Analysis
-
max time kernel
32s -
max time network
121s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
17/04/2024, 00:50
Static task
static1
Behavioral task
behavioral1
Sample
f4b20a95d644960d62fd60b832d3ce79_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
f4b20a95d644960d62fd60b832d3ce79_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
f4b20a95d644960d62fd60b832d3ce79_JaffaCakes118.exe
-
Size
184KB
-
MD5
f4b20a95d644960d62fd60b832d3ce79
-
SHA1
ecf0307e40ea95cce38aa1eebd95d5f29d9fe1b9
-
SHA256
980a5698d30468743c3c2ee2cc6a2fde61b64b245fc28c2d05f7d2f714e4010c
-
SHA512
5d0b62b6e1d8fabd9e90fd892f2f2c1c0009959bbc7988eda6a7225e508dba08efcf0a6090e66a0ee67c5942a179aad8b66b6a0b570701932af32bf64b51a855
-
SSDEEP
3072:ZkSzoGNXVWzt1OjJd/8s88buy6c6u69EODyxsHPXt6lPvyFP:Zk6o8Yt1+dks88KeE16lPvyF
Malware Config
Signatures
-
Executes dropped EXE 64 IoCs
pid Process 1624 Unicorn-41301.exe 2544 Unicorn-41180.exe 2604 Unicorn-21314.exe 2964 Unicorn-32419.exe 2652 Unicorn-27846.exe 2392 Unicorn-63496.exe 2892 Unicorn-37010.exe 360 Unicorn-14212.exe 2656 Unicorn-16289.exe 352 Unicorn-47016.exe 296 Unicorn-17058.exe 1020 Unicorn-49548.exe 1636 Unicorn-2340.exe 2456 Unicorn-50088.exe 2032 Unicorn-5116.exe 3040 Unicorn-51311.exe 2224 Unicorn-48467.exe 2052 Unicorn-25437.exe 1820 Unicorn-49043.exe 580 Unicorn-49775.exe 2768 Unicorn-16221.exe 1848 Unicorn-24777.exe 2360 Unicorn-31130.exe 2200 Unicorn-14684.exe 696 Unicorn-60356.exe 1448 Unicorn-20080.exe 1524 Unicorn-45658.exe 292 Unicorn-53162.exe 844 Unicorn-32545.exe 1912 Unicorn-31969.exe 1664 Unicorn-54999.exe 1728 Unicorn-28164.exe 2484 Unicorn-15908.exe 868 Unicorn-16484.exe 1532 Unicorn-16484.exe 1928 Unicorn-28024.exe 1620 Unicorn-43422.exe 1920 Unicorn-45394.exe 2704 Unicorn-45394.exe 1488 Unicorn-52939.exe 2540 Unicorn-12539.exe 2808 Unicorn-55397.exe 1028 Unicorn-46409.exe 2664 Unicorn-12138.exe 2420 Unicorn-12138.exe 2424 Unicorn-31499.exe 2860 Unicorn-32232.exe 2460 Unicorn-39304.exe 2900 Unicorn-53202.exe 2660 Unicorn-44505.exe 2716 Unicorn-21.exe 2740 Unicorn-45693.exe 1540 Unicorn-21340.exe 1732 Unicorn-42672.exe 1004 Unicorn-37837.exe 980 Unicorn-3794.exe 1640 Unicorn-21479.exe 1248 Unicorn-44993.exe 1668 Unicorn-21776.exe 2188 Unicorn-21776.exe 2880 Unicorn-5330.exe 2496 Unicorn-51002.exe 2064 Unicorn-49902.exe 1924 Unicorn-198.exe -
Loads dropped DLL 64 IoCs
pid Process 2908 f4b20a95d644960d62fd60b832d3ce79_JaffaCakes118.exe 2908 f4b20a95d644960d62fd60b832d3ce79_JaffaCakes118.exe 1624 Unicorn-41301.exe 2908 f4b20a95d644960d62fd60b832d3ce79_JaffaCakes118.exe 1624 Unicorn-41301.exe 2908 f4b20a95d644960d62fd60b832d3ce79_JaffaCakes118.exe 2604 Unicorn-21314.exe 2604 Unicorn-21314.exe 1624 Unicorn-41301.exe 1624 Unicorn-41301.exe 2544 Unicorn-41180.exe 2544 Unicorn-41180.exe 2964 Unicorn-32419.exe 2964 Unicorn-32419.exe 2604 Unicorn-21314.exe 2604 Unicorn-21314.exe 2652 Unicorn-27846.exe 2652 Unicorn-27846.exe 2392 Unicorn-63496.exe 2392 Unicorn-63496.exe 2892 Unicorn-37010.exe 2892 Unicorn-37010.exe 2964 Unicorn-32419.exe 2964 Unicorn-32419.exe 360 Unicorn-14212.exe 360 Unicorn-14212.exe 2656 Unicorn-16289.exe 2656 Unicorn-16289.exe 2652 Unicorn-27846.exe 2652 Unicorn-27846.exe 352 Unicorn-47016.exe 352 Unicorn-47016.exe 2392 Unicorn-63496.exe 2392 Unicorn-63496.exe 296 Unicorn-17058.exe 296 Unicorn-17058.exe 2892 Unicorn-37010.exe 2892 Unicorn-37010.exe 1020 Unicorn-49548.exe 1020 Unicorn-49548.exe 2456 Unicorn-50088.exe 2456 Unicorn-50088.exe 2656 Unicorn-16289.exe 1636 Unicorn-2340.exe 2656 Unicorn-16289.exe 1636 Unicorn-2340.exe 2032 Unicorn-5116.exe 2032 Unicorn-5116.exe 360 Unicorn-14212.exe 360 Unicorn-14212.exe 3040 Unicorn-51311.exe 3040 Unicorn-51311.exe 352 Unicorn-47016.exe 352 Unicorn-47016.exe 2224 Unicorn-48467.exe 2224 Unicorn-48467.exe 2052 Unicorn-25437.exe 2052 Unicorn-25437.exe 580 Unicorn-49775.exe 580 Unicorn-49775.exe 1020 Unicorn-49548.exe 1020 Unicorn-49548.exe 296 Unicorn-17058.exe 296 Unicorn-17058.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 1656 2716 WerFault.exe 79 -
Suspicious use of SetWindowsHookEx 64 IoCs
pid Process 2908 f4b20a95d644960d62fd60b832d3ce79_JaffaCakes118.exe 1624 Unicorn-41301.exe 2544 Unicorn-41180.exe 2604 Unicorn-21314.exe 2964 Unicorn-32419.exe 2652 Unicorn-27846.exe 2392 Unicorn-63496.exe 2892 Unicorn-37010.exe 360 Unicorn-14212.exe 2656 Unicorn-16289.exe 352 Unicorn-47016.exe 296 Unicorn-17058.exe 1020 Unicorn-49548.exe 1636 Unicorn-2340.exe 2456 Unicorn-50088.exe 2032 Unicorn-5116.exe 3040 Unicorn-51311.exe 2224 Unicorn-48467.exe 2052 Unicorn-25437.exe 580 Unicorn-49775.exe 1820 Unicorn-49043.exe 2768 Unicorn-16221.exe 1848 Unicorn-24777.exe 2360 Unicorn-31130.exe 696 Unicorn-60356.exe 2200 Unicorn-14684.exe 1448 Unicorn-20080.exe 1524 Unicorn-45658.exe 292 Unicorn-53162.exe 844 Unicorn-32545.exe 1912 Unicorn-31969.exe 1728 Unicorn-28164.exe 1664 Unicorn-54999.exe 868 Unicorn-16484.exe 1532 Unicorn-16484.exe 1620 Unicorn-43422.exe 1928 Unicorn-28024.exe 2484 Unicorn-15908.exe 2704 Unicorn-45394.exe 1920 Unicorn-45394.exe 1488 Unicorn-52939.exe 2540 Unicorn-12539.exe 2808 Unicorn-55397.exe 2420 Unicorn-12138.exe 1028 Unicorn-46409.exe 2664 Unicorn-12138.exe 2424 Unicorn-31499.exe 2460 Unicorn-39304.exe 2860 Unicorn-32232.exe 2660 Unicorn-44505.exe 2716 Unicorn-21.exe 2740 Unicorn-45693.exe 2900 Unicorn-53202.exe 980 Unicorn-3794.exe 1540 Unicorn-21340.exe 1732 Unicorn-42672.exe 1004 Unicorn-37837.exe 1248 Unicorn-44993.exe 1668 Unicorn-21776.exe 1640 Unicorn-21479.exe 1924 Unicorn-198.exe 2496 Unicorn-51002.exe 2188 Unicorn-21776.exe 2880 Unicorn-5330.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2908 wrote to memory of 1624 2908 f4b20a95d644960d62fd60b832d3ce79_JaffaCakes118.exe 28 PID 2908 wrote to memory of 1624 2908 f4b20a95d644960d62fd60b832d3ce79_JaffaCakes118.exe 28 PID 2908 wrote to memory of 1624 2908 f4b20a95d644960d62fd60b832d3ce79_JaffaCakes118.exe 28 PID 2908 wrote to memory of 1624 2908 f4b20a95d644960d62fd60b832d3ce79_JaffaCakes118.exe 28 PID 1624 wrote to memory of 2544 1624 Unicorn-41301.exe 29 PID 1624 wrote to memory of 2544 1624 Unicorn-41301.exe 29 PID 1624 wrote to memory of 2544 1624 Unicorn-41301.exe 29 PID 1624 wrote to memory of 2544 1624 Unicorn-41301.exe 29 PID 2908 wrote to memory of 2604 2908 f4b20a95d644960d62fd60b832d3ce79_JaffaCakes118.exe 30 PID 2908 wrote to memory of 2604 2908 f4b20a95d644960d62fd60b832d3ce79_JaffaCakes118.exe 30 PID 2908 wrote to memory of 2604 2908 f4b20a95d644960d62fd60b832d3ce79_JaffaCakes118.exe 30 PID 2908 wrote to memory of 2604 2908 f4b20a95d644960d62fd60b832d3ce79_JaffaCakes118.exe 30 PID 2604 wrote to memory of 2964 2604 Unicorn-21314.exe 31 PID 2604 wrote to memory of 2964 2604 Unicorn-21314.exe 31 PID 2604 wrote to memory of 2964 2604 Unicorn-21314.exe 31 PID 2604 wrote to memory of 2964 2604 Unicorn-21314.exe 31 PID 1624 wrote to memory of 2652 1624 Unicorn-41301.exe 32 PID 1624 wrote to memory of 2652 1624 Unicorn-41301.exe 32 PID 1624 wrote to memory of 2652 1624 Unicorn-41301.exe 32 PID 1624 wrote to memory of 2652 1624 Unicorn-41301.exe 32 PID 2544 wrote to memory of 2392 2544 Unicorn-41180.exe 33 PID 2544 wrote to memory of 2392 2544 Unicorn-41180.exe 33 PID 2544 wrote to memory of 2392 2544 Unicorn-41180.exe 33 PID 2544 wrote to memory of 2392 2544 Unicorn-41180.exe 33 PID 2964 wrote to memory of 2892 2964 Unicorn-32419.exe 34 PID 2964 wrote to memory of 2892 2964 Unicorn-32419.exe 34 PID 2964 wrote to memory of 2892 2964 Unicorn-32419.exe 34 PID 2964 wrote to memory of 2892 2964 Unicorn-32419.exe 34 PID 2604 wrote to memory of 360 2604 Unicorn-21314.exe 35 PID 2604 wrote to memory of 360 2604 Unicorn-21314.exe 35 PID 2604 wrote to memory of 360 2604 Unicorn-21314.exe 35 PID 2604 wrote to memory of 360 2604 Unicorn-21314.exe 35 PID 2652 wrote to memory of 2656 2652 Unicorn-27846.exe 36 PID 2652 wrote to memory of 2656 2652 Unicorn-27846.exe 36 PID 2652 wrote to memory of 2656 2652 Unicorn-27846.exe 36 PID 2652 wrote to memory of 2656 2652 Unicorn-27846.exe 36 PID 2392 wrote to memory of 352 2392 Unicorn-63496.exe 37 PID 2392 wrote to memory of 352 2392 Unicorn-63496.exe 37 PID 2392 wrote to memory of 352 2392 Unicorn-63496.exe 37 PID 2392 wrote to memory of 352 2392 Unicorn-63496.exe 37 PID 2892 wrote to memory of 296 2892 Unicorn-37010.exe 38 PID 2892 wrote to memory of 296 2892 Unicorn-37010.exe 38 PID 2892 wrote to memory of 296 2892 Unicorn-37010.exe 38 PID 2892 wrote to memory of 296 2892 Unicorn-37010.exe 38 PID 2964 wrote to memory of 1020 2964 Unicorn-32419.exe 39 PID 2964 wrote to memory of 1020 2964 Unicorn-32419.exe 39 PID 2964 wrote to memory of 1020 2964 Unicorn-32419.exe 39 PID 2964 wrote to memory of 1020 2964 Unicorn-32419.exe 39 PID 360 wrote to memory of 1636 360 Unicorn-14212.exe 40 PID 360 wrote to memory of 1636 360 Unicorn-14212.exe 40 PID 360 wrote to memory of 1636 360 Unicorn-14212.exe 40 PID 360 wrote to memory of 1636 360 Unicorn-14212.exe 40 PID 2656 wrote to memory of 2456 2656 Unicorn-16289.exe 41 PID 2656 wrote to memory of 2456 2656 Unicorn-16289.exe 41 PID 2656 wrote to memory of 2456 2656 Unicorn-16289.exe 41 PID 2656 wrote to memory of 2456 2656 Unicorn-16289.exe 41 PID 2652 wrote to memory of 2032 2652 Unicorn-27846.exe 42 PID 2652 wrote to memory of 2032 2652 Unicorn-27846.exe 42 PID 2652 wrote to memory of 2032 2652 Unicorn-27846.exe 42 PID 2652 wrote to memory of 2032 2652 Unicorn-27846.exe 42 PID 352 wrote to memory of 3040 352 Unicorn-47016.exe 43 PID 352 wrote to memory of 3040 352 Unicorn-47016.exe 43 PID 352 wrote to memory of 3040 352 Unicorn-47016.exe 43 PID 352 wrote to memory of 3040 352 Unicorn-47016.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\f4b20a95d644960d62fd60b832d3ce79_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\f4b20a95d644960d62fd60b832d3ce79_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2908 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-41301.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41301.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1624 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-41180.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41180.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2544 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-63496.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63496.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2392 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47016.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47016.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:352 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51311.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51311.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:3040 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-20080.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20080.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-55397.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55397.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2808 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-31343.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31343.exe9⤵PID:1388
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-65214.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65214.exe8⤵PID:1140
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46409.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46409.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1028
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45658.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45658.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1524 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12138.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12138.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6605.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6605.exe8⤵PID:1680
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16122.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16122.exe7⤵PID:2892
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-48467.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48467.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2224 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-53162.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53162.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:292 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-32232.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32232.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2860
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53202.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53202.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2900
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27846.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27846.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2652 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16289.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16289.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50088.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50088.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2456 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16221.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16221.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45394.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45394.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21340.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21340.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1540
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-42672.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42672.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9278.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9278.exe8⤵PID:2192
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12539.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12539.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2540 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44993.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44993.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1248 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-53497.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53497.exe8⤵PID:2108
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33631.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33631.exe7⤵PID:2276
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3860.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3860.exe8⤵PID:3064
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-24777.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24777.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1848 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45394.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45394.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2704 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21776.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21776.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2188
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51002.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51002.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2496 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-2961.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2961.exe7⤵PID:2316
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5116.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5116.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2032 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14684.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14684.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16484.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16484.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1532
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28024.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28024.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1928 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21776.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21776.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1668 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-53258.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53258.exe7⤵PID:1768
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21314.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21314.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-32419.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32419.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37010.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37010.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17058.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17058.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:296 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-25437.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25437.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:2052 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-32545.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32545.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:844 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12138.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12138.exe8⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-19543.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19543.exe9⤵PID:3020
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9149.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9149.exe10⤵PID:2124
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33631.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33631.exe8⤵PID:1008
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31499.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31499.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2424 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-52348.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52348.exe8⤵PID:1508
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3807.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3807.exe9⤵PID:1988
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28164.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28164.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1728 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2716 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2716 -s 2408⤵
- Program crash
PID:1656
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-33631.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33631.exe7⤵PID:1304
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8936.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8936.exe8⤵PID:1636
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49043.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49043.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1820 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-16484.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16484.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:868 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44505.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44505.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-19543.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19543.exe8⤵PID:2580
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50840.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50840.exe9⤵PID:2012
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51701.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51701.exe7⤵PID:3012
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45693.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45693.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2740
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49548.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49548.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1020 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-49775.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49775.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:580 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-31969.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31969.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47056.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47056.exe7⤵PID:1704
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14438.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14438.exe8⤵PID:2032
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3866.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3866.exe9⤵PID:688
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39304.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39304.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2460 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-53497.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53497.exe7⤵PID:1012
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54999.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54999.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1664 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5330.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5330.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2880 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-2961.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2961.exe7⤵PID:2148
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45720.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45720.exe8⤵PID:1352
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8406.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8406.exe6⤵PID:992
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-32568.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32568.exe7⤵PID:1960
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14212.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14212.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:360 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-2340.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2340.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
PID:1636 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-31130.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31130.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2360 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-43422.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43422.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1620 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37837.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37837.exe7⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1004
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-21479.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21479.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1640
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-52939.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52939.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1488 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3794.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3794.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:980 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-53497.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53497.exe7⤵PID:360
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27936.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27936.exe8⤵PID:896
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-54950.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54950.exe6⤵PID:2836
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20078.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20078.exe7⤵PID:2732
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-12479.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12479.exe8⤵PID:2180
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60356.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60356.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:696 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15908.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15908.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2484 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-198.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-198.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1924 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-28272.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28272.exe7⤵PID:976
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49902.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49902.exe5⤵
- Executes dropped EXE
PID:2064
-
-
-
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD5042f951bbae37908a9e2a28c8931f6e2
SHA16dbff12be871824b5f291297b967014da4e7d87a
SHA256175971fc1543eb14d5d7b659daa4918eed3fff6f9002426af0a362b449cfe2b0
SHA51222358180680435cffbfab4dfe2ef656e68aa862a2d7312084618dd8b087a91df53b2adab3606a917f21d4338e2266da5e80b375ce4decdbcfa495c04dcd18625
-
Filesize
184KB
MD537ab993b61a25cf434515e38f1a72c2a
SHA1ad33fbb34fecf58a018d5dd2c93de67b01816eb7
SHA2564742523d896aef257dbe7da9635351b621fa796389f70768efca7190b027b17c
SHA512a4c2f161f286786e43590e248b58bd542d7e79f056958dd0a2ea9787e31b96e6c052244d2f769d013b289df2781e9307898383c8292f99e3a898eb5a3d5d9040
-
Filesize
184KB
MD565f9d468762797366805108de709b9f0
SHA12cad0cff9094e42a9e89bfd171e20aa39a336202
SHA256138ed0511b3e784ccb327c53bbfa567e2eaf729610ae83079058bd5753b48792
SHA51249baa02b5a280ad820ea429dc93da06ce21f898eab914941f85eda5b5bf2ce50d1e0406cf627cbd929e3289f816a6959a2b7c9c8375dd8dc7a3b651d74b6c9e6
-
Filesize
184KB
MD54bc9416f7a4159b6e1fa85fecac5cf26
SHA120d2f12675aa646914d61f7723ebcc7cff8a709e
SHA256214b1a25dbbec1b052cd7c6c2dec3a0e4ff6e444b5c2ca568216b5f0a4a77d1f
SHA51262785ffb8a9abf164df7b9fb721a967096025c8244211f9406b42bf0acb695e418d400cd6823737dfd5bc8c6aa0049313c85f56179998ddbcdd71961e3604424
-
Filesize
184KB
MD53aee0fcc5f3375e11e363b95d51c2610
SHA18ac0c01ef6bf24e8b2589e612343e701a9db2d87
SHA25617625210a35103e21db8043f1fbfba3bfb74ae84ac00f104fce1a96ecc8dadd9
SHA512b11c50212fb0ee3a2ea67cb35a77ab3d38db95e43e25a073dcb09f101fbe14dde56f1ff75c440535a55e6495645f4a365ca71dd408018e892bfffd2cb8210f49
-
Filesize
184KB
MD5f2abf9bc74b952da9b379a7ded3fbb17
SHA155e1a7eb22382191c01874463297350a548c7463
SHA256bd7175ddeeabb363dfdd6fcf9d7135b699900c5e0908acfc87450b8c3f138e32
SHA512f0adc8f5adf2694aa12805e901e56b4d407b4394b37d616cc397182bae573126ff8e2c1058a12fc444179b117828418a92b560d42d7ee0155326568fe76ac33e
-
Filesize
184KB
MD56ff153a03a3e55ecd5000aefc3081c59
SHA1c5d5e4f2cb1626b1f0edf33ff43e9205c503c43f
SHA256ee5ff9591561cf0aa4dcb0ed966e364030af29585d3e5ca4d7fdc3e096f9f6ca
SHA5127d774a3a76e53513f12d9f5706c27836c20d9e31c6ac6b2616835b5bdcf18305b7987b770583c3b76c51c7f6d3bc2dd640e226df9565a6cd117d10e3dd00f78d
-
Filesize
184KB
MD54104e5c1f6daaba8b2231ddaef767028
SHA1006ab76dd9519acfa3da0f88763e8d5a3e30226c
SHA256c5d880ce72c30c38c34152b34b167ab6887d3a5940cdde44d82dfc80b187f7f3
SHA5121fc162e683bf9235a0324db6a71de5694cf9aed0bb0a9d76f6af1a19355307a75bb28d3b0f40cad0cd9cf582f673bfbc04f28f619447545fecd26dbca7a1e063
-
Filesize
184KB
MD56280fa31f688d9bc2d9346cce448c572
SHA17d5a9fe63623bec6a7005e2454b5cdfbfc5c843b
SHA2569e3344ac43e712d2ee6c047104a2b69f6563773591f3fd612b3e49955102c63d
SHA512d94104af532bf8a6a260761b0acb6f5808be8885a49d42f9804927164c71e8dd1d227a9f58bb1d28d1fe539f734433df76ada47766c7011cbbd9866c92a80aff
-
Filesize
184KB
MD568b9f273bb4183ad73bd19107d8a9001
SHA11b3fb82b7ed3ef4acbe14e5b4ee298160f12207b
SHA256d4ad9f153ae2a73f7d26c4a88cd1f7a782dea3bbb3cf2de028a411a9acf22967
SHA51261969ff17735930323a9f0c54d79b95b7df3a735577f3f6ab71d335ec22ac2bd78a3bfc29710b5beb34d9f874af0f8af9dd3fa132c1ff8c2987806e8433f78ca
-
Filesize
184KB
MD53fc7e3aa777687887f8d25b33d6a3100
SHA19b3eeb4026f04b0e7a11bf419a80886b91fbfa31
SHA25649a6e2f764a306b4259685d5f208d24a4dcb4b11595c68d9b903ea070bfd2d05
SHA5122b27643d97ec21597862142ea4c2e3d40d65bcfc5e5ca657878a84a0ebf477dbbe0537e2027f2e33f51963b09874a866c47300678a3c7686ac683c65b69a3558
-
Filesize
184KB
MD514f86f63026437770a3cb4d1e3522b14
SHA19f45485044a5a69e50924c7bea2e6a10376df717
SHA25659900194945d1c3ef2904b096ae7b4dfd5d1a7f79038a5b6e0ebfb2bfb521038
SHA51280fa8b8a2056156470c050012df6445863e2dff737efefa56f5e7abbae7ebd1e8be6b783dc31b85caca19467305019be08f4bce14123c12397fac9cfa4b2fc42
-
Filesize
184KB
MD5960f155f155f7cbffe5ee2be7b498147
SHA103ae3480742316fc907e839a1d274998fb73aeeb
SHA25691f9c8490634a15ee54d2b643ee5286aa961086491b77b1f714e7dabed03fec5
SHA5128080e5b1a48dba02e4f75c85bf46df1f1bfcd8687a00764089515952f01f41c2bd98bbe49dca85d32628e7611bc4c76fc013c7136b5de427a68c9861f007e2c1
-
Filesize
184KB
MD5a2a78893072ef0dab4aca12990137d17
SHA1620f7e3035bdd2280e230bffa80ad93445dc22b0
SHA256adbc7155e743008ae84d8dbc410339f86c28a4e4b7d6540a37f2e67ce98b024f
SHA512d979077c5fa2375018b86fd14c3845281cff20d269bc1690dcc33edeff070e1426171b26b64e54f455c44ecf69f91239dc79ade4aa5e6cf8478d911253ad2387
-
Filesize
184KB
MD5dd6e252e385732c45c8e5fa2010485ae
SHA1f43e749b3b876d93c2c0c86f09f83441042ceab8
SHA2567f3f6e56a0b8d4a041d8df6abef36d9c28ef8757e17ffb69520aafdc00fec5e6
SHA5120b8607a0726bcdd3d5c28953606b51e9abdbcc223d0dd324b962337e70ae393039c24c242fe33d25a632acda58155d8b19a581082f88db949042aba238d5b4b1
-
Filesize
184KB
MD569d1b76de49143d729363d3c07b6c5c1
SHA172186252789017d1665e0da02082d04a3e550e9b
SHA256acb94e078c22b9031e41ee78cff39607c4df5034906ff42d777df76abf04f2d0
SHA5123eeb592ba7e4b0fd6f8def94e8bbc362c35cad582c0c9a573edbcf5e9cf0d1874b131fab63ed569f504fe99797fcfc28f8b0a03f14f5c9d11f76d361cf1b74c6
-
Filesize
184KB
MD51d7133301c9b74e54cb6ef5d5a2ea42c
SHA1a083d6538349ae5d16c129278b2a7a4310ede6b4
SHA2565c792a4044c59540482536558d103e9b1481d9d10277d2c9659d2afdb7b33135
SHA512906ce64a2c90f1ede34879692dadea816fec3d21428d78efe069cb7decd0e5d98d7c2f08fe8f36c5cb73aba7a5519150f5b41c02495bc62685975c4d8a7e1532
-
Filesize
184KB
MD53fcfe989f3d464274fc66a8140c8e750
SHA10a5eaff710fe5b4a156ba7df99e4d51ddf25d3a1
SHA2566f89bed2cf0a576ba832ab08a1f7ffc8a7c2f110499fb4cfc86af45513c4a004
SHA5126a2de1f722672e386c42e89d65734be5c9739e806400eabd98f7272cb71443a7cea495827be719965fa155aa12120172f8a0098d311b99a5ea33035b858f2901
-
Filesize
184KB
MD5d3adfb3c5c4cdfd262955b13f06aecbe
SHA1e8e1dc1fb8e0df887d4bd80337d38b6938b25021
SHA2561aa08f9f234d81e0171a1c2d62d2cc0cade85fda4d3fb09e34ab5dc5268e692b
SHA512f9d61ca4fce3555c1f5b22977b7d1fa758b9e2500c86026024a271d5e4c85cf76186172d95e58f40bcb9674009bceabe025cc118e01724258636ee8db0fd891e
-
Filesize
184KB
MD5f871ca7ad78fcf9cdb4c7f06a006b0ae
SHA1c712055906da17218ea10661691e32cb3da63d4c
SHA256b097921ef2875fbfd29565bcce8996e46ef2d68c48b94ec7a66072c6b2391a1d
SHA512f93ceb7b26359157bc4dd21d62bce0f125e396fba220bf549b93a606d8a57ef397b682b26edada7a104be78829ced4fba2ec8c83a8f43a165401f6dbef6a05e7