Analysis

  • max time kernel
    32s
  • max time network
    121s
  • platform
    windows7_x64
  • resource
    win7-20240220-en
  • resource tags

    arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system
  • submitted
    17/04/2024, 00:50

General

  • Target

    f4b20a95d644960d62fd60b832d3ce79_JaffaCakes118.exe

  • Size

    184KB

  • MD5

    f4b20a95d644960d62fd60b832d3ce79

  • SHA1

    ecf0307e40ea95cce38aa1eebd95d5f29d9fe1b9

  • SHA256

    980a5698d30468743c3c2ee2cc6a2fde61b64b245fc28c2d05f7d2f714e4010c

  • SHA512

    5d0b62b6e1d8fabd9e90fd892f2f2c1c0009959bbc7988eda6a7225e508dba08efcf0a6090e66a0ee67c5942a179aad8b66b6a0b570701932af32bf64b51a855

  • SSDEEP

    3072:ZkSzoGNXVWzt1OjJd/8s88buy6c6u69EODyxsHPXt6lPvyFP:Zk6o8Yt1+dks88KeE16lPvyF

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 64 IoCs
  • Loads dropped DLL 64 IoCs
  • Program crash 1 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\f4b20a95d644960d62fd60b832d3ce79_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\f4b20a95d644960d62fd60b832d3ce79_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2908
    • C:\Users\Admin\AppData\Local\Temp\Unicorn-41301.exe
      C:\Users\Admin\AppData\Local\Temp\Unicorn-41301.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1624
      • C:\Users\Admin\AppData\Local\Temp\Unicorn-41180.exe
        C:\Users\Admin\AppData\Local\Temp\Unicorn-41180.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2544
        • C:\Users\Admin\AppData\Local\Temp\Unicorn-63496.exe
          C:\Users\Admin\AppData\Local\Temp\Unicorn-63496.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2392
          • C:\Users\Admin\AppData\Local\Temp\Unicorn-47016.exe
            C:\Users\Admin\AppData\Local\Temp\Unicorn-47016.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:352
            • C:\Users\Admin\AppData\Local\Temp\Unicorn-51311.exe
              C:\Users\Admin\AppData\Local\Temp\Unicorn-51311.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              PID:3040
              • C:\Users\Admin\AppData\Local\Temp\Unicorn-20080.exe
                C:\Users\Admin\AppData\Local\Temp\Unicorn-20080.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:1448
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-55397.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-55397.exe
                  8⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:2808
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-31343.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-31343.exe
                    9⤵
                      PID:1388
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-65214.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-65214.exe
                    8⤵
                      PID:1140
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-46409.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-46409.exe
                    7⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:1028
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-45658.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-45658.exe
                  6⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:1524
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-12138.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-12138.exe
                    7⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:2420
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-6605.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-6605.exe
                      8⤵
                        PID:1680
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-16122.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-16122.exe
                      7⤵
                        PID:2892
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-48467.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-48467.exe
                    5⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of SetWindowsHookEx
                    PID:2224
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-53162.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-53162.exe
                      6⤵
                      • Executes dropped EXE
                      • Suspicious use of SetWindowsHookEx
                      PID:292
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-32232.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-32232.exe
                        7⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:2860
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-53202.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-53202.exe
                      6⤵
                      • Executes dropped EXE
                      • Suspicious use of SetWindowsHookEx
                      PID:2900
              • C:\Users\Admin\AppData\Local\Temp\Unicorn-27846.exe
                C:\Users\Admin\AppData\Local\Temp\Unicorn-27846.exe
                3⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:2652
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-16289.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-16289.exe
                  4⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:2656
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-50088.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-50088.exe
                    5⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • Suspicious use of SetWindowsHookEx
                    PID:2456
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-16221.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-16221.exe
                      6⤵
                      • Executes dropped EXE
                      • Suspicious use of SetWindowsHookEx
                      PID:2768
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-45394.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-45394.exe
                        7⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:1920
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-21340.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-21340.exe
                          8⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:1540
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-42672.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-42672.exe
                        7⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:1732
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-9278.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-9278.exe
                          8⤵
                            PID:2192
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-12539.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-12539.exe
                        6⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:2540
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-44993.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-44993.exe
                          7⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:1248
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-53497.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-53497.exe
                            8⤵
                              PID:2108
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-33631.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-33631.exe
                            7⤵
                              PID:2276
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-3860.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-3860.exe
                                8⤵
                                  PID:3064
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-24777.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-24777.exe
                            5⤵
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            PID:1848
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-45394.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-45394.exe
                              6⤵
                              • Executes dropped EXE
                              • Suspicious use of SetWindowsHookEx
                              PID:2704
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-21776.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-21776.exe
                                7⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                PID:2188
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-51002.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-51002.exe
                              6⤵
                              • Executes dropped EXE
                              • Suspicious use of SetWindowsHookEx
                              PID:2496
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-2961.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-2961.exe
                                7⤵
                                  PID:2316
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-5116.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-5116.exe
                            4⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Suspicious use of SetWindowsHookEx
                            PID:2032
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-14684.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-14684.exe
                              5⤵
                              • Executes dropped EXE
                              • Suspicious use of SetWindowsHookEx
                              PID:2200
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-16484.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-16484.exe
                                6⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                PID:1532
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-28024.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-28024.exe
                              5⤵
                              • Executes dropped EXE
                              • Suspicious use of SetWindowsHookEx
                              PID:1928
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-21776.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-21776.exe
                                6⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                PID:1668
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-53258.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-53258.exe
                                  7⤵
                                    PID:1768
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-21314.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-21314.exe
                          2⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Suspicious use of SetWindowsHookEx
                          • Suspicious use of WriteProcessMemory
                          PID:2604
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-32419.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-32419.exe
                            3⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Suspicious use of SetWindowsHookEx
                            • Suspicious use of WriteProcessMemory
                            PID:2964
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-37010.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-37010.exe
                              4⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • Suspicious use of SetWindowsHookEx
                              • Suspicious use of WriteProcessMemory
                              PID:2892
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-17058.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-17058.exe
                                5⤵
                                • Executes dropped EXE
                                • Loads dropped DLL
                                • Suspicious use of SetWindowsHookEx
                                PID:296
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-25437.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-25437.exe
                                  6⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Suspicious use of SetWindowsHookEx
                                  PID:2052
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-32545.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-32545.exe
                                    7⤵
                                    • Executes dropped EXE
                                    • Suspicious use of SetWindowsHookEx
                                    PID:844
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-12138.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-12138.exe
                                      8⤵
                                      • Executes dropped EXE
                                      • Suspicious use of SetWindowsHookEx
                                      PID:2664
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-19543.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-19543.exe
                                        9⤵
                                          PID:3020
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-9149.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-9149.exe
                                            10⤵
                                              PID:2124
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-33631.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-33631.exe
                                          8⤵
                                            PID:1008
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-31499.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-31499.exe
                                          7⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetWindowsHookEx
                                          PID:2424
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-52348.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-52348.exe
                                            8⤵
                                              PID:1508
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-3807.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-3807.exe
                                                9⤵
                                                  PID:1988
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-28164.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-28164.exe
                                            6⤵
                                            • Executes dropped EXE
                                            • Suspicious use of SetWindowsHookEx
                                            PID:1728
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-21.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-21.exe
                                              7⤵
                                              • Executes dropped EXE
                                              • Suspicious use of SetWindowsHookEx
                                              PID:2716
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -u -p 2716 -s 240
                                                8⤵
                                                • Program crash
                                                PID:1656
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-33631.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-33631.exe
                                              7⤵
                                                PID:1304
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-8936.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-8936.exe
                                                  8⤵
                                                    PID:1636
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-49043.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-49043.exe
                                              5⤵
                                              • Executes dropped EXE
                                              • Suspicious use of SetWindowsHookEx
                                              PID:1820
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-16484.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-16484.exe
                                                6⤵
                                                • Executes dropped EXE
                                                • Suspicious use of SetWindowsHookEx
                                                PID:868
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-44505.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-44505.exe
                                                  7⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:2660
                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-19543.exe
                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-19543.exe
                                                    8⤵
                                                      PID:2580
                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-50840.exe
                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-50840.exe
                                                        9⤵
                                                          PID:2012
                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-51701.exe
                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-51701.exe
                                                      7⤵
                                                        PID:3012
                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-45693.exe
                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-45693.exe
                                                      6⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:2740
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-49548.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-49548.exe
                                                  4⤵
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:1020
                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-49775.exe
                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-49775.exe
                                                    5⤵
                                                    • Executes dropped EXE
                                                    • Loads dropped DLL
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:580
                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-31969.exe
                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-31969.exe
                                                      6⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:1912
                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-47056.exe
                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-47056.exe
                                                        7⤵
                                                          PID:1704
                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-14438.exe
                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-14438.exe
                                                            8⤵
                                                              PID:2032
                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-3866.exe
                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-3866.exe
                                                                9⤵
                                                                  PID:688
                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-39304.exe
                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-39304.exe
                                                            6⤵
                                                            • Executes dropped EXE
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:2460
                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-53497.exe
                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-53497.exe
                                                              7⤵
                                                                PID:1012
                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-54999.exe
                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-54999.exe
                                                            5⤵
                                                            • Executes dropped EXE
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:1664
                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-5330.exe
                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-5330.exe
                                                              6⤵
                                                              • Executes dropped EXE
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:2880
                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-2961.exe
                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-2961.exe
                                                                7⤵
                                                                  PID:2148
                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-45720.exe
                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-45720.exe
                                                                    8⤵
                                                                      PID:1352
                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-8406.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-8406.exe
                                                                  6⤵
                                                                    PID:992
                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-32568.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-32568.exe
                                                                      7⤵
                                                                        PID:1960
                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-14212.exe
                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-14212.exe
                                                                3⤵
                                                                • Executes dropped EXE
                                                                • Loads dropped DLL
                                                                • Suspicious use of SetWindowsHookEx
                                                                • Suspicious use of WriteProcessMemory
                                                                PID:360
                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-2340.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-2340.exe
                                                                  4⤵
                                                                  • Executes dropped EXE
                                                                  • Loads dropped DLL
                                                                  • Suspicious use of SetWindowsHookEx
                                                                  PID:1636
                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-31130.exe
                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-31130.exe
                                                                    5⤵
                                                                    • Executes dropped EXE
                                                                    • Suspicious use of SetWindowsHookEx
                                                                    PID:2360
                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-43422.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-43422.exe
                                                                      6⤵
                                                                      • Executes dropped EXE
                                                                      • Suspicious use of SetWindowsHookEx
                                                                      PID:1620
                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-37837.exe
                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-37837.exe
                                                                        7⤵
                                                                        • Executes dropped EXE
                                                                        • Suspicious use of SetWindowsHookEx
                                                                        PID:1004
                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-21479.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-21479.exe
                                                                      6⤵
                                                                      • Executes dropped EXE
                                                                      • Suspicious use of SetWindowsHookEx
                                                                      PID:1640
                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-52939.exe
                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-52939.exe
                                                                    5⤵
                                                                    • Executes dropped EXE
                                                                    • Suspicious use of SetWindowsHookEx
                                                                    PID:1488
                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-3794.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-3794.exe
                                                                      6⤵
                                                                      • Executes dropped EXE
                                                                      • Suspicious use of SetWindowsHookEx
                                                                      PID:980
                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-53497.exe
                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-53497.exe
                                                                        7⤵
                                                                          PID:360
                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-27936.exe
                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-27936.exe
                                                                            8⤵
                                                                              PID:896
                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-54950.exe
                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-54950.exe
                                                                          6⤵
                                                                            PID:2836
                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-20078.exe
                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-20078.exe
                                                                              7⤵
                                                                                PID:2732
                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-12479.exe
                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-12479.exe
                                                                                  8⤵
                                                                                    PID:2180
                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-60356.exe
                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-60356.exe
                                                                            4⤵
                                                                            • Executes dropped EXE
                                                                            • Suspicious use of SetWindowsHookEx
                                                                            PID:696
                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-15908.exe
                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-15908.exe
                                                                              5⤵
                                                                              • Executes dropped EXE
                                                                              • Suspicious use of SetWindowsHookEx
                                                                              PID:2484
                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-198.exe
                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-198.exe
                                                                                6⤵
                                                                                • Executes dropped EXE
                                                                                • Suspicious use of SetWindowsHookEx
                                                                                PID:1924
                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-28272.exe
                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-28272.exe
                                                                                  7⤵
                                                                                    PID:976
                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-49902.exe
                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-49902.exe
                                                                                5⤵
                                                                                • Executes dropped EXE
                                                                                PID:2064

                                                                      Network

                                                                      MITRE ATT&CK Matrix

                                                                      Replay Monitor

                                                                      Loading Replay Monitor...

                                                                      Downloads

                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-14212.exe

                                                                        Filesize

                                                                        184KB

                                                                        MD5

                                                                        042f951bbae37908a9e2a28c8931f6e2

                                                                        SHA1

                                                                        6dbff12be871824b5f291297b967014da4e7d87a

                                                                        SHA256

                                                                        175971fc1543eb14d5d7b659daa4918eed3fff6f9002426af0a362b449cfe2b0

                                                                        SHA512

                                                                        22358180680435cffbfab4dfe2ef656e68aa862a2d7312084618dd8b087a91df53b2adab3606a917f21d4338e2266da5e80b375ce4decdbcfa495c04dcd18625

                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-37010.exe

                                                                        Filesize

                                                                        184KB

                                                                        MD5

                                                                        37ab993b61a25cf434515e38f1a72c2a

                                                                        SHA1

                                                                        ad33fbb34fecf58a018d5dd2c93de67b01816eb7

                                                                        SHA256

                                                                        4742523d896aef257dbe7da9635351b621fa796389f70768efca7190b027b17c

                                                                        SHA512

                                                                        a4c2f161f286786e43590e248b58bd542d7e79f056958dd0a2ea9787e31b96e6c052244d2f769d013b289df2781e9307898383c8292f99e3a898eb5a3d5d9040

                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-47016.exe

                                                                        Filesize

                                                                        184KB

                                                                        MD5

                                                                        65f9d468762797366805108de709b9f0

                                                                        SHA1

                                                                        2cad0cff9094e42a9e89bfd171e20aa39a336202

                                                                        SHA256

                                                                        138ed0511b3e784ccb327c53bbfa567e2eaf729610ae83079058bd5753b48792

                                                                        SHA512

                                                                        49baa02b5a280ad820ea429dc93da06ce21f898eab914941f85eda5b5bf2ce50d1e0406cf627cbd929e3289f816a6959a2b7c9c8375dd8dc7a3b651d74b6c9e6

                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-48467.exe

                                                                        Filesize

                                                                        184KB

                                                                        MD5

                                                                        4bc9416f7a4159b6e1fa85fecac5cf26

                                                                        SHA1

                                                                        20d2f12675aa646914d61f7723ebcc7cff8a709e

                                                                        SHA256

                                                                        214b1a25dbbec1b052cd7c6c2dec3a0e4ff6e444b5c2ca568216b5f0a4a77d1f

                                                                        SHA512

                                                                        62785ffb8a9abf164df7b9fb721a967096025c8244211f9406b42bf0acb695e418d400cd6823737dfd5bc8c6aa0049313c85f56179998ddbcdd71961e3604424

                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-50088.exe

                                                                        Filesize

                                                                        184KB

                                                                        MD5

                                                                        3aee0fcc5f3375e11e363b95d51c2610

                                                                        SHA1

                                                                        8ac0c01ef6bf24e8b2589e612343e701a9db2d87

                                                                        SHA256

                                                                        17625210a35103e21db8043f1fbfba3bfb74ae84ac00f104fce1a96ecc8dadd9

                                                                        SHA512

                                                                        b11c50212fb0ee3a2ea67cb35a77ab3d38db95e43e25a073dcb09f101fbe14dde56f1ff75c440535a55e6495645f4a365ca71dd408018e892bfffd2cb8210f49

                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-6605.exe

                                                                        Filesize

                                                                        184KB

                                                                        MD5

                                                                        f2abf9bc74b952da9b379a7ded3fbb17

                                                                        SHA1

                                                                        55e1a7eb22382191c01874463297350a548c7463

                                                                        SHA256

                                                                        bd7175ddeeabb363dfdd6fcf9d7135b699900c5e0908acfc87450b8c3f138e32

                                                                        SHA512

                                                                        f0adc8f5adf2694aa12805e901e56b4d407b4394b37d616cc397182bae573126ff8e2c1058a12fc444179b117828418a92b560d42d7ee0155326568fe76ac33e

                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-8936.exe

                                                                        Filesize

                                                                        184KB

                                                                        MD5

                                                                        6ff153a03a3e55ecd5000aefc3081c59

                                                                        SHA1

                                                                        c5d5e4f2cb1626b1f0edf33ff43e9205c503c43f

                                                                        SHA256

                                                                        ee5ff9591561cf0aa4dcb0ed966e364030af29585d3e5ca4d7fdc3e096f9f6ca

                                                                        SHA512

                                                                        7d774a3a76e53513f12d9f5706c27836c20d9e31c6ac6b2616835b5bdcf18305b7987b770583c3b76c51c7f6d3bc2dd640e226df9565a6cd117d10e3dd00f78d

                                                                      • \Users\Admin\AppData\Local\Temp\Unicorn-16289.exe

                                                                        Filesize

                                                                        184KB

                                                                        MD5

                                                                        4104e5c1f6daaba8b2231ddaef767028

                                                                        SHA1

                                                                        006ab76dd9519acfa3da0f88763e8d5a3e30226c

                                                                        SHA256

                                                                        c5d880ce72c30c38c34152b34b167ab6887d3a5940cdde44d82dfc80b187f7f3

                                                                        SHA512

                                                                        1fc162e683bf9235a0324db6a71de5694cf9aed0bb0a9d76f6af1a19355307a75bb28d3b0f40cad0cd9cf582f673bfbc04f28f619447545fecd26dbca7a1e063

                                                                      • \Users\Admin\AppData\Local\Temp\Unicorn-17058.exe

                                                                        Filesize

                                                                        184KB

                                                                        MD5

                                                                        6280fa31f688d9bc2d9346cce448c572

                                                                        SHA1

                                                                        7d5a9fe63623bec6a7005e2454b5cdfbfc5c843b

                                                                        SHA256

                                                                        9e3344ac43e712d2ee6c047104a2b69f6563773591f3fd612b3e49955102c63d

                                                                        SHA512

                                                                        d94104af532bf8a6a260761b0acb6f5808be8885a49d42f9804927164c71e8dd1d227a9f58bb1d28d1fe539f734433df76ada47766c7011cbbd9866c92a80aff

                                                                      • \Users\Admin\AppData\Local\Temp\Unicorn-21314.exe

                                                                        Filesize

                                                                        184KB

                                                                        MD5

                                                                        68b9f273bb4183ad73bd19107d8a9001

                                                                        SHA1

                                                                        1b3fb82b7ed3ef4acbe14e5b4ee298160f12207b

                                                                        SHA256

                                                                        d4ad9f153ae2a73f7d26c4a88cd1f7a782dea3bbb3cf2de028a411a9acf22967

                                                                        SHA512

                                                                        61969ff17735930323a9f0c54d79b95b7df3a735577f3f6ab71d335ec22ac2bd78a3bfc29710b5beb34d9f874af0f8af9dd3fa132c1ff8c2987806e8433f78ca

                                                                      • \Users\Admin\AppData\Local\Temp\Unicorn-2340.exe

                                                                        Filesize

                                                                        184KB

                                                                        MD5

                                                                        3fc7e3aa777687887f8d25b33d6a3100

                                                                        SHA1

                                                                        9b3eeb4026f04b0e7a11bf419a80886b91fbfa31

                                                                        SHA256

                                                                        49a6e2f764a306b4259685d5f208d24a4dcb4b11595c68d9b903ea070bfd2d05

                                                                        SHA512

                                                                        2b27643d97ec21597862142ea4c2e3d40d65bcfc5e5ca657878a84a0ebf477dbbe0537e2027f2e33f51963b09874a866c47300678a3c7686ac683c65b69a3558

                                                                      • \Users\Admin\AppData\Local\Temp\Unicorn-25437.exe

                                                                        Filesize

                                                                        184KB

                                                                        MD5

                                                                        14f86f63026437770a3cb4d1e3522b14

                                                                        SHA1

                                                                        9f45485044a5a69e50924c7bea2e6a10376df717

                                                                        SHA256

                                                                        59900194945d1c3ef2904b096ae7b4dfd5d1a7f79038a5b6e0ebfb2bfb521038

                                                                        SHA512

                                                                        80fa8b8a2056156470c050012df6445863e2dff737efefa56f5e7abbae7ebd1e8be6b783dc31b85caca19467305019be08f4bce14123c12397fac9cfa4b2fc42

                                                                      • \Users\Admin\AppData\Local\Temp\Unicorn-27846.exe

                                                                        Filesize

                                                                        184KB

                                                                        MD5

                                                                        960f155f155f7cbffe5ee2be7b498147

                                                                        SHA1

                                                                        03ae3480742316fc907e839a1d274998fb73aeeb

                                                                        SHA256

                                                                        91f9c8490634a15ee54d2b643ee5286aa961086491b77b1f714e7dabed03fec5

                                                                        SHA512

                                                                        8080e5b1a48dba02e4f75c85bf46df1f1bfcd8687a00764089515952f01f41c2bd98bbe49dca85d32628e7611bc4c76fc013c7136b5de427a68c9861f007e2c1

                                                                      • \Users\Admin\AppData\Local\Temp\Unicorn-32419.exe

                                                                        Filesize

                                                                        184KB

                                                                        MD5

                                                                        a2a78893072ef0dab4aca12990137d17

                                                                        SHA1

                                                                        620f7e3035bdd2280e230bffa80ad93445dc22b0

                                                                        SHA256

                                                                        adbc7155e743008ae84d8dbc410339f86c28a4e4b7d6540a37f2e67ce98b024f

                                                                        SHA512

                                                                        d979077c5fa2375018b86fd14c3845281cff20d269bc1690dcc33edeff070e1426171b26b64e54f455c44ecf69f91239dc79ade4aa5e6cf8478d911253ad2387

                                                                      • \Users\Admin\AppData\Local\Temp\Unicorn-41180.exe

                                                                        Filesize

                                                                        184KB

                                                                        MD5

                                                                        dd6e252e385732c45c8e5fa2010485ae

                                                                        SHA1

                                                                        f43e749b3b876d93c2c0c86f09f83441042ceab8

                                                                        SHA256

                                                                        7f3f6e56a0b8d4a041d8df6abef36d9c28ef8757e17ffb69520aafdc00fec5e6

                                                                        SHA512

                                                                        0b8607a0726bcdd3d5c28953606b51e9abdbcc223d0dd324b962337e70ae393039c24c242fe33d25a632acda58155d8b19a581082f88db949042aba238d5b4b1

                                                                      • \Users\Admin\AppData\Local\Temp\Unicorn-41301.exe

                                                                        Filesize

                                                                        184KB

                                                                        MD5

                                                                        69d1b76de49143d729363d3c07b6c5c1

                                                                        SHA1

                                                                        72186252789017d1665e0da02082d04a3e550e9b

                                                                        SHA256

                                                                        acb94e078c22b9031e41ee78cff39607c4df5034906ff42d777df76abf04f2d0

                                                                        SHA512

                                                                        3eeb592ba7e4b0fd6f8def94e8bbc362c35cad582c0c9a573edbcf5e9cf0d1874b131fab63ed569f504fe99797fcfc28f8b0a03f14f5c9d11f76d361cf1b74c6

                                                                      • \Users\Admin\AppData\Local\Temp\Unicorn-49548.exe

                                                                        Filesize

                                                                        184KB

                                                                        MD5

                                                                        1d7133301c9b74e54cb6ef5d5a2ea42c

                                                                        SHA1

                                                                        a083d6538349ae5d16c129278b2a7a4310ede6b4

                                                                        SHA256

                                                                        5c792a4044c59540482536558d103e9b1481d9d10277d2c9659d2afdb7b33135

                                                                        SHA512

                                                                        906ce64a2c90f1ede34879692dadea816fec3d21428d78efe069cb7decd0e5d98d7c2f08fe8f36c5cb73aba7a5519150f5b41c02495bc62685975c4d8a7e1532

                                                                      • \Users\Admin\AppData\Local\Temp\Unicorn-5116.exe

                                                                        Filesize

                                                                        184KB

                                                                        MD5

                                                                        3fcfe989f3d464274fc66a8140c8e750

                                                                        SHA1

                                                                        0a5eaff710fe5b4a156ba7df99e4d51ddf25d3a1

                                                                        SHA256

                                                                        6f89bed2cf0a576ba832ab08a1f7ffc8a7c2f110499fb4cfc86af45513c4a004

                                                                        SHA512

                                                                        6a2de1f722672e386c42e89d65734be5c9739e806400eabd98f7272cb71443a7cea495827be719965fa155aa12120172f8a0098d311b99a5ea33035b858f2901

                                                                      • \Users\Admin\AppData\Local\Temp\Unicorn-51311.exe

                                                                        Filesize

                                                                        184KB

                                                                        MD5

                                                                        d3adfb3c5c4cdfd262955b13f06aecbe

                                                                        SHA1

                                                                        e8e1dc1fb8e0df887d4bd80337d38b6938b25021

                                                                        SHA256

                                                                        1aa08f9f234d81e0171a1c2d62d2cc0cade85fda4d3fb09e34ab5dc5268e692b

                                                                        SHA512

                                                                        f9d61ca4fce3555c1f5b22977b7d1fa758b9e2500c86026024a271d5e4c85cf76186172d95e58f40bcb9674009bceabe025cc118e01724258636ee8db0fd891e

                                                                      • \Users\Admin\AppData\Local\Temp\Unicorn-63496.exe

                                                                        Filesize

                                                                        184KB

                                                                        MD5

                                                                        f871ca7ad78fcf9cdb4c7f06a006b0ae

                                                                        SHA1

                                                                        c712055906da17218ea10661691e32cb3da63d4c

                                                                        SHA256

                                                                        b097921ef2875fbfd29565bcce8996e46ef2d68c48b94ec7a66072c6b2391a1d

                                                                        SHA512

                                                                        f93ceb7b26359157bc4dd21d62bce0f125e396fba220bf549b93a606d8a57ef397b682b26edada7a104be78829ced4fba2ec8c83a8f43a165401f6dbef6a05e7