Analysis
-
max time kernel
42s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240319-en -
resource tags
arch:x64arch:x86image:win7-20240319-enlocale:en-usos:windows7-x64system -
submitted
16-04-2024 14:48
Static task
static1
Behavioral task
behavioral1
Sample
f3b6a0eb7f10f83fe5151f5c5344678a_JaffaCakes118.exe
Resource
win7-20240319-en
Behavioral task
behavioral2
Sample
f3b6a0eb7f10f83fe5151f5c5344678a_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f3b6a0eb7f10f83fe5151f5c5344678a_JaffaCakes118.exe
-
Size
184KB
-
MD5
f3b6a0eb7f10f83fe5151f5c5344678a
-
SHA1
f8f9bb74c598cde95c84493bc9b787b8d97da669
-
SHA256
0a26abab9ba69c0a65a5a6212425ed2c4fd332bb8f8ead4e0c61f44eedde5fa4
-
SHA512
7f84c3043f3fcf60f360bccb40ab6aa0b30802b3b2e9bf2cda5823ab9c929090cc8dd7f719f7ea5738a583e19a3328abea1559d36e34b9e94fec53bee065930b
-
SSDEEP
3072:yLkMo/AUPkf0QOUKM3sH3e01is0FEtln8SxK9aSSNlPvpFc:yLXovS0QqMcH3eKPcCNlPvpF
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 2844 Unicorn-59368.exe 2080 Unicorn-47967.exe 2520 Unicorn-32185.exe 2592 Unicorn-45274.exe 2596 Unicorn-19701.exe 2712 Unicorn-40675.exe 2940 Unicorn-37272.exe 2216 Unicorn-54568.exe 2756 Unicorn-10198.exe 1060 Unicorn-18366.exe 296 Unicorn-22088.exe 2008 Unicorn-31299.exe 528 Unicorn-64718.exe 2012 Unicorn-30915.exe 608 Unicorn-51719.exe 1624 Unicorn-51719.exe 2092 Unicorn-18855.exe 2072 Unicorn-60442.exe 1156 Unicorn-40945.exe 2132 Unicorn-49218.exe 2364 Unicorn-49773.exe 1884 Unicorn-16354.exe 1312 Unicorn-27345.exe 3060 Unicorn-23815.exe 896 Unicorn-57085.exe 1308 Unicorn-29051.exe 680 Unicorn-48917.exe 3008 Unicorn-7500.exe 1916 Unicorn-64677.exe 1748 Unicorn-4163.exe 2032 Unicorn-7692.exe 1732 Unicorn-53364.exe 1900 Unicorn-24880.exe 2552 Unicorn-44724.exe 2612 Unicorn-24858.exe 2708 Unicorn-16328.exe 2448 Unicorn-34370.exe 2720 Unicorn-54236.exe 2956 Unicorn-13758.exe 2528 Unicorn-33624.exe 2480 Unicorn-4651.exe 2764 Unicorn-1122.exe 2780 Unicorn-25264.exe 2808 Unicorn-2274.exe 1072 Unicorn-18248.exe 1944 Unicorn-38668.exe 1928 Unicorn-61719.exe 2176 Unicorn-55175.exe 2760 Unicorn-16603.exe 2736 Unicorn-16603.exe 324 Unicorn-458.exe 1092 Unicorn-50214.exe 748 Unicorn-6405.exe 2228 Unicorn-37947.exe 2996 Unicorn-38693.exe 2060 Unicorn-63219.exe 2592 Unicorn-25586.exe 2140 Unicorn-59965.exe 3024 Unicorn-35783.exe 1384 Unicorn-22462.exe 944 Unicorn-43628.exe 1956 Unicorn-62918.exe 2880 Unicorn-50666.exe 1988 Unicorn-30992.exe -
Loads dropped DLL 64 IoCs
pid Process 2316 f3b6a0eb7f10f83fe5151f5c5344678a_JaffaCakes118.exe 2316 f3b6a0eb7f10f83fe5151f5c5344678a_JaffaCakes118.exe 2844 Unicorn-59368.exe 2844 Unicorn-59368.exe 2316 f3b6a0eb7f10f83fe5151f5c5344678a_JaffaCakes118.exe 2316 f3b6a0eb7f10f83fe5151f5c5344678a_JaffaCakes118.exe 2520 Unicorn-32185.exe 2520 Unicorn-32185.exe 2080 Unicorn-47967.exe 2080 Unicorn-47967.exe 2844 Unicorn-59368.exe 2844 Unicorn-59368.exe 2592 Unicorn-45274.exe 2592 Unicorn-45274.exe 2596 Unicorn-19701.exe 2520 Unicorn-32185.exe 2596 Unicorn-19701.exe 2520 Unicorn-32185.exe 2080 Unicorn-47967.exe 2712 Unicorn-40675.exe 2080 Unicorn-47967.exe 2712 Unicorn-40675.exe 2940 Unicorn-37272.exe 2940 Unicorn-37272.exe 2592 Unicorn-45274.exe 2592 Unicorn-45274.exe 1060 Unicorn-18366.exe 1060 Unicorn-18366.exe 2756 Unicorn-10198.exe 2756 Unicorn-10198.exe 296 Unicorn-22088.exe 296 Unicorn-22088.exe 2216 Unicorn-54568.exe 2216 Unicorn-54568.exe 2712 Unicorn-40675.exe 2712 Unicorn-40675.exe 2596 Unicorn-19701.exe 2596 Unicorn-19701.exe 2008 Unicorn-31299.exe 2008 Unicorn-31299.exe 2940 Unicorn-37272.exe 2940 Unicorn-37272.exe 528 Unicorn-64718.exe 528 Unicorn-64718.exe 2012 Unicorn-30915.exe 2012 Unicorn-30915.exe 1060 Unicorn-18366.exe 1060 Unicorn-18366.exe 1624 Unicorn-51719.exe 1624 Unicorn-51719.exe 2072 Unicorn-60442.exe 296 Unicorn-22088.exe 296 Unicorn-22088.exe 2072 Unicorn-60442.exe 608 Unicorn-51719.exe 608 Unicorn-51719.exe 2092 Unicorn-18855.exe 2092 Unicorn-18855.exe 2756 Unicorn-10198.exe 2756 Unicorn-10198.exe 2216 Unicorn-54568.exe 1156 Unicorn-40945.exe 1156 Unicorn-40945.exe 2216 Unicorn-54568.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1748 2492 WerFault.exe 98 -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2316 f3b6a0eb7f10f83fe5151f5c5344678a_JaffaCakes118.exe 2844 Unicorn-59368.exe 2520 Unicorn-32185.exe 2080 Unicorn-47967.exe 2592 Unicorn-45274.exe 2596 Unicorn-19701.exe 2712 Unicorn-40675.exe 2940 Unicorn-37272.exe 2216 Unicorn-54568.exe 2756 Unicorn-10198.exe 1060 Unicorn-18366.exe 296 Unicorn-22088.exe 2008 Unicorn-31299.exe 528 Unicorn-64718.exe 2012 Unicorn-30915.exe 608 Unicorn-51719.exe 1624 Unicorn-51719.exe 2092 Unicorn-18855.exe 2072 Unicorn-60442.exe 1156 Unicorn-40945.exe 2132 Unicorn-49218.exe 2364 Unicorn-49773.exe 1884 Unicorn-16354.exe 1312 Unicorn-27345.exe 3060 Unicorn-23815.exe 896 Unicorn-57085.exe 3008 Unicorn-7500.exe 1308 Unicorn-29051.exe 680 Unicorn-48917.exe 1916 Unicorn-64677.exe 2032 Unicorn-7692.exe 1732 Unicorn-53364.exe 1748 Unicorn-4163.exe 1900 Unicorn-24880.exe 2612 Unicorn-24858.exe 2552 Unicorn-44724.exe 2708 Unicorn-16328.exe 2956 Unicorn-13758.exe 2448 Unicorn-34370.exe 2720 Unicorn-54236.exe 2528 Unicorn-33624.exe 2480 Unicorn-4651.exe 2764 Unicorn-1122.exe 2780 Unicorn-25264.exe 2808 Unicorn-2274.exe 1944 Unicorn-38668.exe 2176 Unicorn-55175.exe 1928 Unicorn-61719.exe 2760 Unicorn-16603.exe 2736 Unicorn-16603.exe 1092 Unicorn-50214.exe 324 Unicorn-458.exe 2228 Unicorn-37947.exe 748 Unicorn-6405.exe 2996 Unicorn-38693.exe 2060 Unicorn-63219.exe 2140 Unicorn-59965.exe 1384 Unicorn-22462.exe 2592 Unicorn-25586.exe 3024 Unicorn-35783.exe 1956 Unicorn-62918.exe 944 Unicorn-43628.exe 1988 Unicorn-30992.exe 2880 Unicorn-50666.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2316 wrote to memory of 2844 2316 f3b6a0eb7f10f83fe5151f5c5344678a_JaffaCakes118.exe 28 PID 2316 wrote to memory of 2844 2316 f3b6a0eb7f10f83fe5151f5c5344678a_JaffaCakes118.exe 28 PID 2316 wrote to memory of 2844 2316 f3b6a0eb7f10f83fe5151f5c5344678a_JaffaCakes118.exe 28 PID 2316 wrote to memory of 2844 2316 f3b6a0eb7f10f83fe5151f5c5344678a_JaffaCakes118.exe 28 PID 2844 wrote to memory of 2080 2844 Unicorn-59368.exe 29 PID 2844 wrote to memory of 2080 2844 Unicorn-59368.exe 29 PID 2844 wrote to memory of 2080 2844 Unicorn-59368.exe 29 PID 2844 wrote to memory of 2080 2844 Unicorn-59368.exe 29 PID 2316 wrote to memory of 2520 2316 f3b6a0eb7f10f83fe5151f5c5344678a_JaffaCakes118.exe 30 PID 2316 wrote to memory of 2520 2316 f3b6a0eb7f10f83fe5151f5c5344678a_JaffaCakes118.exe 30 PID 2316 wrote to memory of 2520 2316 f3b6a0eb7f10f83fe5151f5c5344678a_JaffaCakes118.exe 30 PID 2316 wrote to memory of 2520 2316 f3b6a0eb7f10f83fe5151f5c5344678a_JaffaCakes118.exe 30 PID 2520 wrote to memory of 2592 2520 Unicorn-32185.exe 31 PID 2520 wrote to memory of 2592 2520 Unicorn-32185.exe 31 PID 2520 wrote to memory of 2592 2520 Unicorn-32185.exe 31 PID 2520 wrote to memory of 2592 2520 Unicorn-32185.exe 31 PID 2080 wrote to memory of 2596 2080 Unicorn-47967.exe 32 PID 2080 wrote to memory of 2596 2080 Unicorn-47967.exe 32 PID 2080 wrote to memory of 2596 2080 Unicorn-47967.exe 32 PID 2080 wrote to memory of 2596 2080 Unicorn-47967.exe 32 PID 2844 wrote to memory of 2712 2844 Unicorn-59368.exe 33 PID 2844 wrote to memory of 2712 2844 Unicorn-59368.exe 33 PID 2844 wrote to memory of 2712 2844 Unicorn-59368.exe 33 PID 2844 wrote to memory of 2712 2844 Unicorn-59368.exe 33 PID 2592 wrote to memory of 2940 2592 Unicorn-45274.exe 34 PID 2592 wrote to memory of 2940 2592 Unicorn-45274.exe 34 PID 2592 wrote to memory of 2940 2592 Unicorn-45274.exe 34 PID 2592 wrote to memory of 2940 2592 Unicorn-45274.exe 34 PID 2596 wrote to memory of 2216 2596 Unicorn-19701.exe 35 PID 2596 wrote to memory of 2216 2596 Unicorn-19701.exe 35 PID 2596 wrote to memory of 2216 2596 Unicorn-19701.exe 35 PID 2596 wrote to memory of 2216 2596 Unicorn-19701.exe 35 PID 2520 wrote to memory of 2756 2520 Unicorn-32185.exe 36 PID 2520 wrote to memory of 2756 2520 Unicorn-32185.exe 36 PID 2520 wrote to memory of 2756 2520 Unicorn-32185.exe 36 PID 2520 wrote to memory of 2756 2520 Unicorn-32185.exe 36 PID 2080 wrote to memory of 1060 2080 Unicorn-47967.exe 37 PID 2080 wrote to memory of 1060 2080 Unicorn-47967.exe 37 PID 2080 wrote to memory of 1060 2080 Unicorn-47967.exe 37 PID 2080 wrote to memory of 1060 2080 Unicorn-47967.exe 37 PID 2712 wrote to memory of 296 2712 Unicorn-40675.exe 38 PID 2712 wrote to memory of 296 2712 Unicorn-40675.exe 38 PID 2712 wrote to memory of 296 2712 Unicorn-40675.exe 38 PID 2712 wrote to memory of 296 2712 Unicorn-40675.exe 38 PID 2940 wrote to memory of 2008 2940 Unicorn-37272.exe 39 PID 2940 wrote to memory of 2008 2940 Unicorn-37272.exe 39 PID 2940 wrote to memory of 2008 2940 Unicorn-37272.exe 39 PID 2940 wrote to memory of 2008 2940 Unicorn-37272.exe 39 PID 2592 wrote to memory of 528 2592 Unicorn-45274.exe 40 PID 2592 wrote to memory of 528 2592 Unicorn-45274.exe 40 PID 2592 wrote to memory of 528 2592 Unicorn-45274.exe 40 PID 2592 wrote to memory of 528 2592 Unicorn-45274.exe 40 PID 1060 wrote to memory of 2012 1060 Unicorn-18366.exe 41 PID 1060 wrote to memory of 2012 1060 Unicorn-18366.exe 41 PID 1060 wrote to memory of 2012 1060 Unicorn-18366.exe 41 PID 1060 wrote to memory of 2012 1060 Unicorn-18366.exe 41 PID 2756 wrote to memory of 608 2756 Unicorn-10198.exe 42 PID 2756 wrote to memory of 608 2756 Unicorn-10198.exe 42 PID 2756 wrote to memory of 608 2756 Unicorn-10198.exe 42 PID 2756 wrote to memory of 608 2756 Unicorn-10198.exe 42 PID 296 wrote to memory of 1624 296 Unicorn-22088.exe 43 PID 296 wrote to memory of 1624 296 Unicorn-22088.exe 43 PID 296 wrote to memory of 1624 296 Unicorn-22088.exe 43 PID 296 wrote to memory of 1624 296 Unicorn-22088.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\f3b6a0eb7f10f83fe5151f5c5344678a_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f3b6a0eb7f10f83fe5151f5c5344678a_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2316 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-59368.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59368.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2844 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47967.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47967.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-19701.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19701.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2596 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54568.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54568.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2216 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18855.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18855.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2092 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-64677.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64677.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16603.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16603.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2736 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-64812.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64812.exe9⤵PID:2588
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22644.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22644.exe10⤵PID:2004
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34936.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34936.exe9⤵PID:1784
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30565.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30565.exe10⤵PID:2220
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50214.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50214.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1092 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-8584.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8584.exe8⤵PID:2272
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53364.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53364.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61719.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61719.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1928
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40945.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40945.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1156 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-7692.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7692.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-458.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-458.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:324 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-57705.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57705.exe8⤵PID:1388
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-6405.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6405.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:748 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-59409.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59409.exe7⤵PID:2384
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18366.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18366.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1060 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30915.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30915.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27345.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27345.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1312 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54236.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54236.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50666.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50666.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2880
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30992.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30992.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-29172.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29172.exe8⤵PID:2688
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1780.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1780.exe9⤵PID:2116
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13758.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13758.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2956 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35098.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35098.exe7⤵PID:2160
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23815.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23815.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3060 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-33624.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33624.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-25586.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25586.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2592
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59965.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59965.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2140 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-24164.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24164.exe7⤵PID:2284
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40675.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40675.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2712 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22088.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22088.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:296 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51719.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51719.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-57085.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57085.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:896 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-4651.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4651.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2480 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35783.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35783.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3024
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43628.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43628.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:944 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-36280.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36280.exe8⤵PID:2188
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1122.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1122.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54942.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54942.exe7⤵PID:1668
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-47640.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47640.exe8⤵PID:980
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29051.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29051.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1308 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18248.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18248.exe6⤵
- Executes dropped EXE
PID:1072
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60442.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60442.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2072 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48917.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48917.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:680 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38668.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38668.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1944 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-28741.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28741.exe7⤵PID:2492
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2492 -s 2368⤵
- Program crash
PID:1748
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55175.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55175.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2176
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32185.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32185.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2520 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45274.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45274.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37272.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37272.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-31299.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31299.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49218.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49218.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2132 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-24880.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24880.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1900 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37947.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37947.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2228 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-583.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-583.exe9⤵PID:2000
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38693.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38693.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2996
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24858.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24858.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2612 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-63219.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63219.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2060 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18133.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18133.exe8⤵PID:304
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44947.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44947.exe7⤵PID:2744
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49773.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49773.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2364 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44724.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44724.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-31289.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31289.exe7⤵PID:2472
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17579.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17579.exe8⤵PID:1908
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63250.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63250.exe7⤵PID:1876
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30053.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30053.exe8⤵PID:2992
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64718.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64718.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:528 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16354.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16354.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1884 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16328.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16328.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62918.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62918.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1956 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-57459.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57459.exe8⤵PID:488
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27868.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27868.exe6⤵PID:1608
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41424.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41424.exe7⤵PID:2392
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34370.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34370.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2448 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22462.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22462.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1384 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-29172.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29172.exe7⤵PID:2680
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10198.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10198.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2756 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51719.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51719.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:608 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-7500.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7500.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3008 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-25264.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25264.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2780 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-583.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-583.exe7⤵PID:2080
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2274.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2274.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27973.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27973.exe6⤵PID:2436
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4163.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4163.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1748 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16603.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16603.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2760 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35565.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35565.exe6⤵PID:2460
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16291.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16291.exe7⤵PID:436
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63250.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63250.exe6⤵PID:2512
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41879.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41879.exe7⤵PID:380
-
-
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD54b137a9e240b9e50b66aa47cb118d867
SHA1bf515f6d4b3aa0ef3697058fc717875c0fbd28ac
SHA256efa0764217c114d997e6584920eeea15e83516c9f5ebd933132e96b5d59d3e7c
SHA512df16774b263cf0ee437053e34a3e0f69dafb59e6bb31e1e13768333ba0388d321d180926a9e80609ef50a35b6b2ebda9056e65f34cf03ee1dd51079d559974e8
-
Filesize
184KB
MD55fb99259d6f7d248f9215aafe37afb36
SHA13446992ce7834f72ddf5a8cd080a9d481e58b4c6
SHA256f36853222840defdc62d3aea51abd16a1e46fc946d45379efc71b4a74ee857d1
SHA512fc170c68b8842385056d077a9e3d6cf36b9e0101f3fbe85896d28d93ba075f76d1d12a3ba22ac2246ac17ed412d355fe09345d3487a5c2025e35e7e29b73220f
-
Filesize
184KB
MD5058142f3fce22159a5a0e24f15121ee9
SHA10cc8a0a56358acd14a9c92d6a5e81f2b6ea9e651
SHA25606dc266af43a826f26694b961e1c19d33bb4a8214403e0b55a3e3066bf1487e7
SHA512ef68db4ad1feb56b6f4b046031981b059a892116ac08ff38a196ebc225cb8fa17b12db0017a3586a560983aed42f73f37b083ff5075595e357e0a5523f434e40
-
Filesize
184KB
MD5cdd4143876eeb76e1499962ffa9e2fcd
SHA1b188ded9ff3b8839d9b5bafbb2ac719da9e74541
SHA2560711667ed16bb7c4d4788dc1b8d2e20d2df975c91c7baedf727c9528f05a8ec7
SHA51245432c19b7b3563726f4a9d2711349f6fb4b03812b250d47d07de6beea4d04ece16641eb3a3e8013dec9c48e971f42c5a1744c9d1324bc4cc04b481356b39643
-
Filesize
184KB
MD5f9c0180378e80530acfb3baf8c2e9cad
SHA134a55f798df2b10eea01ea219be4917e8c7e46f0
SHA256fb2c7a31393429dffd5d6403dc68070be91b8416c23e535879e840b1ea7bbd0f
SHA5127764a096dd19d025afee40597d5fdf010935b77d43b2272ad22a1b5fe94e084198f6fb6b796cfa80d3463089deacad70aa24ba9164ea5c272eada7a0100d48a2
-
Filesize
184KB
MD5a3ce55dfa3c090c3767d05c77d74b0b7
SHA134de0b4b4364e1564561283f5238e8007778f174
SHA2568448741f268c47ac8eee0b5bb48bf62c16e0c3d20497e83b28fd57413dc292ae
SHA5122942030080bfda6b9b5554c8ec371142068e2d181f1182bf8f61fd520bf7fd9da49ed176ac937628dcceae4229070292f52c64991661f0448a25e10c5e7cfc6b
-
Filesize
184KB
MD52b449cee272920f01a0779dad1289c37
SHA161f90db3ab5e26e4cf6a0405551c307f1417378c
SHA2568fecf2df62a1290659108c14f607923472d8d17f6509020b70938bc31f037dd7
SHA51291f892fb99daac074f4f7315aa780accc7d98ee506f5872576509000af6880a17e3a7fe1ee05c0c77980936416f9916e3fcad4c430f24c2418c7293acb57491f
-
Filesize
184KB
MD59a9ba33fe2fe34539f569220ea5a7ab8
SHA1eea8bc46bcaad13127ea82cc344d43f40fa70812
SHA256b489036fc68b3378535657f1dc382df7d2260767d672fbf841e9dcc1234de055
SHA51236eeead501c041097f329aa77e0c58cfdbc3c2baede40f25c7c0401ed0710ce8abced0d92f22593518e6a9537ef8b4b74394e17d971145f51b3ae199732f0ae0
-
Filesize
184KB
MD568407840d9190dc2f3b940be35cceefa
SHA16bff0b7674ede8c45eee5dde3bcac831d1df61f5
SHA25658cf5732f7dca4509f569901cbb92b3a342e71b7bdd134005486cf000b00091a
SHA512ec977b21426dad953b9a0520712bccb9bf3b591827b47ee97c4dae81988f51b6039d0c5fe7abd091fbc5ceaff36a7c633d776467565ef3b08a1464e28996fe1a
-
Filesize
184KB
MD50c6856910a443072c14c968737c5b958
SHA183fc26d76d8338bda4ddfc4abc06746f84addff8
SHA2562daaceded9a4dd8d5a84fdaa0f4af55d100c2e6c1c2d0d63f83e8efc29d2011a
SHA512e366792f6bfd0a96b303934163ed52e33f7e1d492ae5161716c4ce71b6c68a702053e421f56bbc049e6e5f6478f20498e6019439ab56f70ede610a1b5e648dcf
-
Filesize
184KB
MD55d57b704042ddfc0866111c6638fbf47
SHA1ab300adccb154e3699e299f94540bbbaa3e271c3
SHA256ca52c651d24c4e170fdcc43168459723c83300301b8608785fbc2612c5b8e5d6
SHA512c8833b5bf04ab15bdb0d8a7cb955a6f5240cdc48d0659b74eb2969f6a60017b3b1eb06d9d8fb7a0d702e9f6b5fe5bf5ee03384261ed4bd873b2661619b6a5e31
-
Filesize
184KB
MD5931c9abc1351865132e01aa909390823
SHA107211ddc3a989af19adc6b5ccba68bea4c085fb3
SHA2562d5e3cd74c734f458ae831fbb9aa08b4e244ca0afdc70ef1e74542a82d7c75a1
SHA5124b9c30dc9e65fd82c08a59919da2bb1db755091f57e55cb41fc76c87b8270b5e5a9f65585e52ced9f116e10bec52ce4482d5fd79b8581e90f20f23f8d84aa59a
-
Filesize
184KB
MD5c423f4833ffcb18957077dab6508f7a6
SHA166b46fbcce283eda306bfb19c174f40ea29436d4
SHA25651790a073548f549130d9e9ef09a0aacb209ee72cf9bd030e7f0ff4670b9245d
SHA512b621fc3f1fc5686e82a22f995bef985d78533c4d58a4979945b666d58c39daf12a0597d92f8371ea44cdf0458167efcd35e9da516b7d098925cde6690948d32c
-
Filesize
184KB
MD503a5a79405b9a714eb16dcbbee80a717
SHA148a13d128852c540097de63a95e8841992e366e3
SHA2560fda5e25366a24a2dc5859211328ea31a6ee4a9cc4d547a22d884411d2d43e05
SHA5120c34710adb46f9ae0de9d4ebad5a497673980969f1df77ce1104cc05785494f5472bf39f348596d512c6050237ec62b38fd7df7620951b222dba08a29d83663c
-
Filesize
184KB
MD5b1aafbe884ac82baa07515a8008bfdc5
SHA18cb6a67ee8d9b29bb2f007588f793d1a7f7e1705
SHA25629ca6fd3b725918ce46b5bcdf297646b2b2fa112cb31abaf2832a67f82e6f75a
SHA51291b6cae7cd1fcacb4e321a642b51b095f346e253e534f3d12a4440c6faadf8116b1c45a0093d017e7ca59f31dff0fff34c40d9b35528f94dcd53e55e499c3bb2
-
Filesize
184KB
MD51aeaaaa4febc7e1d08fe6087066b69df
SHA15ec51e0101466891af00fc46e01da0c14352a638
SHA256bae685e6b997e20ca8561d43cf04a99da9f95a71e69d3f5520a93999297c4ccc
SHA512dc9005301c7f21a7d9700b98e61cee6262d029e9b9e9f32c5df6810c584912d094932ec29403497f1589e76742d8b03b07a36e193a1e6a9382a76bdcaef164f0
-
Filesize
184KB
MD59bee7f2ccd05cba5ddcf0d1766f57160
SHA19292787ba4e7fbb3d04c6e25b2fe0894b99f44b9
SHA256a275d2b680a3eda72740b450854e4fa2393cce4182a67596f74d919e76780f1f
SHA512303f6c2b72595d3cfbcb920f095de6a984ef9be4d9a6ee4c6ef32dcc5aa2b2a128fac124ca428857cf85ace6b54a941f02b1d859418e51469ab06bece229613b
-
Filesize
184KB
MD5c6264fbab2c5e175c051642d4d53c693
SHA1704cf1619c3f8279bebb42048fde0c0c7e3187f2
SHA2562f8ce6328f71440aee79ef2d31236028532ec52c99be2ed0d69f5118a2227a76
SHA512e14a7bd59be6a509260a3506ea8a67e061872e1aeab1aa6ab54b526f2825c32af188b3d5617fa78e41249843328c189a5dc50c480da7ea8213ece339f888f3dd
-
Filesize
184KB
MD5cf5304e7da0e20b6af5ba2d13e49e753
SHA18ab5a26c67ea89d71467a1ce6047ec76f4ce35fb
SHA2564e3f3487ef083d31ada42007fe50ee31258f7cea634f64f4b46c7765748a1dd9
SHA512cf559b56b52b4fb87d26e565da0c2a4129fff61d200047e80802cdf84aef184bc56c31f4acc711306aa984adaae0522b5982515ca99a3bd202fb7a1326c8946d