- Executes dropped EXE
PID:1832
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53792.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53792.exe6⤵
- Executes dropped EXE
PID:2920 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3704.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3704.exe7⤵PID:2444
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10322.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10322.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2724 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51807.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51807.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-28346.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28346.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2284 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50528.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50528.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2504 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38935.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38935.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1268 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3076.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3076.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1040 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46771.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46771.exe9⤵PID:2944
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18545.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18545.exe8⤵PID:1464
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58260.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58260.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37643.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37643.exe8⤵PID:1984
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60305.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60305.exe9⤵PID:2480
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49376.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49376.exe8⤵PID:1564
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55826.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55826.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16372.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16372.exe7⤵PID:1592
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50554.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50554.exe8⤵PID:2724
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38664.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38664.exe7⤵PID:780
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46999.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46999.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:588 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51379.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51379.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2508 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37669.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37669.exe7⤵PID:3044
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12564.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12564.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1880 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17472.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17472.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51379.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51379.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12396.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12396.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1416
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8675.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8675.exe6⤵
- Suspicious use of SetWindowsHookEx
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-7321.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7321.exe7⤵PID:1892
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19069.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19069.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-55411.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55411.exe6⤵PID:1448
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-919.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-919.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2556 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38356.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38356.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6690.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6690.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1436 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46218.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46218.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:240 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-52126.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52126.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15713.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15713.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2624 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26268.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26268.exe8⤵PID:772
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50554.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50554.exe9⤵PID:844
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40811.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40811.exe10⤵PID:1456
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34580.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34580.exe8⤵PID:988
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6210.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6210.exe7⤵PID:1980
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60305.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60305.exe8⤵PID:2520
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20391.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20391.exe9⤵PID:2236
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18026.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18026.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2332 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-32111.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32111.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1460 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-42966.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42966.exe7⤵PID:2808
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50857.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50857.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-1135.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1135.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2996
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3161.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3161.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46218.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46218.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:268 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34000.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34000.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15775.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15775.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1396 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12588.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12588.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60305.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60305.exe8⤵PID:3060
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58068.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58068.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-31120.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31120.exe7⤵PID:2556
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16329.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16329.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1248 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-28541.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28541.exe6⤵PID:2408
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7321.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7321.exe7⤵PID:2120
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30470.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30470.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-43211.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43211.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2696 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-7160.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7160.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:412 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 412 -s 2007⤵
- Program crash
PID:904
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD53e721ed44a84abca3f878b7b8bdf07b0
SHA178fb55c1e93dde44613487717f51b1a8b8f121d0
SHA256689cab8100e6feb54688418ab54910e7bb9edbe37520cf7d4137d974df87bbb6
SHA5128e2c5cfbe3dc1ce62ae3267e8b23620749374509e35225bbba304219d48cfbd1bf977936ff43a3e964487dae2421f5f4a4cc9082bf8c9a7a20d5e075fc7b53ce
-
Filesize
184KB
MD5bf7b23e504059748d09f05d603decacd
SHA1190895bc222f524b2fcfc76be20568ed33c5fa95
SHA2560104a0bd87927a8ccc8e5c797a0cf49c067bd6c9ec3b2b9836fc5de99aebb152
SHA512dbaac052eda7e38aa8a5d6069e2aea8e7a1ac96004115da8374ea1a59b2ffad36e735ad890f7ec6cb8f43a7c72d4b306e0444cc13268099582af7e46aaf29237
-
Filesize
184KB
MD5c8774f56ed55253d82a2579278679ddf
SHA12942e1e1f9fddfa419e6ca8412ced5a1b455dc39
SHA25656004e5c5ff6df0cecdd6158b5db55208ac1f9fba69262480b5087a08852e55f
SHA512950f802541ff034353e82e52a4f767cbc082ae198aae30c77ac1d4b0980655a193cb037804c442b604df02cd4680eb64fcf2e9eea61d47125719764af4e25b9d
-
Filesize
184KB
MD50689561b40e21c9c02f2b7719a449587
SHA1748a85ff3e6c7411e79c6e7eba8cf85da74ac505
SHA256b821d5a7e4fa6c6ad00f21ba6a3d457ed5e2c496a350ecdbde86dc803208782d
SHA512eaaf22fe868f729bb3a8c9dedb7edee4963ef604a7151bc8dfc4a26b2c6e499f0ea9f63d97540c597debbc6bccc5f0abfafe9d91a69912118af67e988fc370bb
-
Filesize
184KB
MD5929dac8fe309c0f7da794890d275ed75
SHA1cb44552a93d5ed06980e1e099afdaf888ab135fc
SHA256937a3c03421275b10eafdd67c9beaf73aed610e93a520b91ae4124306e5caeaa
SHA512b6d0b2b2e9b4c2bc15a2c25e65da28090863371a6f974a373d691ae180df50d06f9b144d26354a542dd12289f875c6c62858f716237ae3ac1dab3fbe10f1c60d
-
Filesize
184KB
MD5a76480986b29bd4c7d6d6b38958fa420
SHA1dc50e06762a98a89106e62ac06bc6273937a5115
SHA2563796424b6c30086949a74594fd75e38a3a31e695cb8e7a6369e68b214ddc9404
SHA5124e23ff1cf1a372c128fd0a6e6f678d819411e0c66f1a4679df5a96741488bc5ca9fbb1277938f1e867472f9afe449edaf1b3eff9c6b5042be170c3e96ff4e90f
-
Filesize
184KB
MD54602c3530157fb9f73f95f2c29137eab
SHA1fe36e67c41fc5e0bce91fb686fb3a86fb9fc617a
SHA2564ea85fef9512b43be8a04e7594a280e62b8aeb93eb923a88782fda4b67011160
SHA512400986ce79608af3f0f3942b65e59accf4990794513381fc3a681d21a1884309cdeec3d1ca8be30c790053705bc6bd990ddb5306ca0ceefb45778e77dd037588
-
Filesize
184KB
MD575be4d87f92c59f99954815aeab60f04
SHA11161d5601d02e1a63ce93bf291a796a0e44cece2
SHA256034c76a2dbc6a2229f7dc0abc38938aefd500e044d56ad89cc3128e68f9f2ba5
SHA5125c3395472c719a8319837a356f4ddc6f6b39478c68f77ead6a05a74a42122bb4a29f526e73f3fcf98e26b4d45694091fcb994103a367482433935107f0e6b1eb
-
Filesize
184KB
MD503c70e6227e5d14476e3dbac46dd8669
SHA1a9ef13293620569b088ea5cb757dfef73e7d893c
SHA25608f1e3c2a9c7bbdf7d6ed07fbde9afe0e8aae8287f1c59e03482378c9a700732
SHA5129516c4714c7b74656beee3b59398d79f419dd5fcb4549291c42eda339ce3179a229f5c445676196ea8475ec60ccb385ecd72a95cf76dfb802769d4c9ee863a30
-
Filesize
184KB
MD591e4bafbb62572f0b456941657d818fb
SHA1584ee6b89e3f3e79fb29e6473a5e03e5ae0615bc
SHA25699d366b36f8b8ef2ba957387bc2a905aae71a26daa3562d0b47dee434f2272a4
SHA512775f7963167dd642d96ac2af8f88ac5ead12a3f5cc61025050f0f8fa1a1496ea02b353fad684c7bc8314653bdf2b10763d9fb23be32ed33276448bc405f1452a
-
Filesize
184KB
MD5f6a7066d3509189ce229023edb65faaf
SHA1ae3d1ab38797fda03798a8776aa862986e08e18b
SHA25605f63f8600fda5d6a4669f64bc721582c5f40192095f6556524ab71ef39ca871
SHA512f780e7f81f48eb5dda52656d1e9c19bc499c57d970e7a08e405697b8170add99a78e88104de41fe68bd668ac009ea8456b6b3ed196073c8c766563126b928365
-
Filesize
184KB
MD55bb5bdf4cb520d01adb76e3e08907c31
SHA1d9f6d4a26fa8568b4e6c71883cdb68c7a73041f5
SHA25639912b42abb0776c850c66de2f54dff12931cc2ef6d28bb3ea2a2376f0e6937d
SHA512997eb309438a288c4f544c903bb39c1bef2de3105b6add2d993ade19389f60cf290d80800aa783521c6444885eee533b2776fa9bee97afc178d2a8d9d4285da4
-
Filesize
184KB
MD51f547961f1d8257cb0aeedc4ade360ae
SHA13eb3cbcc31bfb4bcde94227646a660e614dc819c
SHA256b48308b6d4b6a453a6de999506238529bdbc797cf7ff4cf01ad48c43e44dcd30
SHA51241cf0819bd09dce42bfb9edc2d925fd217cd03bfae475036428ae8bab7a8196478505686aabdc36bb470f479ff81199f7f976351e82fb720cb7c6cd460cd9c15
-
Filesize
184KB
MD5a0c59f304b93bfd4af8f8070ecf0ae67
SHA1ae93f2cdc2cb2a1467fc575127692755ff3a06db
SHA256e41359c2b8f17bd79c0d3c390d547d05be968d755d43bbfe87eaa313c94cf1de
SHA51225d048cbb61ebd2fae61eb2b089f6962c1ba55237046b96dd7f2d6ac719dc8c45d02bb546f6f1d9ad839e002a797a03fffc929d68d205fa727b6d192ed152127
-
Filesize
184KB
MD55ceb9bd005471367e3ce9bafc4d73647
SHA10d52304ebe802d50fa744b4730e026df17b840fb
SHA256970d533ba3a5e6a27facfca593dd09e152e40340f66cde7c76db847bc4031f96
SHA5123109926bef7483b4459b7697beffb87e02500e45e98cc02df16046bf6fc3934646a2cfc91069d1ef0954a6bafa5d1f2e2a305c9c507d4996aebfab460afc0aeb
-
Filesize
184KB
MD5ccc6826a895ab74c503112e391fba851
SHA19c36ffe46bee3f0a7a35e173eee08d25076ed727
SHA256300f6e7b79d3279c05fb664448d9897969f27848ea79e1fcbe0cb7e9d31f778d
SHA51229dc6848546c90a5e25986a8921b45ff3a3b06e68160a8ed0440cbc60333ed8715c5fbed8a542c7632260e58cdee95841d95d153842b1afee0a60e1babd41272
-
Filesize
184KB
MD53e77748dce6cccfe0e7a8b4da009fd8e
SHA1feb50e826dc2d20d4e53e5c43039d2cdca4c5da8
SHA2568d828091d7186238d00fa35b78e9ddf5bcd0652296c87a5c323a880da2c67fc4
SHA5126b17f21db8ec079c22cd0761d8497abc66a266c8eb980999b49e4510acae05222efee5ed904c3f1b3c6add9ae6aaa0c41df7f7b8876dd88c5c94fbe90fb07a54