Analysis

  • max time kernel
    33s
  • max time network
    122s
  • platform
    windows7_x64
  • resource
    win7-20240319-en
  • resource tags

    arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system
  • submitted
    16/04/2024, 10:51

General

  • Target

    f35646dd70dd0f30ec06234666896feb_JaffaCakes118.exe

  • Size

    184KB

  • MD5

    f35646dd70dd0f30ec06234666896feb

  • SHA1

    09b94f53ae746a7288ff9a7f362dd76489e23200

  • SHA256

    ce507ed1454103fa6ac6f94cb925e4b8b91ba536cc888c7908fd270d8011e182

  • SHA512

    4047f256a5fd33d4ae58da92be15d122a4144868557de25ac300fb5d05957c15e2580e7cbe88ff4c3d0fb675b6f5c2321728e57841fcfa8a2697a4d4bf3aead7

  • SSDEEP

    3072:rCtwomg+Yr3ssmPo3dKQs+L4ZTMCWToFRxvwgXgNlvvpFB:rCCoF3szotKQsl4+uNlvvpF

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 64 IoCs
  • Loads dropped DLL 64 IoCs
  • Suspicious use of SetWindowsHookEx 56 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f35646dd70dd0f30ec06234666896feb_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f35646dd70dd0f30ec06234666896feb_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1736
    • C:\Users\Admin\AppData\Local\Temp\Unicorn-33455.exe
      C:\Users\Admin\AppData\Local\Temp\Unicorn-33455.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1996
      • C:\Users\Admin\AppData\Local\Temp\Unicorn-9080.exe
        C:\Users\Admin\AppData\Local\Temp\Unicorn-9080.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2152
        • C:\Users\Admin\AppData\Local\Temp\Unicorn-18292.exe
          C:\Users\Admin\AppData\Local\Temp\Unicorn-18292.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2560
          • C:\Users\Admin\AppData\Local\Temp\Unicorn-11322.exe
            C:\Users\Admin\AppData\Local\Temp\Unicorn-11322.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2492
            • C:\Users\Admin\AppData\Local\Temp\Unicorn-32978.exe
              C:\Users\Admin\AppData\Local\Temp\Unicorn-32978.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              PID:528
              • C:\Users\Admin\AppData\Local\Temp\Unicorn-26512.exe
                C:\Users\Admin\AppData\Local\Temp\Unicorn-26512.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:2148
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-52023.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-52023.exe
                  8⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:1752
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-12225.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-12225.exe
                    9⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:1964
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-50347.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-50347.exe
                      10⤵
                      • Executes dropped EXE
                      PID:2376
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-49572.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-49572.exe
                        11⤵
                          PID:2288
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-20948.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-20948.exe
                    8⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:1088
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-45796.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-45796.exe
                      9⤵
                      • Executes dropped EXE
                      PID:2964
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-37350.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-37350.exe
                        10⤵
                          PID:2076
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-19905.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-19905.exe
                    7⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:1532
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-16393.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-16393.exe
                      8⤵
                      • Executes dropped EXE
                      • Suspicious use of SetWindowsHookEx
                      PID:2968
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-49572.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-49572.exe
                        9⤵
                          PID:2060
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-51379.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-51379.exe
                    6⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:1552
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-2822.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-2822.exe
                      7⤵
                      • Executes dropped EXE
                      • Suspicious use of SetWindowsHookEx
                      PID:2124
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-47321.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-47321.exe
                  5⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of SetWindowsHookEx
                  PID:2788
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-38380.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-38380.exe
                    6⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:1828
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-35303.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-35303.exe
                      7⤵
                      • Executes dropped EXE
                      • Suspicious use of SetWindowsHookEx
                      PID:2704
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-50347.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-50347.exe
                        8⤵
                          PID:2228
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-49646.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-49646.exe
                      6⤵
                      • Executes dropped EXE
                      • Suspicious use of SetWindowsHookEx
                      PID:2604
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-38780.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-38780.exe
                        7⤵
                        • Executes dropped EXE
                        PID:2032
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-47512.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-47512.exe
                          8⤵
                            PID:1020
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-48519.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-48519.exe
                              9⤵
                                PID:752
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-53361.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-53361.exe
                                  10⤵
                                    PID:2388
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-20045.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-20045.exe
                        4⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Suspicious use of SetWindowsHookEx
                        • Suspicious use of WriteProcessMemory
                        PID:2132
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-33253.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-33253.exe
                          5⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Suspicious use of SetWindowsHookEx
                          PID:488
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-1623.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-1623.exe
                            6⤵
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            PID:1520
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-14882.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-14882.exe
                              7⤵
                              • Executes dropped EXE
                              • Suspicious use of SetWindowsHookEx
                              PID:2516
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-49641.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-49641.exe
                                8⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                PID:2312
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-44851.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-44851.exe
                              7⤵
                              • Executes dropped EXE
                              • Suspicious use of SetWindowsHookEx
                              PID:2560
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-15437.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-15437.exe
                            6⤵
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            PID:2636
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-32968.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-32968.exe
                              7⤵
                              • Executes dropped EXE
                              • Suspicious use of SetWindowsHookEx
                              PID:3004
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-18514.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-18514.exe
                          5⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:1152
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-3974.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-3974.exe
                            6⤵
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            PID:2408
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-50347.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-50347.exe
                              7⤵
                                PID:1944
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-35125.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-35125.exe
                                  8⤵
                                    PID:2208
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-31098.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-31098.exe
                          3⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Suspicious use of SetWindowsHookEx
                          • Suspicious use of WriteProcessMemory
                          PID:2256
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-4498.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-4498.exe
                            4⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Suspicious use of SetWindowsHookEx
                            • Suspicious use of WriteProcessMemory
                            PID:1960
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-41229.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-41229.exe
                              5⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • Suspicious use of SetWindowsHookEx
                              PID:1700
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-58608.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-58608.exe
                                6⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                PID:2040
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-28479.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-28479.exe
                                  7⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetWindowsHookEx
                                  PID:2452
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-46372.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-46372.exe
                                    8⤵
                                    • Executes dropped EXE
                                    PID:1156
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-27964.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-27964.exe
                                6⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                PID:2480
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-14550.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-14550.exe
                                  7⤵
                                    PID:1904
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-30652.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-30652.exe
                                      8⤵
                                        PID:1896
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-27798.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-27798.exe
                                  5⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetWindowsHookEx
                                  PID:2164
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-48707.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-48707.exe
                                    6⤵
                                    • Executes dropped EXE
                                    • Suspicious use of SetWindowsHookEx
                                    PID:1968
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-45796.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-45796.exe
                                      7⤵
                                      • Executes dropped EXE
                                      PID:2976
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-45676.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-45676.exe
                                4⤵
                                • Executes dropped EXE
                                • Loads dropped DLL
                                • Suspicious use of SetWindowsHookEx
                                PID:2692
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-35028.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-35028.exe
                                  5⤵
                                  • Executes dropped EXE
                                  PID:1516
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-13182.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-13182.exe
                                    6⤵
                                      PID:2724
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-15617.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-15617.exe
                                        7⤵
                                          PID:1876
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-34994.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-34994.exe
                                            8⤵
                                              PID:1988
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-50476.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-50476.exe
                                  2⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Suspicious use of SetWindowsHookEx
                                  • Suspicious use of WriteProcessMemory
                                  PID:2176
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-50964.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-50964.exe
                                    3⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • Suspicious use of SetWindowsHookEx
                                    • Suspicious use of WriteProcessMemory
                                    PID:2460
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-45339.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-45339.exe
                                      4⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Suspicious use of SetWindowsHookEx
                                      • Suspicious use of WriteProcessMemory
                                      PID:2824
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-45313.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-45313.exe
                                        5⤵
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        • Suspicious use of SetWindowsHookEx
                                        PID:1100
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-2163.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-2163.exe
                                          6⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetWindowsHookEx
                                          PID:2244
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-27986.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-27986.exe
                                            7⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetWindowsHookEx
                                            PID:1908
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-50347.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-50347.exe
                                              8⤵
                                                PID:2984
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-32624.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-32624.exe
                                            6⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetWindowsHookEx
                                            PID:764
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-39500.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-39500.exe
                                              7⤵
                                                PID:2580
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-44435.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-44435.exe
                                                  8⤵
                                                    PID:1772
                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-58976.exe
                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-58976.exe
                                                      9⤵
                                                        PID:2936
                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-60001.exe
                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-60001.exe
                                                          10⤵
                                                            PID:1448
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-10886.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-10886.exe
                                                  5⤵
                                                  • Executes dropped EXE
                                                  PID:2896
                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-32262.exe
                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-32262.exe
                                                    6⤵
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:1880
                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-50347.exe
                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-50347.exe
                                                      7⤵
                                                      • Executes dropped EXE
                                                      PID:2504
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-29531.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-29531.exe
                                                4⤵
                                                • Executes dropped EXE
                                                • Loads dropped DLL
                                                • Suspicious use of SetWindowsHookEx
                                                PID:2108
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-35028.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-35028.exe
                                                  5⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:2892
                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-52682.exe
                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-52682.exe
                                                    6⤵
                                                    • Executes dropped EXE
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:2484
                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-23055.exe
                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-23055.exe
                                                      7⤵
                                                        PID:1604
                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-8120.exe
                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-8120.exe
                                                    5⤵
                                                    • Executes dropped EXE
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:1952
                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-49572.exe
                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-49572.exe
                                                      6⤵
                                                        PID:2316
                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-23444.exe
                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-23444.exe
                                                          7⤵
                                                            PID:2456
                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-55416.exe
                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-55416.exe
                                                              8⤵
                                                                PID:2948
                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-7720.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-7720.exe
                                                                  9⤵
                                                                    PID:2472
                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-777.exe
                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-777.exe
                                                        3⤵
                                                        • Executes dropped EXE
                                                        • Loads dropped DLL
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:1036
                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-20617.exe
                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-20617.exe
                                                          4⤵
                                                          • Executes dropped EXE
                                                          • Loads dropped DLL
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:1584
                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-18884.exe
                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-18884.exe
                                                            5⤵
                                                            • Executes dropped EXE
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:1844
                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-22942.exe
                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-22942.exe
                                                              6⤵
                                                              • Executes dropped EXE
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:2940
                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-1914.exe
                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-1914.exe
                                                                7⤵
                                                                • Executes dropped EXE
                                                                PID:2212
                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-15136.exe
                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-15136.exe
                                                            5⤵
                                                            • Executes dropped EXE
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:1824
                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-17784.exe
                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-17784.exe
                                                              6⤵
                                                              • Executes dropped EXE
                                                              PID:1580
                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-15036.exe
                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-15036.exe
                                                                7⤵
                                                                  PID:2328
                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-21597.exe
                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-21597.exe
                                                                    8⤵
                                                                      PID:1892
                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-52111.exe
                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-52111.exe
                                                              4⤵
                                                              • Executes dropped EXE
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:776
                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-65126.exe
                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-65126.exe
                                                                5⤵
                                                                • Executes dropped EXE
                                                                • Suspicious use of SetWindowsHookEx
                                                                PID:2792
                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-61627.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-61627.exe
                                                                  6⤵
                                                                    PID:1552

                                                        Network

                                                              MITRE ATT&CK Matrix

                                                              Replay Monitor

                                                              Loading Replay Monitor...

                                                              Downloads

                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-14550.exe

                                                                Filesize

                                                                184KB

                                                                MD5

                                                                5fd10bfd88fc7e42601d641668d8e21d

                                                                SHA1

                                                                7ca7801d2a6d2e79cd2bfa7ea46f59c3f98c02e7

                                                                SHA256

                                                                2dc22c209f3666a7815bc4494960abaff2548d445418bf66eee447e8bf64d6bd

                                                                SHA512

                                                                af68deccb885911f3f9e231e545d629493044df6cd96a27b8409cb354fd5429fdea9823509387e70baf4f7e0c16a86cc7ae45887212c83b87653c7ac8b1e4159

                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-17784.exe

                                                                Filesize

                                                                184KB

                                                                MD5

                                                                5625d667468a342f11b722981e3a08fa

                                                                SHA1

                                                                e3d1afc3c165b8e11122cdeae8213f32cdd833bb

                                                                SHA256

                                                                fab6e1ab97905b0586a2f0228a67bf7dffd396e9aee47952b6ee7cdaf091468f

                                                                SHA512

                                                                71f7d9dde58619e43dcf022ca7398f3b2d5bef14e373f02c31fdc9ba457e323680ce7d3b974d06d62a35895e69db02fb9903f51ab1343ff2728ec459b22a3b6c

                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-22942.exe

                                                                Filesize

                                                                184KB

                                                                MD5

                                                                1e1c32c1eb13ec63336fd162d8a0e660

                                                                SHA1

                                                                722f33a92b8e25491a3daffead9a45ab2d54a7a3

                                                                SHA256

                                                                f6af36850eac744409e11b93c27a833ab10b9b64c11035bf4a1a7d00b6e22e87

                                                                SHA512

                                                                fe3bbc339bcdf6e6d3bbd1a05cff2fc3a0364ab971af3bfe2c2bb6ce0f9e48d0a6cfc6a04427cb42576a7d076aa86475650a707a3a076c61800bd7e5687336eb

                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-23444.exe

                                                                Filesize

                                                                184KB

                                                                MD5

                                                                88fc190478e4937f36fef8722bbf5f86

                                                                SHA1

                                                                7bfbb61e6593b6e98ee2792fa1081dd1264f0819

                                                                SHA256

                                                                590b2d18bf448b3c3218770b9d9ac53e98dbcfbcb582fd419a32acac1e083dcb

                                                                SHA512

                                                                11e921a175fee150bd462ae5a8d93a143028c98ff42319d057a8c5d07ff942ded57ad7178ae8541d3b323bf8812e4d5baebdf57849f943dac9ab9f4f322e07c6

                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-33253.exe

                                                                Filesize

                                                                184KB

                                                                MD5

                                                                bfc77aacb01b57be9f1713fcb668b396

                                                                SHA1

                                                                19a77ab07171ed75f94495cb54ef6a219cff7c12

                                                                SHA256

                                                                34071ee9bab4ef34344310cfa58c1a1158d125789e7288754e6a7748e169a007

                                                                SHA512

                                                                7da2aa18a4e3cbcac10a854699c83e0ccdb315858a61f77bb3d5465307f0fa9453d5811ba303ebd71f959ba91d5d9899cc9403ae60785a382d1869659c13a8ec

                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-41229.exe

                                                                Filesize

                                                                184KB

                                                                MD5

                                                                ec8ce21dd9636af3b89ff0950ba82192

                                                                SHA1

                                                                c369049d555c06bb1c99e1801790d2afa2d919e4

                                                                SHA256

                                                                ed9b0cf22122c00c4f7c99a8797709e5663fa15ec703ea79756945e6f3c40e53

                                                                SHA512

                                                                fa6b7b307873dc638780b22d14a265df21e538da7668d3331cfd2e17ebb9aedaa250d782bba2621447a6a60e2d619833407962908c1522dbe9da042a98b188aa

                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-4498.exe

                                                                Filesize

                                                                184KB

                                                                MD5

                                                                087e4cf8335d1a7170cd7ee3b07f1bdf

                                                                SHA1

                                                                1b18941d8e6cf15032a5f4d08dea81c1b7cedb97

                                                                SHA256

                                                                052a4cb13eb90932ded7be2b91e94585d1fa76e175495888812c04803853a83d

                                                                SHA512

                                                                44be60fb097859f39f096ad97544fbcd81a075e66b07ab898cb2da66e8e4428960d045dce497167adaa5f2a83a12de4bd035bdd260210fc92624bafba92c8249

                                                              • \Users\Admin\AppData\Local\Temp\Unicorn-11322.exe

                                                                Filesize

                                                                184KB

                                                                MD5

                                                                f75904ccf3fdd559f626d557ac5ee2e3

                                                                SHA1

                                                                359021905987f0a2e6b3b70a7993126c56b89d20

                                                                SHA256

                                                                c80969b3f9a2409b0770b7a1c9f3e1f344bfb25c544684fb05bfd2f8d7f82b3c

                                                                SHA512

                                                                61a7f87a1a198ba908fc73d8c8fa666f689664366417312a183355a573514c9c14eca19dbf520b82db7c549a331171230be5d9d336840fe08f8b065fa3ee281c

                                                              • \Users\Admin\AppData\Local\Temp\Unicorn-18292.exe

                                                                Filesize

                                                                184KB

                                                                MD5

                                                                f876a2818afb929cb59248c8689978de

                                                                SHA1

                                                                d734d4e88f7fc52da40479fa80618b00433fd221

                                                                SHA256

                                                                f9c0d01770f74c2214e3b70d6e2648d1080a92747a5c8d6c53788ee3a5c0eac0

                                                                SHA512

                                                                9d01588cd65ee9f4d6c30768bc864dcef1ca48bcfc18966b178758ad88cafbd94cc29f5271bfb974714f5f139eba39e5a8aee459e1ccd9a9a51204e2fcf5a5ce

                                                              • \Users\Admin\AppData\Local\Temp\Unicorn-20045.exe

                                                                Filesize

                                                                184KB

                                                                MD5

                                                                3c6a7c09b353ce4ad75cf5cc674baba8

                                                                SHA1

                                                                cf81507f723a8eaf15169f9f54f31552b8430c65

                                                                SHA256

                                                                96107adb66f1c1c8501cdad3467d2e64bc640ba7856eaac2ead07144cd6f42dc

                                                                SHA512

                                                                278b50c3b18a5e742afa66458bad4c2e1915d39fa861840b1fb1702571532f0a1f52b4d79b30e7dbe28d6324972bcadbb32f208c11fc2f144b1b1ae0597fed7f

                                                              • \Users\Admin\AppData\Local\Temp\Unicorn-20617.exe

                                                                Filesize

                                                                184KB

                                                                MD5

                                                                d64df896f5c8eeb54836ab82bff1a61b

                                                                SHA1

                                                                b1884483d38e17f22a6348df7180a59a88efd1e6

                                                                SHA256

                                                                656ce1151ef06da152911e8cc88e8e4e4958824f764dfb582172cb0dd6e07f70

                                                                SHA512

                                                                e672b9ad676953fa763084f8e41d7f4ae2b78bf3e0012a9ee42a608564bcaaddb953b86e491d1b53bb1bac496b00761cc7589de6382f3fd6b44698e4fcba13a2

                                                              • \Users\Admin\AppData\Local\Temp\Unicorn-29531.exe

                                                                Filesize

                                                                184KB

                                                                MD5

                                                                5ffeae52bb2a7c337182abc0f472ee49

                                                                SHA1

                                                                3b93335b43121c9855f650192ba56d4a18d2b73d

                                                                SHA256

                                                                e57da55d6b6039fd805058866a5bb4f423039d29d259dc9491abae5bc441cfc5

                                                                SHA512

                                                                12f9448beb44add27470d5a26567a3444500e3cb538cbd2e19cfff761885a6047148c4b9ee2c8044585b5ab9f867ee52029b1b09adafbcb37c141b325d6a970d

                                                              • \Users\Admin\AppData\Local\Temp\Unicorn-31098.exe

                                                                Filesize

                                                                184KB

                                                                MD5

                                                                592244edd859b3fff8e7318bb2e9bc14

                                                                SHA1

                                                                1f8a6c08b1ffdc41a6833211c2ce12b05b6021d6

                                                                SHA256

                                                                26eeeb959b67eeb48ec99d087a9ca2b883eadd8a71743bc7aade1d591c0997c0

                                                                SHA512

                                                                73bf8e2c8cce04aa197e3361409b45773579c7c155db6ace7800775edfd4650ff7e41bc1d6d2cec75b3b8852fd88ac0dfc4129fadb9bca10a5279d8ba4fc535b

                                                              • \Users\Admin\AppData\Local\Temp\Unicorn-32978.exe

                                                                Filesize

                                                                184KB

                                                                MD5

                                                                93d15d166051c7bea125b8a3477f9f76

                                                                SHA1

                                                                6ab2e3d532f744ee8465325f359be07c34001e4d

                                                                SHA256

                                                                17533e8f6b3e958432b7e928aae0c8fb6e3aac370b4d0d8d99abcd402c0e3ace

                                                                SHA512

                                                                6ac79641d227ad765394e1006c199119f9595c8650df3d58f4d966133c339db84bc3b131c170ca5641d5cf3ccb00491531637a2d684324c59d8b6abdd4908c5b

                                                              • \Users\Admin\AppData\Local\Temp\Unicorn-33455.exe

                                                                Filesize

                                                                184KB

                                                                MD5

                                                                c25d3cf7765732c5ea95ffb4faa355c6

                                                                SHA1

                                                                ad2f8612eff9a9c2c486f66aca8634a5eb80ab99

                                                                SHA256

                                                                575baac1f4cdb55ff1e177d4d08a8a516d8ad156b5d5281485948fcb4fd6041a

                                                                SHA512

                                                                c2a0282016a46491c4777957db109ed48fc91f71362b2b52d18c01c621727122361996359476c7fba041bf4c4af4a8d71bfcf480ec5b460ee03fa606be847523

                                                              • \Users\Admin\AppData\Local\Temp\Unicorn-45313.exe

                                                                Filesize

                                                                184KB

                                                                MD5

                                                                f36b52e06fe8442f4df7be27a00449a4

                                                                SHA1

                                                                eb4563634514b68d2ff50e6e062e9d6ec7d359bc

                                                                SHA256

                                                                db961cc2a9233806fc5d6a5c151422eb39ad88a2c800d18eb0edb7461e676c0e

                                                                SHA512

                                                                368acc27e2242d3b2c1b2fab53bab451063eced6ed09086812c1ff5db29019454a785b6a29ff3d5fd82b55a6afe6fe525827dd4d0dc1cd5e6005ab408e706f1c

                                                              • \Users\Admin\AppData\Local\Temp\Unicorn-45339.exe

                                                                Filesize

                                                                184KB

                                                                MD5

                                                                5346107bc0186a9bc10cb86e706b543f

                                                                SHA1

                                                                404c70806d9543f93a78597223bbf575ecf012ac

                                                                SHA256

                                                                51c0471ddfe13023cc1922ddcbb2bdd65268294d77836db38d663fc30a6e256b

                                                                SHA512

                                                                412e1385711def125d0c6b48785524d6dd826246e0f1646258f0e07315b682a6b497ee4b2fb2cf77d2c41acad74ded545e91f656d47c994a719b393873877ed3

                                                              • \Users\Admin\AppData\Local\Temp\Unicorn-47321.exe

                                                                Filesize

                                                                184KB

                                                                MD5

                                                                3f4ba84c593088c9184225bbd6bde491

                                                                SHA1

                                                                1852e5dd125c466c39f0651bf248b628952c02ed

                                                                SHA256

                                                                bf5ba461b886ff21d3cc9161743671039e47797e25767342648c0884c02b6741

                                                                SHA512

                                                                69896973d1ffe7c82820719a989c66728edf4b8c2a999d6f8f770ac2c6d37f4d0275de2a326e1b83c770f1b17315162cfc1ae3d2e674a9d2d2d5d5b735b3c7af

                                                              • \Users\Admin\AppData\Local\Temp\Unicorn-50476.exe

                                                                Filesize

                                                                184KB

                                                                MD5

                                                                c7fb7fb8434e4cefee3f38a0dfdd6f20

                                                                SHA1

                                                                56e3bcdac603c06a50844d9541555225213d0686

                                                                SHA256

                                                                9a76e6646ba978a2f96549add8ed0d21e33e1d61c34bd05995839a47aa033208

                                                                SHA512

                                                                041d480820aab0d2479349a92e337df79ffb68854925fdf247e7af8f98540540e9718f9d0164b96fe8aa8a41c509b5c2c65fea4c130addb13d9d40057fb5101b

                                                              • \Users\Admin\AppData\Local\Temp\Unicorn-50964.exe

                                                                Filesize

                                                                184KB

                                                                MD5

                                                                34bd1c2c4f2beef159e978387cd218af

                                                                SHA1

                                                                425504544aa851e9dea9f517a2a1b1e2d8531485

                                                                SHA256

                                                                70ed4d2d78a8a41c93f7c152a40babe95fa77c79ea61170898f06b334893216f

                                                                SHA512

                                                                5f1c5410b3f7e6c508c7b2ced428c23d2c58a8d9fa1a25e50d1b5ea07f9977e2d404ba3c93dd245a7576d59e2a2cb2b4be3802334f75a6476a41aaf93ea16e35

                                                              • \Users\Admin\AppData\Local\Temp\Unicorn-777.exe

                                                                Filesize

                                                                184KB

                                                                MD5

                                                                951ccfbf1f3ae4db1cafdd1e2e058095

                                                                SHA1

                                                                be728f55e8348ffd72a1f97d45bbcf5bcf2048f3

                                                                SHA256

                                                                56d137496b90ed962de1623d384b97b33af3246321ccc34902b260a06ba8d2ba

                                                                SHA512

                                                                221234a014134432fa5d31d44e6c03f5d28cb9d68124455e8b807692345ad7b443c09e1880cd17e5837a17dce51dd24322cabc1a96071ebee5ba77689c4608e3

                                                              • \Users\Admin\AppData\Local\Temp\Unicorn-9080.exe

                                                                Filesize

                                                                184KB

                                                                MD5

                                                                597d3378ab0ccb189963c7be3f3a434d

                                                                SHA1

                                                                46e64d267b90cce9d90e1348c9eb817eaaa5c29b

                                                                SHA256

                                                                38966de500dcf87f9f0e78b78e47b17d6976f10c1d0facecbb4ce11ef6a58b20

                                                                SHA512

                                                                44857ba091f6fe7c9e81f653f28d11dd4a86e359a92b250aac6538c308f295ac0305a31be2d358989cb23b8f749c801003539eb7cf0346f74b66f8155d81068d