Analysis

  • max time kernel
    150s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20231129-en
  • resource tags

    arch:x64arch:x86image:win7-20231129-enlocale:en-usos:windows7-x64system
  • submitted
    16/04/2024, 09:34

General

  • Target

    f332f0571290d65a4b41b2f5fb478cb9_JaffaCakes118.exe

  • Size

    184KB

  • MD5

    f332f0571290d65a4b41b2f5fb478cb9

  • SHA1

    13795a5929597261a9dab0cb10526f7a5ce96c52

  • SHA256

    7ec1784634e2f4d4f07e1c73a54edd63cb58f71503cc34df19a490aab9464b25

  • SHA512

    7513b173c531027776696a9b7122c29df43b1ebfe8595237a2534e313be40357fddc119dc2fdbd0f122a75c50d361cf09fc76a235ed8ee4c35c0dfe432e3d62a

  • SSDEEP

    3072:B+MGoET8gJ08kejWwzOSM8dbPB86Rip0fDMx+vdfSNlPupFO:B+houi8k5wKSM8kedENlPupF

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 64 IoCs
  • Loads dropped DLL 64 IoCs
  • Program crash 1 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f332f0571290d65a4b41b2f5fb478cb9_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f332f0571290d65a4b41b2f5fb478cb9_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2528
    • C:\Users\Admin\AppData\Local\Temp\Unicorn-24703.exe
      C:\Users\Admin\AppData\Local\Temp\Unicorn-24703.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2744
      • C:\Users\Admin\AppData\Local\Temp\Unicorn-42274.exe
        C:\Users\Admin\AppData\Local\Temp\Unicorn-42274.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2160
        • C:\Users\Admin\AppData\Local\Temp\Unicorn-22020.exe
          C:\Users\Admin\AppData\Local\Temp\Unicorn-22020.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2700
          • C:\Users\Admin\AppData\Local\Temp\Unicorn-23219.exe
            C:\Users\Admin\AppData\Local\Temp\Unicorn-23219.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2796
            • C:\Users\Admin\AppData\Local\Temp\Unicorn-32622.exe
              C:\Users\Admin\AppData\Local\Temp\Unicorn-32622.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              PID:2776
              • C:\Users\Admin\AppData\Local\Temp\Unicorn-36932.exe
                C:\Users\Admin\AppData\Local\Temp\Unicorn-36932.exe
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetWindowsHookEx
                PID:2188
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-58587.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-58587.exe
                  8⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:3020
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-12157.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-12157.exe
                    9⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:1680
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-8587.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-8587.exe
                      10⤵
                        PID:1264
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-60305.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-60305.exe
                          11⤵
                            PID:2580
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-21394.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-21394.exe
                        9⤵
                          PID:2732
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-16604.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-16604.exe
                        8⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:2032
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-8971.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-8971.exe
                          9⤵
                            PID:2272
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-7321.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-7321.exe
                              10⤵
                                PID:2628
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-52993.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-52993.exe
                              9⤵
                                PID:1688
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-42805.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-42805.exe
                            7⤵
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            PID:2540
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-50305.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-50305.exe
                              8⤵
                                PID:1616
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-45655.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-45655.exe
                            6⤵
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            PID:2884
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-5302.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-5302.exe
                              7⤵
                              • Executes dropped EXE
                              • Suspicious use of SetWindowsHookEx
                              PID:3024
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-35941.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-35941.exe
                                8⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                PID:824
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-7321.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-7321.exe
                                  9⤵
                                    PID:808
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-32643.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-32643.exe
                                      10⤵
                                        PID:984
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-32411.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-32411.exe
                                  7⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetWindowsHookEx
                                  PID:1968
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-58530.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-58530.exe
                                    8⤵
                                      PID:1544
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-62713.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-62713.exe
                                        9⤵
                                          PID:2596
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-1913.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-1913.exe
                                            10⤵
                                              PID:2224
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-33176.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-33176.exe
                                    5⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • Suspicious use of SetWindowsHookEx
                                    PID:876
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-24488.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-24488.exe
                                      6⤵
                                      • Executes dropped EXE
                                      • Suspicious use of SetWindowsHookEx
                                      PID:1664
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-10730.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-10730.exe
                                        7⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetWindowsHookEx
                                        PID:2572
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-12588.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-12588.exe
                                          8⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetWindowsHookEx
                                          PID:1992
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-15369.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-15369.exe
                                      6⤵
                                      • Executes dropped EXE
                                      • Suspicious use of SetWindowsHookEx
                                      PID:2452
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-27918.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-27918.exe
                                        7⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetWindowsHookEx
                                        PID:1964
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-611.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-611.exe
                                          8⤵
                                            PID:2456
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-9334.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-9334.exe
                                          7⤵
                                            PID:2860
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-64806.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-64806.exe
                                      4⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Suspicious use of SetWindowsHookEx
                                      • Suspicious use of WriteProcessMemory
                                      PID:2956
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-48958.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-48958.exe
                                        5⤵
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        • Suspicious use of SetWindowsHookEx
                                        PID:1768
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-20404.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-20404.exe
                                          6⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetWindowsHookEx
                                          PID:1612
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-16604.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-16604.exe
                                            7⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetWindowsHookEx
                                            PID:3048
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-33284.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-33284.exe
                                              8⤵
                                                PID:1508
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-52126.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-52126.exe
                                            6⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetWindowsHookEx
                                            PID:2584
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-17716.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-17716.exe
                                              7⤵
                                                PID:1160
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-50985.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-50985.exe
                                                  8⤵
                                                    PID:1340
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-52993.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-52993.exe
                                                  7⤵
                                                    PID:892
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-22494.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-22494.exe
                                                5⤵
                                                • Executes dropped EXE
                                                • Suspicious use of SetWindowsHookEx
                                                PID:956
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-39319.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-39319.exe
                                                  6⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:2872
                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-12396.exe
                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-12396.exe
                                                    7⤵
                                                    • Executes dropped EXE
                                                    PID:1832
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-53792.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-53792.exe
                                                  6⤵
                                                  • Executes dropped EXE
                                                  PID:2920
                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-3704.exe
                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-3704.exe
                                                    7⤵
                                                      PID:2444
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-10322.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-10322.exe
                                              3⤵
                                              • Executes dropped EXE
                                              • Loads dropped DLL
                                              • Suspicious use of SetWindowsHookEx
                                              • Suspicious use of WriteProcessMemory
                                              PID:2724
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-51807.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-51807.exe
                                                4⤵
                                                • Executes dropped EXE
                                                • Loads dropped DLL
                                                • Suspicious use of SetWindowsHookEx
                                                • Suspicious use of WriteProcessMemory
                                                PID:2808
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-28346.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-28346.exe
                                                  5⤵
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:2284
                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-50528.exe
                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-50528.exe
                                                    6⤵
                                                    • Executes dropped EXE
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:2504
                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-38935.exe
                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-38935.exe
                                                      7⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:1268
                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-3076.exe
                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-3076.exe
                                                        8⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:1040
                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-46771.exe
                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-46771.exe
                                                          9⤵
                                                            PID:2944
                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-18545.exe
                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-18545.exe
                                                          8⤵
                                                            PID:1464
                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-58260.exe
                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-58260.exe
                                                          7⤵
                                                          • Executes dropped EXE
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:2660
                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-37643.exe
                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-37643.exe
                                                            8⤵
                                                              PID:1984
                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-60305.exe
                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-60305.exe
                                                                9⤵
                                                                  PID:2480
                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-49376.exe
                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-49376.exe
                                                                8⤵
                                                                  PID:1564
                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-55826.exe
                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-55826.exe
                                                              6⤵
                                                              • Executes dropped EXE
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:2280
                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-16372.exe
                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-16372.exe
                                                                7⤵
                                                                  PID:1592
                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-50554.exe
                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-50554.exe
                                                                    8⤵
                                                                      PID:2724
                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-38664.exe
                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-38664.exe
                                                                    7⤵
                                                                      PID:780
                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-46999.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-46999.exe
                                                                  5⤵
                                                                  • Executes dropped EXE
                                                                  • Suspicious use of SetWindowsHookEx
                                                                  PID:588
                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-51379.exe
                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-51379.exe
                                                                    6⤵
                                                                    • Executes dropped EXE
                                                                    • Suspicious use of SetWindowsHookEx
                                                                    PID:2508
                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-37669.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-37669.exe
                                                                      7⤵
                                                                        PID:3044
                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-12564.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-12564.exe
                                                                  4⤵
                                                                  • Executes dropped EXE
                                                                  • Loads dropped DLL
                                                                  • Suspicious use of SetWindowsHookEx
                                                                  PID:1880
                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-17472.exe
                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-17472.exe
                                                                    5⤵
                                                                    • Executes dropped EXE
                                                                    • Suspicious use of SetWindowsHookEx
                                                                    PID:2180
                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-51379.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-51379.exe
                                                                      6⤵
                                                                      • Executes dropped EXE
                                                                      • Suspicious use of SetWindowsHookEx
                                                                      PID:2492
                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-12396.exe
                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-12396.exe
                                                                        7⤵
                                                                        • Executes dropped EXE
                                                                        • Suspicious use of SetWindowsHookEx
                                                                        PID:1416
                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-8675.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-8675.exe
                                                                      6⤵
                                                                      • Suspicious use of SetWindowsHookEx
                                                                      PID:2836
                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-7321.exe
                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-7321.exe
                                                                        7⤵
                                                                          PID:1892
                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-19069.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-19069.exe
                                                                      5⤵
                                                                      • Executes dropped EXE
                                                                      • Suspicious use of SetWindowsHookEx
                                                                      PID:1908
                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-55411.exe
                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-55411.exe
                                                                        6⤵
                                                                          PID:1448
                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-919.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-919.exe
                                                                  2⤵
                                                                  • Executes dropped EXE
                                                                  • Loads dropped DLL
                                                                  • Suspicious use of SetWindowsHookEx
                                                                  • Suspicious use of WriteProcessMemory
                                                                  PID:2556
                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-38356.exe
                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-38356.exe
                                                                    3⤵
                                                                    • Executes dropped EXE
                                                                    • Loads dropped DLL
                                                                    • Suspicious use of SetWindowsHookEx
                                                                    • Suspicious use of WriteProcessMemory
                                                                    PID:2620
                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-6690.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-6690.exe
                                                                      4⤵
                                                                      • Executes dropped EXE
                                                                      • Loads dropped DLL
                                                                      • Suspicious use of SetWindowsHookEx
                                                                      PID:1436
                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-46218.exe
                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-46218.exe
                                                                        5⤵
                                                                        • Executes dropped EXE
                                                                        • Suspicious use of SetWindowsHookEx
                                                                        PID:240
                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-52126.exe
                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-52126.exe
                                                                          6⤵
                                                                          • Executes dropped EXE
                                                                          • Suspicious use of SetWindowsHookEx
                                                                          PID:2484
                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-15713.exe
                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-15713.exe
                                                                            7⤵
                                                                            • Executes dropped EXE
                                                                            • Suspicious use of SetWindowsHookEx
                                                                            PID:2624
                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-26268.exe
                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-26268.exe
                                                                              8⤵
                                                                                PID:772
                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-50554.exe
                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-50554.exe
                                                                                  9⤵
                                                                                    PID:844
                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-40811.exe
                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-40811.exe
                                                                                      10⤵
                                                                                        PID:1456
                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-34580.exe
                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-34580.exe
                                                                                    8⤵
                                                                                      PID:988
                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-6210.exe
                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-6210.exe
                                                                                    7⤵
                                                                                      PID:1980
                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-60305.exe
                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-60305.exe
                                                                                        8⤵
                                                                                          PID:2520
                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-20391.exe
                                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-20391.exe
                                                                                            9⤵
                                                                                              PID:2236
                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-18026.exe
                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-18026.exe
                                                                                      5⤵
                                                                                      • Executes dropped EXE
                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                      PID:2332
                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-32111.exe
                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-32111.exe
                                                                                        6⤵
                                                                                        • Executes dropped EXE
                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                        PID:1460
                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-42966.exe
                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-42966.exe
                                                                                          7⤵
                                                                                            PID:2808
                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-50857.exe
                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-50857.exe
                                                                                      4⤵
                                                                                      • Executes dropped EXE
                                                                                      • Loads dropped DLL
                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                      PID:1636
                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-1135.exe
                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-1135.exe
                                                                                        5⤵
                                                                                        • Executes dropped EXE
                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                        PID:2996
                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-3161.exe
                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-3161.exe
                                                                                    3⤵
                                                                                    • Executes dropped EXE
                                                                                    • Loads dropped DLL
                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                    PID:2756
                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-46218.exe
                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-46218.exe
                                                                                      4⤵
                                                                                      • Executes dropped EXE
                                                                                      • Loads dropped DLL
                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                      PID:268
                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-34000.exe
                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-34000.exe
                                                                                        5⤵
                                                                                        • Executes dropped EXE
                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                        PID:2396
                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-15775.exe
                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-15775.exe
                                                                                          6⤵
                                                                                          • Executes dropped EXE
                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                          PID:1396
                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-12588.exe
                                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-12588.exe
                                                                                            7⤵
                                                                                            • Executes dropped EXE
                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                            PID:1480
                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-60305.exe
                                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-60305.exe
                                                                                              8⤵
                                                                                                PID:3060
                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-58068.exe
                                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-58068.exe
                                                                                            6⤵
                                                                                            • Executes dropped EXE
                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                            PID:1972
                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-31120.exe
                                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-31120.exe
                                                                                              7⤵
                                                                                                PID:2556
                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-16329.exe
                                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-16329.exe
                                                                                            5⤵
                                                                                            • Executes dropped EXE
                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                            PID:1248
                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-28541.exe
                                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-28541.exe
                                                                                              6⤵
                                                                                                PID:2408
                                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-7321.exe
                                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-7321.exe
                                                                                                  7⤵
                                                                                                    PID:2120
                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-30470.exe
                                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-30470.exe
                                                                                              4⤵
                                                                                              • Executes dropped EXE
                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                              PID:2880
                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-43211.exe
                                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-43211.exe
                                                                                                5⤵
                                                                                                • Executes dropped EXE
                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                PID:2696
                                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-7160.exe
                                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-7160.exe
                                                                                                  6⤵
                                                                                                  • Executes dropped EXE
                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                  PID:412
                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 412 -s 200
                                                                                                    7⤵
                                                                                                    • Program crash
                                                                                                    PID:904

                                                                                      Network

                                                                                            MITRE ATT&CK Matrix

                                                                                            Replay Monitor

                                                                                            Loading Replay Monitor...

                                                                                            Downloads

                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-10322.exe

                                                                                              Filesize

                                                                                              184KB

                                                                                              MD5

                                                                                              3e721ed44a84abca3f878b7b8bdf07b0

                                                                                              SHA1

                                                                                              78fb55c1e93dde44613487717f51b1a8b8f121d0

                                                                                              SHA256

                                                                                              689cab8100e6feb54688418ab54910e7bb9edbe37520cf7d4137d974df87bbb6

                                                                                              SHA512

                                                                                              8e2c5cfbe3dc1ce62ae3267e8b23620749374509e35225bbba304219d48cfbd1bf977936ff43a3e964487dae2421f5f4a4cc9082bf8c9a7a20d5e075fc7b53ce

                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-12564.exe

                                                                                              Filesize

                                                                                              184KB

                                                                                              MD5

                                                                                              bf7b23e504059748d09f05d603decacd

                                                                                              SHA1

                                                                                              190895bc222f524b2fcfc76be20568ed33c5fa95

                                                                                              SHA256

                                                                                              0104a0bd87927a8ccc8e5c797a0cf49c067bd6c9ec3b2b9836fc5de99aebb152

                                                                                              SHA512

                                                                                              dbaac052eda7e38aa8a5d6069e2aea8e7a1ac96004115da8374ea1a59b2ffad36e735ad890f7ec6cb8f43a7c72d4b306e0444cc13268099582af7e46aaf29237

                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-38356.exe

                                                                                              Filesize

                                                                                              184KB

                                                                                              MD5

                                                                                              c8774f56ed55253d82a2579278679ddf

                                                                                              SHA1

                                                                                              2942e1e1f9fddfa419e6ca8412ced5a1b455dc39

                                                                                              SHA256

                                                                                              56004e5c5ff6df0cecdd6158b5db55208ac1f9fba69262480b5087a08852e55f

                                                                                              SHA512

                                                                                              950f802541ff034353e82e52a4f767cbc082ae198aae30c77ac1d4b0980655a193cb037804c442b604df02cd4680eb64fcf2e9eea61d47125719764af4e25b9d

                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-48958.exe

                                                                                              Filesize

                                                                                              184KB

                                                                                              MD5

                                                                                              0689561b40e21c9c02f2b7719a449587

                                                                                              SHA1

                                                                                              748a85ff3e6c7411e79c6e7eba8cf85da74ac505

                                                                                              SHA256

                                                                                              b821d5a7e4fa6c6ad00f21ba6a3d457ed5e2c496a350ecdbde86dc803208782d

                                                                                              SHA512

                                                                                              eaaf22fe868f729bb3a8c9dedb7edee4963ef604a7151bc8dfc4a26b2c6e499f0ea9f63d97540c597debbc6bccc5f0abfafe9d91a69912118af67e988fc370bb

                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-51807.exe

                                                                                              Filesize

                                                                                              184KB

                                                                                              MD5

                                                                                              929dac8fe309c0f7da794890d275ed75

                                                                                              SHA1

                                                                                              cb44552a93d5ed06980e1e099afdaf888ab135fc

                                                                                              SHA256

                                                                                              937a3c03421275b10eafdd67c9beaf73aed610e93a520b91ae4124306e5caeaa

                                                                                              SHA512

                                                                                              b6d0b2b2e9b4c2bc15a2c25e65da28090863371a6f974a373d691ae180df50d06f9b144d26354a542dd12289f875c6c62858f716237ae3ac1dab3fbe10f1c60d

                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-6690.exe

                                                                                              Filesize

                                                                                              184KB

                                                                                              MD5

                                                                                              a76480986b29bd4c7d6d6b38958fa420

                                                                                              SHA1

                                                                                              dc50e06762a98a89106e62ac06bc6273937a5115

                                                                                              SHA256

                                                                                              3796424b6c30086949a74594fd75e38a3a31e695cb8e7a6369e68b214ddc9404

                                                                                              SHA512

                                                                                              4e23ff1cf1a372c128fd0a6e6f678d819411e0c66f1a4679df5a96741488bc5ca9fbb1277938f1e867472f9afe449edaf1b3eff9c6b5042be170c3e96ff4e90f

                                                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-22020.exe

                                                                                              Filesize

                                                                                              184KB

                                                                                              MD5

                                                                                              4602c3530157fb9f73f95f2c29137eab

                                                                                              SHA1

                                                                                              fe36e67c41fc5e0bce91fb686fb3a86fb9fc617a

                                                                                              SHA256

                                                                                              4ea85fef9512b43be8a04e7594a280e62b8aeb93eb923a88782fda4b67011160

                                                                                              SHA512

                                                                                              400986ce79608af3f0f3942b65e59accf4990794513381fc3a681d21a1884309cdeec3d1ca8be30c790053705bc6bd990ddb5306ca0ceefb45778e77dd037588

                                                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-23219.exe

                                                                                              Filesize

                                                                                              184KB

                                                                                              MD5

                                                                                              75be4d87f92c59f99954815aeab60f04

                                                                                              SHA1

                                                                                              1161d5601d02e1a63ce93bf291a796a0e44cece2

                                                                                              SHA256

                                                                                              034c76a2dbc6a2229f7dc0abc38938aefd500e044d56ad89cc3128e68f9f2ba5

                                                                                              SHA512

                                                                                              5c3395472c719a8319837a356f4ddc6f6b39478c68f77ead6a05a74a42122bb4a29f526e73f3fcf98e26b4d45694091fcb994103a367482433935107f0e6b1eb

                                                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-24703.exe

                                                                                              Filesize

                                                                                              184KB

                                                                                              MD5

                                                                                              03c70e6227e5d14476e3dbac46dd8669

                                                                                              SHA1

                                                                                              a9ef13293620569b088ea5cb757dfef73e7d893c

                                                                                              SHA256

                                                                                              08f1e3c2a9c7bbdf7d6ed07fbde9afe0e8aae8287f1c59e03482378c9a700732

                                                                                              SHA512

                                                                                              9516c4714c7b74656beee3b59398d79f419dd5fcb4549291c42eda339ce3179a229f5c445676196ea8475ec60ccb385ecd72a95cf76dfb802769d4c9ee863a30

                                                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-28346.exe

                                                                                              Filesize

                                                                                              184KB

                                                                                              MD5

                                                                                              91e4bafbb62572f0b456941657d818fb

                                                                                              SHA1

                                                                                              584ee6b89e3f3e79fb29e6473a5e03e5ae0615bc

                                                                                              SHA256

                                                                                              99d366b36f8b8ef2ba957387bc2a905aae71a26daa3562d0b47dee434f2272a4

                                                                                              SHA512

                                                                                              775f7963167dd642d96ac2af8f88ac5ead12a3f5cc61025050f0f8fa1a1496ea02b353fad684c7bc8314653bdf2b10763d9fb23be32ed33276448bc405f1452a

                                                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-3161.exe

                                                                                              Filesize

                                                                                              184KB

                                                                                              MD5

                                                                                              f6a7066d3509189ce229023edb65faaf

                                                                                              SHA1

                                                                                              ae3d1ab38797fda03798a8776aa862986e08e18b

                                                                                              SHA256

                                                                                              05f63f8600fda5d6a4669f64bc721582c5f40192095f6556524ab71ef39ca871

                                                                                              SHA512

                                                                                              f780e7f81f48eb5dda52656d1e9c19bc499c57d970e7a08e405697b8170add99a78e88104de41fe68bd668ac009ea8456b6b3ed196073c8c766563126b928365

                                                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-32622.exe

                                                                                              Filesize

                                                                                              184KB

                                                                                              MD5

                                                                                              5bb5bdf4cb520d01adb76e3e08907c31

                                                                                              SHA1

                                                                                              d9f6d4a26fa8568b4e6c71883cdb68c7a73041f5

                                                                                              SHA256

                                                                                              39912b42abb0776c850c66de2f54dff12931cc2ef6d28bb3ea2a2376f0e6937d

                                                                                              SHA512

                                                                                              997eb309438a288c4f544c903bb39c1bef2de3105b6add2d993ade19389f60cf290d80800aa783521c6444885eee533b2776fa9bee97afc178d2a8d9d4285da4

                                                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-33176.exe

                                                                                              Filesize

                                                                                              184KB

                                                                                              MD5

                                                                                              1f547961f1d8257cb0aeedc4ade360ae

                                                                                              SHA1

                                                                                              3eb3cbcc31bfb4bcde94227646a660e614dc819c

                                                                                              SHA256

                                                                                              b48308b6d4b6a453a6de999506238529bdbc797cf7ff4cf01ad48c43e44dcd30

                                                                                              SHA512

                                                                                              41cf0819bd09dce42bfb9edc2d925fd217cd03bfae475036428ae8bab7a8196478505686aabdc36bb470f479ff81199f7f976351e82fb720cb7c6cd460cd9c15

                                                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-42274.exe

                                                                                              Filesize

                                                                                              184KB

                                                                                              MD5

                                                                                              a0c59f304b93bfd4af8f8070ecf0ae67

                                                                                              SHA1

                                                                                              ae93f2cdc2cb2a1467fc575127692755ff3a06db

                                                                                              SHA256

                                                                                              e41359c2b8f17bd79c0d3c390d547d05be968d755d43bbfe87eaa313c94cf1de

                                                                                              SHA512

                                                                                              25d048cbb61ebd2fae61eb2b089f6962c1ba55237046b96dd7f2d6ac719dc8c45d02bb546f6f1d9ad839e002a797a03fffc929d68d205fa727b6d192ed152127

                                                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-46218.exe

                                                                                              Filesize

                                                                                              184KB

                                                                                              MD5

                                                                                              5ceb9bd005471367e3ce9bafc4d73647

                                                                                              SHA1

                                                                                              0d52304ebe802d50fa744b4730e026df17b840fb

                                                                                              SHA256

                                                                                              970d533ba3a5e6a27facfca593dd09e152e40340f66cde7c76db847bc4031f96

                                                                                              SHA512

                                                                                              3109926bef7483b4459b7697beffb87e02500e45e98cc02df16046bf6fc3934646a2cfc91069d1ef0954a6bafa5d1f2e2a305c9c507d4996aebfab460afc0aeb

                                                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-64806.exe

                                                                                              Filesize

                                                                                              184KB

                                                                                              MD5

                                                                                              ccc6826a895ab74c503112e391fba851

                                                                                              SHA1

                                                                                              9c36ffe46bee3f0a7a35e173eee08d25076ed727

                                                                                              SHA256

                                                                                              300f6e7b79d3279c05fb664448d9897969f27848ea79e1fcbe0cb7e9d31f778d

                                                                                              SHA512

                                                                                              29dc6848546c90a5e25986a8921b45ff3a3b06e68160a8ed0440cbc60333ed8715c5fbed8a542c7632260e58cdee95841d95d153842b1afee0a60e1babd41272

                                                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-919.exe

                                                                                              Filesize

                                                                                              184KB

                                                                                              MD5

                                                                                              3e77748dce6cccfe0e7a8b4da009fd8e

                                                                                              SHA1

                                                                                              feb50e826dc2d20d4e53e5c43039d2cdca4c5da8

                                                                                              SHA256

                                                                                              8d828091d7186238d00fa35b78e9ddf5bcd0652296c87a5c323a880da2c67fc4

                                                                                              SHA512

                                                                                              6b17f21db8ec079c22cd0761d8497abc66a266c8eb980999b49e4510acae05222efee5ed904c3f1b3c6add9ae6aaa0c41df7f7b8876dd88c5c94fbe90fb07a54