Analysis

  • max time kernel
    42s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240319-en
  • resource tags

    arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system
  • submitted
    16-04-2024 14:48

General

  • Target

    f3b6a0eb7f10f83fe5151f5c5344678a_JaffaCakes118.exe

  • Size

    184KB

  • MD5

    f3b6a0eb7f10f83fe5151f5c5344678a

  • SHA1

    f8f9bb74c598cde95c84493bc9b787b8d97da669

  • SHA256

    0a26abab9ba69c0a65a5a6212425ed2c4fd332bb8f8ead4e0c61f44eedde5fa4

  • SHA512

    7f84c3043f3fcf60f360bccb40ab6aa0b30802b3b2e9bf2cda5823ab9c929090cc8dd7f719f7ea5738a583e19a3328abea1559d36e34b9e94fec53bee065930b

  • SSDEEP

    3072:yLkMo/AUPkf0QOUKM3sH3e01is0FEtln8SxK9aSSNlPvpFc:yLXovS0QqMcH3eKPcCNlPvpF

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 64 IoCs
  • Loads dropped DLL 64 IoCs
  • Program crash 1 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f3b6a0eb7f10f83fe5151f5c5344678a_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f3b6a0eb7f10f83fe5151f5c5344678a_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2316
    • C:\Users\Admin\AppData\Local\Temp\Unicorn-59368.exe
      C:\Users\Admin\AppData\Local\Temp\Unicorn-59368.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2844
      • C:\Users\Admin\AppData\Local\Temp\Unicorn-47967.exe
        C:\Users\Admin\AppData\Local\Temp\Unicorn-47967.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2080
        • C:\Users\Admin\AppData\Local\Temp\Unicorn-19701.exe
          C:\Users\Admin\AppData\Local\Temp\Unicorn-19701.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2596
          • C:\Users\Admin\AppData\Local\Temp\Unicorn-54568.exe
            C:\Users\Admin\AppData\Local\Temp\Unicorn-54568.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            PID:2216
            • C:\Users\Admin\AppData\Local\Temp\Unicorn-18855.exe
              C:\Users\Admin\AppData\Local\Temp\Unicorn-18855.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              PID:2092
              • C:\Users\Admin\AppData\Local\Temp\Unicorn-64677.exe
                C:\Users\Admin\AppData\Local\Temp\Unicorn-64677.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:1916
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-16603.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-16603.exe
                  8⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:2736
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-64812.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-64812.exe
                    9⤵
                      PID:2588
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-22644.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-22644.exe
                        10⤵
                          PID:2004
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-34936.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-34936.exe
                        9⤵
                          PID:1784
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-30565.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-30565.exe
                            10⤵
                              PID:2220
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-50214.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-50214.exe
                        7⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:1092
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-8584.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-8584.exe
                          8⤵
                            PID:2272
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-53364.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-53364.exe
                        6⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:1732
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-61719.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-61719.exe
                          7⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:1928
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-40945.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-40945.exe
                      5⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • Suspicious use of SetWindowsHookEx
                      PID:1156
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-7692.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-7692.exe
                        6⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:2032
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-458.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-458.exe
                          7⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:324
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-57705.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-57705.exe
                            8⤵
                              PID:1388
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-6405.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-6405.exe
                          6⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:748
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-59409.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-59409.exe
                            7⤵
                              PID:2384
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-18366.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-18366.exe
                        4⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • Suspicious use of SetWindowsHookEx
                        • Suspicious use of WriteProcessMemory
                        PID:1060
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-30915.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-30915.exe
                          5⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Suspicious use of SetWindowsHookEx
                          PID:2012
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-27345.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-27345.exe
                            6⤵
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            PID:1312
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-54236.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-54236.exe
                              7⤵
                              • Executes dropped EXE
                              • Suspicious use of SetWindowsHookEx
                              PID:2720
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-50666.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-50666.exe
                                8⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                PID:2880
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-30992.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-30992.exe
                              7⤵
                              • Executes dropped EXE
                              • Suspicious use of SetWindowsHookEx
                              PID:1988
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-29172.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-29172.exe
                                8⤵
                                  PID:2688
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-1780.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-1780.exe
                                    9⤵
                                      PID:2116
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-13758.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-13758.exe
                                6⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                PID:2956
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-35098.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-35098.exe
                                  7⤵
                                    PID:2160
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-23815.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-23815.exe
                                5⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                PID:3060
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-33624.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-33624.exe
                                  6⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetWindowsHookEx
                                  PID:2528
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-25586.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-25586.exe
                                    7⤵
                                    • Executes dropped EXE
                                    • Suspicious use of SetWindowsHookEx
                                    PID:2592
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-59965.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-59965.exe
                                  6⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetWindowsHookEx
                                  PID:2140
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-24164.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-24164.exe
                                    7⤵
                                      PID:2284
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-40675.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-40675.exe
                              3⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • Suspicious use of SetWindowsHookEx
                              • Suspicious use of WriteProcessMemory
                              PID:2712
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-22088.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-22088.exe
                                4⤵
                                • Executes dropped EXE
                                • Loads dropped DLL
                                • Suspicious use of SetWindowsHookEx
                                • Suspicious use of WriteProcessMemory
                                PID:296
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-51719.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-51719.exe
                                  5⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Suspicious use of SetWindowsHookEx
                                  PID:1624
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-57085.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-57085.exe
                                    6⤵
                                    • Executes dropped EXE
                                    • Suspicious use of SetWindowsHookEx
                                    PID:896
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-4651.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-4651.exe
                                      7⤵
                                      • Executes dropped EXE
                                      • Suspicious use of SetWindowsHookEx
                                      PID:2480
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-35783.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-35783.exe
                                        8⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetWindowsHookEx
                                        PID:3024
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-43628.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-43628.exe
                                      7⤵
                                      • Executes dropped EXE
                                      • Suspicious use of SetWindowsHookEx
                                      PID:944
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-36280.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-36280.exe
                                        8⤵
                                          PID:2188
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-1122.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-1122.exe
                                      6⤵
                                      • Executes dropped EXE
                                      • Suspicious use of SetWindowsHookEx
                                      PID:2764
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-54942.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-54942.exe
                                        7⤵
                                          PID:1668
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-47640.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-47640.exe
                                            8⤵
                                              PID:980
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-29051.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-29051.exe
                                        5⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetWindowsHookEx
                                        PID:1308
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-18248.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-18248.exe
                                          6⤵
                                          • Executes dropped EXE
                                          PID:1072
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-60442.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-60442.exe
                                      4⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Suspicious use of SetWindowsHookEx
                                      PID:2072
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-48917.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-48917.exe
                                        5⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetWindowsHookEx
                                        PID:680
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-38668.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-38668.exe
                                          6⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetWindowsHookEx
                                          PID:1944
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-28741.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-28741.exe
                                            7⤵
                                              PID:2492
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -u -p 2492 -s 236
                                                8⤵
                                                • Program crash
                                                PID:1748
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-55175.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-55175.exe
                                          5⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetWindowsHookEx
                                          PID:2176
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-32185.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-32185.exe
                                    2⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • Suspicious use of SetWindowsHookEx
                                    • Suspicious use of WriteProcessMemory
                                    PID:2520
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-45274.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-45274.exe
                                      3⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Suspicious use of SetWindowsHookEx
                                      • Suspicious use of WriteProcessMemory
                                      PID:2592
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-37272.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-37272.exe
                                        4⤵
                                        • Executes dropped EXE
                                        • Loads dropped DLL
                                        • Suspicious use of SetWindowsHookEx
                                        • Suspicious use of WriteProcessMemory
                                        PID:2940
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-31299.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-31299.exe
                                          5⤵
                                          • Executes dropped EXE
                                          • Loads dropped DLL
                                          • Suspicious use of SetWindowsHookEx
                                          PID:2008
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-49218.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-49218.exe
                                            6⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetWindowsHookEx
                                            PID:2132
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-24880.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-24880.exe
                                              7⤵
                                              • Executes dropped EXE
                                              • Suspicious use of SetWindowsHookEx
                                              PID:1900
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-37947.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-37947.exe
                                                8⤵
                                                • Executes dropped EXE
                                                • Suspicious use of SetWindowsHookEx
                                                PID:2228
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-583.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-583.exe
                                                  9⤵
                                                    PID:2000
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-38693.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-38693.exe
                                                7⤵
                                                • Executes dropped EXE
                                                • Suspicious use of SetWindowsHookEx
                                                PID:2996
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-24858.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-24858.exe
                                              6⤵
                                              • Executes dropped EXE
                                              • Suspicious use of SetWindowsHookEx
                                              PID:2612
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-63219.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-63219.exe
                                                7⤵
                                                • Executes dropped EXE
                                                • Suspicious use of SetWindowsHookEx
                                                PID:2060
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-18133.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-18133.exe
                                                  8⤵
                                                    PID:304
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-44947.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-44947.exe
                                                  7⤵
                                                    PID:2744
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-49773.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-49773.exe
                                                5⤵
                                                • Executes dropped EXE
                                                • Suspicious use of SetWindowsHookEx
                                                PID:2364
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-44724.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-44724.exe
                                                  6⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:2552
                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-31289.exe
                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-31289.exe
                                                    7⤵
                                                      PID:2472
                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-17579.exe
                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-17579.exe
                                                        8⤵
                                                          PID:1908
                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-63250.exe
                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-63250.exe
                                                        7⤵
                                                          PID:1876
                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-30053.exe
                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-30053.exe
                                                            8⤵
                                                              PID:2992
                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-64718.exe
                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-64718.exe
                                                      4⤵
                                                      • Executes dropped EXE
                                                      • Loads dropped DLL
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:528
                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-16354.exe
                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-16354.exe
                                                        5⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:1884
                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-16328.exe
                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-16328.exe
                                                          6⤵
                                                          • Executes dropped EXE
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:2708
                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-62918.exe
                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-62918.exe
                                                            7⤵
                                                            • Executes dropped EXE
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:1956
                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-57459.exe
                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-57459.exe
                                                              8⤵
                                                                PID:488
                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-27868.exe
                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-27868.exe
                                                            6⤵
                                                              PID:1608
                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-41424.exe
                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-41424.exe
                                                                7⤵
                                                                  PID:2392
                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-34370.exe
                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-34370.exe
                                                              5⤵
                                                              • Executes dropped EXE
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:2448
                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-22462.exe
                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-22462.exe
                                                                6⤵
                                                                • Executes dropped EXE
                                                                • Suspicious use of SetWindowsHookEx
                                                                PID:1384
                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-29172.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-29172.exe
                                                                  7⤵
                                                                    PID:2680
                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-10198.exe
                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-10198.exe
                                                            3⤵
                                                            • Executes dropped EXE
                                                            • Loads dropped DLL
                                                            • Suspicious use of SetWindowsHookEx
                                                            • Suspicious use of WriteProcessMemory
                                                            PID:2756
                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-51719.exe
                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-51719.exe
                                                              4⤵
                                                              • Executes dropped EXE
                                                              • Loads dropped DLL
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:608
                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-7500.exe
                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-7500.exe
                                                                5⤵
                                                                • Executes dropped EXE
                                                                • Suspicious use of SetWindowsHookEx
                                                                PID:3008
                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-25264.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-25264.exe
                                                                  6⤵
                                                                  • Executes dropped EXE
                                                                  • Suspicious use of SetWindowsHookEx
                                                                  PID:2780
                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-583.exe
                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-583.exe
                                                                    7⤵
                                                                      PID:2080
                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-2274.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-2274.exe
                                                                  5⤵
                                                                  • Executes dropped EXE
                                                                  • Suspicious use of SetWindowsHookEx
                                                                  PID:2808
                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-27973.exe
                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-27973.exe
                                                                    6⤵
                                                                      PID:2436
                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-4163.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-4163.exe
                                                                  4⤵
                                                                  • Executes dropped EXE
                                                                  • Suspicious use of SetWindowsHookEx
                                                                  PID:1748
                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-16603.exe
                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-16603.exe
                                                                    5⤵
                                                                    • Executes dropped EXE
                                                                    • Suspicious use of SetWindowsHookEx
                                                                    PID:2760
                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-35565.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-35565.exe
                                                                      6⤵
                                                                        PID:2460
                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-16291.exe
                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-16291.exe
                                                                          7⤵
                                                                            PID:436
                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-63250.exe
                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-63250.exe
                                                                          6⤵
                                                                            PID:2512
                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-41879.exe
                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-41879.exe
                                                                              7⤵
                                                                                PID:380

                                                                  Network

                                                                  MITRE ATT&CK Matrix

                                                                  Replay Monitor

                                                                  Loading Replay Monitor...

                                                                  Downloads

                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-18855.exe

                                                                    Filesize

                                                                    184KB

                                                                    MD5

                                                                    4b137a9e240b9e50b66aa47cb118d867

                                                                    SHA1

                                                                    bf515f6d4b3aa0ef3697058fc717875c0fbd28ac

                                                                    SHA256

                                                                    efa0764217c114d997e6584920eeea15e83516c9f5ebd933132e96b5d59d3e7c

                                                                    SHA512

                                                                    df16774b263cf0ee437053e34a3e0f69dafb59e6bb31e1e13768333ba0388d321d180926a9e80609ef50a35b6b2ebda9056e65f34cf03ee1dd51079d559974e8

                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-40675.exe

                                                                    Filesize

                                                                    184KB

                                                                    MD5

                                                                    5fb99259d6f7d248f9215aafe37afb36

                                                                    SHA1

                                                                    3446992ce7834f72ddf5a8cd080a9d481e58b4c6

                                                                    SHA256

                                                                    f36853222840defdc62d3aea51abd16a1e46fc946d45379efc71b4a74ee857d1

                                                                    SHA512

                                                                    fc170c68b8842385056d077a9e3d6cf36b9e0101f3fbe85896d28d93ba075f76d1d12a3ba22ac2246ac17ed412d355fe09345d3487a5c2025e35e7e29b73220f

                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-40945.exe

                                                                    Filesize

                                                                    184KB

                                                                    MD5

                                                                    058142f3fce22159a5a0e24f15121ee9

                                                                    SHA1

                                                                    0cc8a0a56358acd14a9c92d6a5e81f2b6ea9e651

                                                                    SHA256

                                                                    06dc266af43a826f26694b961e1c19d33bb4a8214403e0b55a3e3066bf1487e7

                                                                    SHA512

                                                                    ef68db4ad1feb56b6f4b046031981b059a892116ac08ff38a196ebc225cb8fa17b12db0017a3586a560983aed42f73f37b083ff5075595e357e0a5523f434e40

                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-54942.exe

                                                                    Filesize

                                                                    184KB

                                                                    MD5

                                                                    cdd4143876eeb76e1499962ffa9e2fcd

                                                                    SHA1

                                                                    b188ded9ff3b8839d9b5bafbb2ac719da9e74541

                                                                    SHA256

                                                                    0711667ed16bb7c4d4788dc1b8d2e20d2df975c91c7baedf727c9528f05a8ec7

                                                                    SHA512

                                                                    45432c19b7b3563726f4a9d2711349f6fb4b03812b250d47d07de6beea4d04ece16641eb3a3e8013dec9c48e971f42c5a1744c9d1324bc4cc04b481356b39643

                                                                  • \Users\Admin\AppData\Local\Temp\Unicorn-10198.exe

                                                                    Filesize

                                                                    184KB

                                                                    MD5

                                                                    f9c0180378e80530acfb3baf8c2e9cad

                                                                    SHA1

                                                                    34a55f798df2b10eea01ea219be4917e8c7e46f0

                                                                    SHA256

                                                                    fb2c7a31393429dffd5d6403dc68070be91b8416c23e535879e840b1ea7bbd0f

                                                                    SHA512

                                                                    7764a096dd19d025afee40597d5fdf010935b77d43b2272ad22a1b5fe94e084198f6fb6b796cfa80d3463089deacad70aa24ba9164ea5c272eada7a0100d48a2

                                                                  • \Users\Admin\AppData\Local\Temp\Unicorn-18366.exe

                                                                    Filesize

                                                                    184KB

                                                                    MD5

                                                                    a3ce55dfa3c090c3767d05c77d74b0b7

                                                                    SHA1

                                                                    34de0b4b4364e1564561283f5238e8007778f174

                                                                    SHA256

                                                                    8448741f268c47ac8eee0b5bb48bf62c16e0c3d20497e83b28fd57413dc292ae

                                                                    SHA512

                                                                    2942030080bfda6b9b5554c8ec371142068e2d181f1182bf8f61fd520bf7fd9da49ed176ac937628dcceae4229070292f52c64991661f0448a25e10c5e7cfc6b

                                                                  • \Users\Admin\AppData\Local\Temp\Unicorn-19701.exe

                                                                    Filesize

                                                                    184KB

                                                                    MD5

                                                                    2b449cee272920f01a0779dad1289c37

                                                                    SHA1

                                                                    61f90db3ab5e26e4cf6a0405551c307f1417378c

                                                                    SHA256

                                                                    8fecf2df62a1290659108c14f607923472d8d17f6509020b70938bc31f037dd7

                                                                    SHA512

                                                                    91f892fb99daac074f4f7315aa780accc7d98ee506f5872576509000af6880a17e3a7fe1ee05c0c77980936416f9916e3fcad4c430f24c2418c7293acb57491f

                                                                  • \Users\Admin\AppData\Local\Temp\Unicorn-22088.exe

                                                                    Filesize

                                                                    184KB

                                                                    MD5

                                                                    9a9ba33fe2fe34539f569220ea5a7ab8

                                                                    SHA1

                                                                    eea8bc46bcaad13127ea82cc344d43f40fa70812

                                                                    SHA256

                                                                    b489036fc68b3378535657f1dc382df7d2260767d672fbf841e9dcc1234de055

                                                                    SHA512

                                                                    36eeead501c041097f329aa77e0c58cfdbc3c2baede40f25c7c0401ed0710ce8abced0d92f22593518e6a9537ef8b4b74394e17d971145f51b3ae199732f0ae0

                                                                  • \Users\Admin\AppData\Local\Temp\Unicorn-30915.exe

                                                                    Filesize

                                                                    184KB

                                                                    MD5

                                                                    68407840d9190dc2f3b940be35cceefa

                                                                    SHA1

                                                                    6bff0b7674ede8c45eee5dde3bcac831d1df61f5

                                                                    SHA256

                                                                    58cf5732f7dca4509f569901cbb92b3a342e71b7bdd134005486cf000b00091a

                                                                    SHA512

                                                                    ec977b21426dad953b9a0520712bccb9bf3b591827b47ee97c4dae81988f51b6039d0c5fe7abd091fbc5ceaff36a7c633d776467565ef3b08a1464e28996fe1a

                                                                  • \Users\Admin\AppData\Local\Temp\Unicorn-31299.exe

                                                                    Filesize

                                                                    184KB

                                                                    MD5

                                                                    0c6856910a443072c14c968737c5b958

                                                                    SHA1

                                                                    83fc26d76d8338bda4ddfc4abc06746f84addff8

                                                                    SHA256

                                                                    2daaceded9a4dd8d5a84fdaa0f4af55d100c2e6c1c2d0d63f83e8efc29d2011a

                                                                    SHA512

                                                                    e366792f6bfd0a96b303934163ed52e33f7e1d492ae5161716c4ce71b6c68a702053e421f56bbc049e6e5f6478f20498e6019439ab56f70ede610a1b5e648dcf

                                                                  • \Users\Admin\AppData\Local\Temp\Unicorn-32185.exe

                                                                    Filesize

                                                                    184KB

                                                                    MD5

                                                                    5d57b704042ddfc0866111c6638fbf47

                                                                    SHA1

                                                                    ab300adccb154e3699e299f94540bbbaa3e271c3

                                                                    SHA256

                                                                    ca52c651d24c4e170fdcc43168459723c83300301b8608785fbc2612c5b8e5d6

                                                                    SHA512

                                                                    c8833b5bf04ab15bdb0d8a7cb955a6f5240cdc48d0659b74eb2969f6a60017b3b1eb06d9d8fb7a0d702e9f6b5fe5bf5ee03384261ed4bd873b2661619b6a5e31

                                                                  • \Users\Admin\AppData\Local\Temp\Unicorn-37272.exe

                                                                    Filesize

                                                                    184KB

                                                                    MD5

                                                                    931c9abc1351865132e01aa909390823

                                                                    SHA1

                                                                    07211ddc3a989af19adc6b5ccba68bea4c085fb3

                                                                    SHA256

                                                                    2d5e3cd74c734f458ae831fbb9aa08b4e244ca0afdc70ef1e74542a82d7c75a1

                                                                    SHA512

                                                                    4b9c30dc9e65fd82c08a59919da2bb1db755091f57e55cb41fc76c87b8270b5e5a9f65585e52ced9f116e10bec52ce4482d5fd79b8581e90f20f23f8d84aa59a

                                                                  • \Users\Admin\AppData\Local\Temp\Unicorn-45274.exe

                                                                    Filesize

                                                                    184KB

                                                                    MD5

                                                                    c423f4833ffcb18957077dab6508f7a6

                                                                    SHA1

                                                                    66b46fbcce283eda306bfb19c174f40ea29436d4

                                                                    SHA256

                                                                    51790a073548f549130d9e9ef09a0aacb209ee72cf9bd030e7f0ff4670b9245d

                                                                    SHA512

                                                                    b621fc3f1fc5686e82a22f995bef985d78533c4d58a4979945b666d58c39daf12a0597d92f8371ea44cdf0458167efcd35e9da516b7d098925cde6690948d32c

                                                                  • \Users\Admin\AppData\Local\Temp\Unicorn-47967.exe

                                                                    Filesize

                                                                    184KB

                                                                    MD5

                                                                    03a5a79405b9a714eb16dcbbee80a717

                                                                    SHA1

                                                                    48a13d128852c540097de63a95e8841992e366e3

                                                                    SHA256

                                                                    0fda5e25366a24a2dc5859211328ea31a6ee4a9cc4d547a22d884411d2d43e05

                                                                    SHA512

                                                                    0c34710adb46f9ae0de9d4ebad5a497673980969f1df77ce1104cc05785494f5472bf39f348596d512c6050237ec62b38fd7df7620951b222dba08a29d83663c

                                                                  • \Users\Admin\AppData\Local\Temp\Unicorn-51719.exe

                                                                    Filesize

                                                                    184KB

                                                                    MD5

                                                                    b1aafbe884ac82baa07515a8008bfdc5

                                                                    SHA1

                                                                    8cb6a67ee8d9b29bb2f007588f793d1a7f7e1705

                                                                    SHA256

                                                                    29ca6fd3b725918ce46b5bcdf297646b2b2fa112cb31abaf2832a67f82e6f75a

                                                                    SHA512

                                                                    91b6cae7cd1fcacb4e321a642b51b095f346e253e534f3d12a4440c6faadf8116b1c45a0093d017e7ca59f31dff0fff34c40d9b35528f94dcd53e55e499c3bb2

                                                                  • \Users\Admin\AppData\Local\Temp\Unicorn-54568.exe

                                                                    Filesize

                                                                    184KB

                                                                    MD5

                                                                    1aeaaaa4febc7e1d08fe6087066b69df

                                                                    SHA1

                                                                    5ec51e0101466891af00fc46e01da0c14352a638

                                                                    SHA256

                                                                    bae685e6b997e20ca8561d43cf04a99da9f95a71e69d3f5520a93999297c4ccc

                                                                    SHA512

                                                                    dc9005301c7f21a7d9700b98e61cee6262d029e9b9e9f32c5df6810c584912d094932ec29403497f1589e76742d8b03b07a36e193a1e6a9382a76bdcaef164f0

                                                                  • \Users\Admin\AppData\Local\Temp\Unicorn-59368.exe

                                                                    Filesize

                                                                    184KB

                                                                    MD5

                                                                    9bee7f2ccd05cba5ddcf0d1766f57160

                                                                    SHA1

                                                                    9292787ba4e7fbb3d04c6e25b2fe0894b99f44b9

                                                                    SHA256

                                                                    a275d2b680a3eda72740b450854e4fa2393cce4182a67596f74d919e76780f1f

                                                                    SHA512

                                                                    303f6c2b72595d3cfbcb920f095de6a984ef9be4d9a6ee4c6ef32dcc5aa2b2a128fac124ca428857cf85ace6b54a941f02b1d859418e51469ab06bece229613b

                                                                  • \Users\Admin\AppData\Local\Temp\Unicorn-60442.exe

                                                                    Filesize

                                                                    184KB

                                                                    MD5

                                                                    c6264fbab2c5e175c051642d4d53c693

                                                                    SHA1

                                                                    704cf1619c3f8279bebb42048fde0c0c7e3187f2

                                                                    SHA256

                                                                    2f8ce6328f71440aee79ef2d31236028532ec52c99be2ed0d69f5118a2227a76

                                                                    SHA512

                                                                    e14a7bd59be6a509260a3506ea8a67e061872e1aeab1aa6ab54b526f2825c32af188b3d5617fa78e41249843328c189a5dc50c480da7ea8213ece339f888f3dd

                                                                  • \Users\Admin\AppData\Local\Temp\Unicorn-64718.exe

                                                                    Filesize

                                                                    184KB

                                                                    MD5

                                                                    cf5304e7da0e20b6af5ba2d13e49e753

                                                                    SHA1

                                                                    8ab5a26c67ea89d71467a1ce6047ec76f4ce35fb

                                                                    SHA256

                                                                    4e3f3487ef083d31ada42007fe50ee31258f7cea634f64f4b46c7765748a1dd9

                                                                    SHA512

                                                                    cf559b56b52b4fb87d26e565da0c2a4129fff61d200047e80802cdf84aef184bc56c31f4acc711306aa984adaae0522b5982515ca99a3bd202fb7a1326c8946d