Analysis
-
max time kernel
33s -
max time network
122s -
platform
windows7_x64 -
resource
win7-20240319-en -
resource tags
arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system -
submitted
16/04/2024, 10:51
Static task
static1
Behavioral task
behavioral1
Sample
f35646dd70dd0f30ec06234666896feb_JaffaCakes118.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
f35646dd70dd0f30ec06234666896feb_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f35646dd70dd0f30ec06234666896feb_JaffaCakes118.exe
-
Size
184KB
-
MD5
f35646dd70dd0f30ec06234666896feb
-
SHA1
09b94f53ae746a7288ff9a7f362dd76489e23200
-
SHA256
ce507ed1454103fa6ac6f94cb925e4b8b91ba536cc888c7908fd270d8011e182
-
SHA512
4047f256a5fd33d4ae58da92be15d122a4144868557de25ac300fb5d05957c15e2580e7cbe88ff4c3d0fb675b6f5c2321728e57841fcfa8a2697a4d4bf3aead7
-
SSDEEP
3072:rCtwomg+Yr3ssmPo3dKQs+L4ZTMCWToFRxvwgXgNlvvpFB:rCCoF3szotKQsl4+uNlvvpF
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1996 Unicorn-33455.exe 2152 Unicorn-9080.exe 2176 Unicorn-50476.exe 2560 Unicorn-18292.exe 2256 Unicorn-31098.exe 2460 Unicorn-50964.exe 2492 Unicorn-11322.exe 2132 Unicorn-20045.exe 1960 Unicorn-4498.exe 2824 Unicorn-45339.exe 1036 Unicorn-777.exe 528 Unicorn-32978.exe 2788 Unicorn-47321.exe 488 Unicorn-33253.exe 1100 Unicorn-45313.exe 1700 Unicorn-41229.exe 2108 Unicorn-29531.exe 1584 Unicorn-20617.exe 2692 Unicorn-45676.exe 2148 Unicorn-26512.exe 1552 Unicorn-51379.exe 1520 Unicorn-1623.exe 1152 Unicorn-18514.exe 1828 Unicorn-38380.exe 2040 Unicorn-58608.exe 2164 Unicorn-27798.exe 1844 Unicorn-18884.exe 776 Unicorn-52111.exe 2892 Unicorn-35028.exe 1516 Unicorn-35028.exe 2244 Unicorn-2163.exe 2896 Unicorn-10886.exe 1752 Unicorn-52023.exe 1532 Unicorn-19905.exe 2124 Unicorn-2822.exe 2516 Unicorn-14882.exe 2636 Unicorn-15437.exe 2704 Unicorn-35303.exe 2604 Unicorn-49646.exe 2408 Unicorn-3974.exe 2452 Unicorn-28479.exe 2480 Unicorn-27964.exe 1968 Unicorn-48707.exe 2940 Unicorn-22942.exe 1824 Unicorn-15136.exe 2792 Unicorn-65126.exe 2484 Unicorn-52682.exe 1908 Unicorn-27986.exe 1952 Unicorn-8120.exe 764 Unicorn-32624.exe 1964 Unicorn-12225.exe 1088 Unicorn-20948.exe 2968 Unicorn-16393.exe 2312 Unicorn-49641.exe 2560 Unicorn-44851.exe 3004 Unicorn-32968.exe 1580 Unicorn-17784.exe 1156 Unicorn-46372.exe 2964 Unicorn-45796.exe 2976 Unicorn-45796.exe 2032 Unicorn-38780.exe 2212 Unicorn-1914.exe 2376 Unicorn-50347.exe 2504 Unicorn-50347.exe -
Loads dropped DLL 64 IoCs
pid Process 1736 f35646dd70dd0f30ec06234666896feb_JaffaCakes118.exe 1736 f35646dd70dd0f30ec06234666896feb_JaffaCakes118.exe 1996 Unicorn-33455.exe 1996 Unicorn-33455.exe 1736 f35646dd70dd0f30ec06234666896feb_JaffaCakes118.exe 1736 f35646dd70dd0f30ec06234666896feb_JaffaCakes118.exe 2152 Unicorn-9080.exe 2152 Unicorn-9080.exe 1996 Unicorn-33455.exe 1996 Unicorn-33455.exe 2176 Unicorn-50476.exe 2176 Unicorn-50476.exe 2560 Unicorn-18292.exe 2560 Unicorn-18292.exe 2152 Unicorn-9080.exe 2152 Unicorn-9080.exe 2256 Unicorn-31098.exe 2256 Unicorn-31098.exe 2460 Unicorn-50964.exe 2460 Unicorn-50964.exe 2176 Unicorn-50476.exe 2176 Unicorn-50476.exe 2492 Unicorn-11322.exe 2492 Unicorn-11322.exe 2560 Unicorn-18292.exe 2560 Unicorn-18292.exe 2132 Unicorn-20045.exe 2132 Unicorn-20045.exe 2824 Unicorn-45339.exe 2824 Unicorn-45339.exe 1960 Unicorn-4498.exe 1960 Unicorn-4498.exe 2460 Unicorn-50964.exe 1036 Unicorn-777.exe 1036 Unicorn-777.exe 2460 Unicorn-50964.exe 2256 Unicorn-31098.exe 2256 Unicorn-31098.exe 528 Unicorn-32978.exe 528 Unicorn-32978.exe 2492 Unicorn-11322.exe 2492 Unicorn-11322.exe 488 Unicorn-33253.exe 488 Unicorn-33253.exe 2132 Unicorn-20045.exe 2132 Unicorn-20045.exe 2788 Unicorn-47321.exe 2788 Unicorn-47321.exe 1700 Unicorn-41229.exe 1700 Unicorn-41229.exe 1960 Unicorn-4498.exe 1584 Unicorn-20617.exe 1960 Unicorn-4498.exe 1584 Unicorn-20617.exe 1036 Unicorn-777.exe 1036 Unicorn-777.exe 2108 Unicorn-29531.exe 2108 Unicorn-29531.exe 2692 Unicorn-45676.exe 2692 Unicorn-45676.exe 1100 Unicorn-45313.exe 1100 Unicorn-45313.exe 2824 Unicorn-45339.exe 2824 Unicorn-45339.exe -
Suspicious use of SetWindowsHookEx 56 IoCs
pid Process 1736 f35646dd70dd0f30ec06234666896feb_JaffaCakes118.exe 1996 Unicorn-33455.exe 2152 Unicorn-9080.exe 2176 Unicorn-50476.exe 2560 Unicorn-18292.exe 2256 Unicorn-31098.exe 2460 Unicorn-50964.exe 2492 Unicorn-11322.exe 2132 Unicorn-20045.exe 1960 Unicorn-4498.exe 2824 Unicorn-45339.exe 1036 Unicorn-777.exe 528 Unicorn-32978.exe 488 Unicorn-33253.exe 2788 Unicorn-47321.exe 1700 Unicorn-41229.exe 2692 Unicorn-45676.exe 1584 Unicorn-20617.exe 1100 Unicorn-45313.exe 2108 Unicorn-29531.exe 2148 Unicorn-26512.exe 1552 Unicorn-51379.exe 1520 Unicorn-1623.exe 1152 Unicorn-18514.exe 1828 Unicorn-38380.exe 2040 Unicorn-58608.exe 2164 Unicorn-27798.exe 1844 Unicorn-18884.exe 776 Unicorn-52111.exe 2892 Unicorn-35028.exe 2244 Unicorn-2163.exe 1752 Unicorn-52023.exe 2124 Unicorn-2822.exe 1532 Unicorn-19905.exe 2516 Unicorn-14882.exe 2636 Unicorn-15437.exe 2704 Unicorn-35303.exe 2408 Unicorn-3974.exe 2604 Unicorn-49646.exe 1968 Unicorn-48707.exe 2452 Unicorn-28479.exe 2480 Unicorn-27964.exe 1952 Unicorn-8120.exe 1908 Unicorn-27986.exe 1824 Unicorn-15136.exe 1880 Unicorn-32262.exe 2940 Unicorn-22942.exe 764 Unicorn-32624.exe 2792 Unicorn-65126.exe 2484 Unicorn-52682.exe 1088 Unicorn-20948.exe 1964 Unicorn-12225.exe 2968 Unicorn-16393.exe 2312 Unicorn-49641.exe 2560 Unicorn-44851.exe 3004 Unicorn-32968.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 1736 wrote to memory of 1996 1736 f35646dd70dd0f30ec06234666896feb_JaffaCakes118.exe 28 PID 1736 wrote to memory of 1996 1736 f35646dd70dd0f30ec06234666896feb_JaffaCakes118.exe 28 PID 1736 wrote to memory of 1996 1736 f35646dd70dd0f30ec06234666896feb_JaffaCakes118.exe 28 PID 1736 wrote to memory of 1996 1736 f35646dd70dd0f30ec06234666896feb_JaffaCakes118.exe 28 PID 1996 wrote to memory of 2152 1996 Unicorn-33455.exe 29 PID 1996 wrote to memory of 2152 1996 Unicorn-33455.exe 29 PID 1996 wrote to memory of 2152 1996 Unicorn-33455.exe 29 PID 1996 wrote to memory of 2152 1996 Unicorn-33455.exe 29 PID 1736 wrote to memory of 2176 1736 f35646dd70dd0f30ec06234666896feb_JaffaCakes118.exe 30 PID 1736 wrote to memory of 2176 1736 f35646dd70dd0f30ec06234666896feb_JaffaCakes118.exe 30 PID 1736 wrote to memory of 2176 1736 f35646dd70dd0f30ec06234666896feb_JaffaCakes118.exe 30 PID 1736 wrote to memory of 2176 1736 f35646dd70dd0f30ec06234666896feb_JaffaCakes118.exe 30 PID 2152 wrote to memory of 2560 2152 Unicorn-9080.exe 31 PID 2152 wrote to memory of 2560 2152 Unicorn-9080.exe 31 PID 2152 wrote to memory of 2560 2152 Unicorn-9080.exe 31 PID 2152 wrote to memory of 2560 2152 Unicorn-9080.exe 31 PID 1996 wrote to memory of 2256 1996 Unicorn-33455.exe 32 PID 1996 wrote to memory of 2256 1996 Unicorn-33455.exe 32 PID 1996 wrote to memory of 2256 1996 Unicorn-33455.exe 32 PID 1996 wrote to memory of 2256 1996 Unicorn-33455.exe 32 PID 2176 wrote to memory of 2460 2176 Unicorn-50476.exe 33 PID 2176 wrote to memory of 2460 2176 Unicorn-50476.exe 33 PID 2176 wrote to memory of 2460 2176 Unicorn-50476.exe 33 PID 2176 wrote to memory of 2460 2176 Unicorn-50476.exe 33 PID 2560 wrote to memory of 2492 2560 Unicorn-18292.exe 34 PID 2560 wrote to memory of 2492 2560 Unicorn-18292.exe 34 PID 2560 wrote to memory of 2492 2560 Unicorn-18292.exe 34 PID 2560 wrote to memory of 2492 2560 Unicorn-18292.exe 34 PID 2152 wrote to memory of 2132 2152 Unicorn-9080.exe 35 PID 2152 wrote to memory of 2132 2152 Unicorn-9080.exe 35 PID 2152 wrote to memory of 2132 2152 Unicorn-9080.exe 35 PID 2152 wrote to memory of 2132 2152 Unicorn-9080.exe 35 PID 2256 wrote to memory of 1960 2256 Unicorn-31098.exe 36 PID 2256 wrote to memory of 1960 2256 Unicorn-31098.exe 36 PID 2256 wrote to memory of 1960 2256 Unicorn-31098.exe 36 PID 2256 wrote to memory of 1960 2256 Unicorn-31098.exe 36 PID 2460 wrote to memory of 2824 2460 Unicorn-50964.exe 37 PID 2460 wrote to memory of 2824 2460 Unicorn-50964.exe 37 PID 2460 wrote to memory of 2824 2460 Unicorn-50964.exe 37 PID 2460 wrote to memory of 2824 2460 Unicorn-50964.exe 37 PID 2176 wrote to memory of 1036 2176 Unicorn-50476.exe 38 PID 2176 wrote to memory of 1036 2176 Unicorn-50476.exe 38 PID 2176 wrote to memory of 1036 2176 Unicorn-50476.exe 38 PID 2176 wrote to memory of 1036 2176 Unicorn-50476.exe 38 PID 2492 wrote to memory of 528 2492 Unicorn-11322.exe 39 PID 2492 wrote to memory of 528 2492 Unicorn-11322.exe 39 PID 2492 wrote to memory of 528 2492 Unicorn-11322.exe 39 PID 2492 wrote to memory of 528 2492 Unicorn-11322.exe 39 PID 2560 wrote to memory of 2788 2560 Unicorn-18292.exe 40 PID 2560 wrote to memory of 2788 2560 Unicorn-18292.exe 40 PID 2560 wrote to memory of 2788 2560 Unicorn-18292.exe 40 PID 2560 wrote to memory of 2788 2560 Unicorn-18292.exe 40 PID 2132 wrote to memory of 488 2132 Unicorn-20045.exe 41 PID 2132 wrote to memory of 488 2132 Unicorn-20045.exe 41 PID 2132 wrote to memory of 488 2132 Unicorn-20045.exe 41 PID 2132 wrote to memory of 488 2132 Unicorn-20045.exe 41 PID 2824 wrote to memory of 1100 2824 Unicorn-45339.exe 42 PID 2824 wrote to memory of 1100 2824 Unicorn-45339.exe 42 PID 2824 wrote to memory of 1100 2824 Unicorn-45339.exe 42 PID 2824 wrote to memory of 1100 2824 Unicorn-45339.exe 42 PID 1960 wrote to memory of 1700 1960 Unicorn-4498.exe 43 PID 1960 wrote to memory of 1700 1960 Unicorn-4498.exe 43 PID 1960 wrote to memory of 1700 1960 Unicorn-4498.exe 43 PID 1960 wrote to memory of 1700 1960 Unicorn-4498.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\f35646dd70dd0f30ec06234666896feb_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f35646dd70dd0f30ec06234666896feb_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1736 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-33455.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33455.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1996 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9080.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9080.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2152 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18292.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18292.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2560 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11322.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11322.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-32978.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32978.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:528 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26512.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26512.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-52023.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52023.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12225.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12225.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50347.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50347.exe10⤵
- Executes dropped EXE
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49572.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49572.exe11⤵PID:2288
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20948.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20948.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1088 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45796.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45796.exe9⤵
- Executes dropped EXE
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37350.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37350.exe10⤵PID:2076
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19905.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19905.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1532 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16393.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16393.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49572.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49572.exe9⤵PID:2060
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51379.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51379.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1552 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-2822.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2822.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2124
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47321.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47321.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38380.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38380.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1828 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35303.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35303.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50347.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50347.exe8⤵PID:2228
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49646.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49646.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38780.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38780.exe7⤵
- Executes dropped EXE
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47512.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47512.exe8⤵PID:1020
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48519.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48519.exe9⤵PID:752
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53361.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53361.exe10⤵PID:2388
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20045.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20045.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-33253.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33253.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:488 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-1623.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1623.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14882.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14882.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2516 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49641.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49641.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2312
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44851.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44851.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2560
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15437.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15437.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2636 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-32968.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32968.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3004
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18514.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18514.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1152 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3974.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3974.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2408 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50347.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50347.exe7⤵PID:1944
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35125.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35125.exe8⤵PID:2208
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31098.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31098.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-4498.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4498.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-41229.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41229.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1700 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58608.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58608.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2040 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-28479.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28479.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2452 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46372.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46372.exe8⤵
- Executes dropped EXE
PID:1156
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27964.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27964.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2480 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14550.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14550.exe7⤵PID:1904
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30652.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30652.exe8⤵PID:1896
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27798.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27798.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2164 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48707.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48707.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1968 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45796.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45796.exe7⤵
- Executes dropped EXE
PID:2976
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45676.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45676.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35028.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35028.exe5⤵
- Executes dropped EXE
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13182.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13182.exe6⤵PID:2724
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15617.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15617.exe7⤵PID:1876
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34994.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34994.exe8⤵PID:1988
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50476.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50476.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50964.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50964.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45339.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45339.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2824 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45313.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45313.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1100 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-2163.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2163.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27986.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27986.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50347.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50347.exe8⤵PID:2984
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32624.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32624.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:764 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-39500.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39500.exe7⤵PID:2580
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44435.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44435.exe8⤵PID:1772
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58976.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58976.exe9⤵PID:2936
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60001.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60001.exe10⤵PID:1448
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10886.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10886.exe5⤵
- Executes dropped EXE
PID:2896 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-32262.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32262.exe6⤵
- Suspicious use of SetWindowsHookEx
PID:1880 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50347.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50347.exe7⤵
- Executes dropped EXE
PID:2504
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29531.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29531.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2108 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35028.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35028.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-52682.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52682.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23055.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23055.exe7⤵PID:1604
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8120.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8120.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49572.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49572.exe6⤵PID:2316
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23444.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23444.exe7⤵PID:2456
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55416.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55416.exe8⤵PID:2948
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7720.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7720.exe9⤵PID:2472
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-777.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-777.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1036 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-20617.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20617.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1584 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18884.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18884.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1844 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22942.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22942.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-1914.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1914.exe7⤵
- Executes dropped EXE
PID:2212
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-15136.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15136.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1824 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17784.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17784.exe6⤵
- Executes dropped EXE
PID:1580 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15036.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15036.exe7⤵PID:2328
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21597.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21597.exe8⤵PID:1892
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52111.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52111.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:776 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-65126.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65126.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61627.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61627.exe6⤵PID:1552
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD55fd10bfd88fc7e42601d641668d8e21d
SHA17ca7801d2a6d2e79cd2bfa7ea46f59c3f98c02e7
SHA2562dc22c209f3666a7815bc4494960abaff2548d445418bf66eee447e8bf64d6bd
SHA512af68deccb885911f3f9e231e545d629493044df6cd96a27b8409cb354fd5429fdea9823509387e70baf4f7e0c16a86cc7ae45887212c83b87653c7ac8b1e4159
-
Filesize
184KB
MD55625d667468a342f11b722981e3a08fa
SHA1e3d1afc3c165b8e11122cdeae8213f32cdd833bb
SHA256fab6e1ab97905b0586a2f0228a67bf7dffd396e9aee47952b6ee7cdaf091468f
SHA51271f7d9dde58619e43dcf022ca7398f3b2d5bef14e373f02c31fdc9ba457e323680ce7d3b974d06d62a35895e69db02fb9903f51ab1343ff2728ec459b22a3b6c
-
Filesize
184KB
MD51e1c32c1eb13ec63336fd162d8a0e660
SHA1722f33a92b8e25491a3daffead9a45ab2d54a7a3
SHA256f6af36850eac744409e11b93c27a833ab10b9b64c11035bf4a1a7d00b6e22e87
SHA512fe3bbc339bcdf6e6d3bbd1a05cff2fc3a0364ab971af3bfe2c2bb6ce0f9e48d0a6cfc6a04427cb42576a7d076aa86475650a707a3a076c61800bd7e5687336eb
-
Filesize
184KB
MD588fc190478e4937f36fef8722bbf5f86
SHA17bfbb61e6593b6e98ee2792fa1081dd1264f0819
SHA256590b2d18bf448b3c3218770b9d9ac53e98dbcfbcb582fd419a32acac1e083dcb
SHA51211e921a175fee150bd462ae5a8d93a143028c98ff42319d057a8c5d07ff942ded57ad7178ae8541d3b323bf8812e4d5baebdf57849f943dac9ab9f4f322e07c6
-
Filesize
184KB
MD5bfc77aacb01b57be9f1713fcb668b396
SHA119a77ab07171ed75f94495cb54ef6a219cff7c12
SHA25634071ee9bab4ef34344310cfa58c1a1158d125789e7288754e6a7748e169a007
SHA5127da2aa18a4e3cbcac10a854699c83e0ccdb315858a61f77bb3d5465307f0fa9453d5811ba303ebd71f959ba91d5d9899cc9403ae60785a382d1869659c13a8ec
-
Filesize
184KB
MD5ec8ce21dd9636af3b89ff0950ba82192
SHA1c369049d555c06bb1c99e1801790d2afa2d919e4
SHA256ed9b0cf22122c00c4f7c99a8797709e5663fa15ec703ea79756945e6f3c40e53
SHA512fa6b7b307873dc638780b22d14a265df21e538da7668d3331cfd2e17ebb9aedaa250d782bba2621447a6a60e2d619833407962908c1522dbe9da042a98b188aa
-
Filesize
184KB
MD5087e4cf8335d1a7170cd7ee3b07f1bdf
SHA11b18941d8e6cf15032a5f4d08dea81c1b7cedb97
SHA256052a4cb13eb90932ded7be2b91e94585d1fa76e175495888812c04803853a83d
SHA51244be60fb097859f39f096ad97544fbcd81a075e66b07ab898cb2da66e8e4428960d045dce497167adaa5f2a83a12de4bd035bdd260210fc92624bafba92c8249
-
Filesize
184KB
MD5f75904ccf3fdd559f626d557ac5ee2e3
SHA1359021905987f0a2e6b3b70a7993126c56b89d20
SHA256c80969b3f9a2409b0770b7a1c9f3e1f344bfb25c544684fb05bfd2f8d7f82b3c
SHA51261a7f87a1a198ba908fc73d8c8fa666f689664366417312a183355a573514c9c14eca19dbf520b82db7c549a331171230be5d9d336840fe08f8b065fa3ee281c
-
Filesize
184KB
MD5f876a2818afb929cb59248c8689978de
SHA1d734d4e88f7fc52da40479fa80618b00433fd221
SHA256f9c0d01770f74c2214e3b70d6e2648d1080a92747a5c8d6c53788ee3a5c0eac0
SHA5129d01588cd65ee9f4d6c30768bc864dcef1ca48bcfc18966b178758ad88cafbd94cc29f5271bfb974714f5f139eba39e5a8aee459e1ccd9a9a51204e2fcf5a5ce
-
Filesize
184KB
MD53c6a7c09b353ce4ad75cf5cc674baba8
SHA1cf81507f723a8eaf15169f9f54f31552b8430c65
SHA25696107adb66f1c1c8501cdad3467d2e64bc640ba7856eaac2ead07144cd6f42dc
SHA512278b50c3b18a5e742afa66458bad4c2e1915d39fa861840b1fb1702571532f0a1f52b4d79b30e7dbe28d6324972bcadbb32f208c11fc2f144b1b1ae0597fed7f
-
Filesize
184KB
MD5d64df896f5c8eeb54836ab82bff1a61b
SHA1b1884483d38e17f22a6348df7180a59a88efd1e6
SHA256656ce1151ef06da152911e8cc88e8e4e4958824f764dfb582172cb0dd6e07f70
SHA512e672b9ad676953fa763084f8e41d7f4ae2b78bf3e0012a9ee42a608564bcaaddb953b86e491d1b53bb1bac496b00761cc7589de6382f3fd6b44698e4fcba13a2
-
Filesize
184KB
MD55ffeae52bb2a7c337182abc0f472ee49
SHA13b93335b43121c9855f650192ba56d4a18d2b73d
SHA256e57da55d6b6039fd805058866a5bb4f423039d29d259dc9491abae5bc441cfc5
SHA51212f9448beb44add27470d5a26567a3444500e3cb538cbd2e19cfff761885a6047148c4b9ee2c8044585b5ab9f867ee52029b1b09adafbcb37c141b325d6a970d
-
Filesize
184KB
MD5592244edd859b3fff8e7318bb2e9bc14
SHA11f8a6c08b1ffdc41a6833211c2ce12b05b6021d6
SHA25626eeeb959b67eeb48ec99d087a9ca2b883eadd8a71743bc7aade1d591c0997c0
SHA51273bf8e2c8cce04aa197e3361409b45773579c7c155db6ace7800775edfd4650ff7e41bc1d6d2cec75b3b8852fd88ac0dfc4129fadb9bca10a5279d8ba4fc535b
-
Filesize
184KB
MD593d15d166051c7bea125b8a3477f9f76
SHA16ab2e3d532f744ee8465325f359be07c34001e4d
SHA25617533e8f6b3e958432b7e928aae0c8fb6e3aac370b4d0d8d99abcd402c0e3ace
SHA5126ac79641d227ad765394e1006c199119f9595c8650df3d58f4d966133c339db84bc3b131c170ca5641d5cf3ccb00491531637a2d684324c59d8b6abdd4908c5b
-
Filesize
184KB
MD5c25d3cf7765732c5ea95ffb4faa355c6
SHA1ad2f8612eff9a9c2c486f66aca8634a5eb80ab99
SHA256575baac1f4cdb55ff1e177d4d08a8a516d8ad156b5d5281485948fcb4fd6041a
SHA512c2a0282016a46491c4777957db109ed48fc91f71362b2b52d18c01c621727122361996359476c7fba041bf4c4af4a8d71bfcf480ec5b460ee03fa606be847523
-
Filesize
184KB
MD5f36b52e06fe8442f4df7be27a00449a4
SHA1eb4563634514b68d2ff50e6e062e9d6ec7d359bc
SHA256db961cc2a9233806fc5d6a5c151422eb39ad88a2c800d18eb0edb7461e676c0e
SHA512368acc27e2242d3b2c1b2fab53bab451063eced6ed09086812c1ff5db29019454a785b6a29ff3d5fd82b55a6afe6fe525827dd4d0dc1cd5e6005ab408e706f1c
-
Filesize
184KB
MD55346107bc0186a9bc10cb86e706b543f
SHA1404c70806d9543f93a78597223bbf575ecf012ac
SHA25651c0471ddfe13023cc1922ddcbb2bdd65268294d77836db38d663fc30a6e256b
SHA512412e1385711def125d0c6b48785524d6dd826246e0f1646258f0e07315b682a6b497ee4b2fb2cf77d2c41acad74ded545e91f656d47c994a719b393873877ed3
-
Filesize
184KB
MD53f4ba84c593088c9184225bbd6bde491
SHA11852e5dd125c466c39f0651bf248b628952c02ed
SHA256bf5ba461b886ff21d3cc9161743671039e47797e25767342648c0884c02b6741
SHA51269896973d1ffe7c82820719a989c66728edf4b8c2a999d6f8f770ac2c6d37f4d0275de2a326e1b83c770f1b17315162cfc1ae3d2e674a9d2d2d5d5b735b3c7af
-
Filesize
184KB
MD5c7fb7fb8434e4cefee3f38a0dfdd6f20
SHA156e3bcdac603c06a50844d9541555225213d0686
SHA2569a76e6646ba978a2f96549add8ed0d21e33e1d61c34bd05995839a47aa033208
SHA512041d480820aab0d2479349a92e337df79ffb68854925fdf247e7af8f98540540e9718f9d0164b96fe8aa8a41c509b5c2c65fea4c130addb13d9d40057fb5101b
-
Filesize
184KB
MD534bd1c2c4f2beef159e978387cd218af
SHA1425504544aa851e9dea9f517a2a1b1e2d8531485
SHA25670ed4d2d78a8a41c93f7c152a40babe95fa77c79ea61170898f06b334893216f
SHA5125f1c5410b3f7e6c508c7b2ced428c23d2c58a8d9fa1a25e50d1b5ea07f9977e2d404ba3c93dd245a7576d59e2a2cb2b4be3802334f75a6476a41aaf93ea16e35
-
Filesize
184KB
MD5951ccfbf1f3ae4db1cafdd1e2e058095
SHA1be728f55e8348ffd72a1f97d45bbcf5bcf2048f3
SHA25656d137496b90ed962de1623d384b97b33af3246321ccc34902b260a06ba8d2ba
SHA512221234a014134432fa5d31d44e6c03f5d28cb9d68124455e8b807692345ad7b443c09e1880cd17e5837a17dce51dd24322cabc1a96071ebee5ba77689c4608e3
-
Filesize
184KB
MD5597d3378ab0ccb189963c7be3f3a434d
SHA146e64d267b90cce9d90e1348c9eb817eaaa5c29b
SHA25638966de500dcf87f9f0e78b78e47b17d6976f10c1d0facecbb4ce11ef6a58b20
SHA51244857ba091f6fe7c9e81f653f28d11dd4a86e359a92b250aac6538c308f295ac0305a31be2d358989cb23b8f749c801003539eb7cf0346f74b66f8155d81068d