Analysis

  • max time kernel
    37s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    19-04-2024 12:29

General

  • Target

    fa4c4ab2f3035ccf872ea58885004bdf_JaffaCakes118.exe

  • Size

    192KB

  • MD5

    fa4c4ab2f3035ccf872ea58885004bdf

  • SHA1

    3e01d597b2698d62e6f3f4f40347de18840d983c

  • SHA256

    2c31e70fc9bf291308e24a18f9d08d5cd56e064cf3ebd7ffde72d12bbf5d05b2

  • SHA512

    e0e230c97101e7d82d945489f53b980799471641815d0b494f990d7a9c0f9b4783565c571121151cc051186904e724bcb640917e417c3ee78da1d2ac499562b9

  • SSDEEP

    3072:Mv/WoPOtA9bMMXji8QzFsJOLaWCeM7ef5ZtxJJERdNlHtpFf:MvOoThMMm8mFsJ3j0p+NlHtpF

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 64 IoCs
  • Loads dropped DLL 64 IoCs
  • Program crash 3 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fa4c4ab2f3035ccf872ea58885004bdf_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fa4c4ab2f3035ccf872ea58885004bdf_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2192
    • C:\Users\Admin\AppData\Local\Temp\Unicorn-47939.exe
      C:\Users\Admin\AppData\Local\Temp\Unicorn-47939.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2972
      • C:\Users\Admin\AppData\Local\Temp\Unicorn-18640.exe
        C:\Users\Admin\AppData\Local\Temp\Unicorn-18640.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2516
        • C:\Users\Admin\AppData\Local\Temp\Unicorn-42397.exe
          C:\Users\Admin\AppData\Local\Temp\Unicorn-42397.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2732
          • C:\Users\Admin\AppData\Local\Temp\Unicorn-37218.exe
            C:\Users\Admin\AppData\Local\Temp\Unicorn-37218.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2772
            • C:\Users\Admin\AppData\Local\Temp\Unicorn-57996.exe
              C:\Users\Admin\AppData\Local\Temp\Unicorn-57996.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:1692
              • C:\Users\Admin\AppData\Local\Temp\Unicorn-40913.exe
                C:\Users\Admin\AppData\Local\Temp\Unicorn-40913.exe
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • Suspicious use of SetWindowsHookEx
                PID:540
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-48178.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-48178.exe
                  8⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:2816
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-32247.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-32247.exe
                    9⤵
                    • Executes dropped EXE
                    • Suspicious use of SetWindowsHookEx
                    PID:2544
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-7524.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-7524.exe
                      10⤵
                      • Executes dropped EXE
                      • Suspicious use of SetWindowsHookEx
                      PID:1040
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-8842.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-8842.exe
                        11⤵
                          PID:1944
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-13289.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-13289.exe
                        10⤵
                          PID:2768
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-11544.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-11544.exe
                            11⤵
                              PID:1696
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-40943.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-40943.exe
                          9⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:712
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-45620.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-45620.exe
                            10⤵
                              PID:2948
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-25510.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-25510.exe
                          8⤵
                          • Executes dropped EXE
                          • Suspicious use of SetWindowsHookEx
                          PID:2620
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-25506.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-25506.exe
                            9⤵
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            PID:1900
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-45620.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-45620.exe
                              10⤵
                                PID:796
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-53333.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-53333.exe
                                  11⤵
                                    PID:3380
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-20144.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-20144.exe
                            7⤵
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            PID:912
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-16980.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-16980.exe
                              8⤵
                              • Executes dropped EXE
                              • Suspicious use of SetWindowsHookEx
                              PID:2552
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-32221.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-32221.exe
                                9⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                PID:2940
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-28879.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-28879.exe
                                  10⤵
                                    PID:2796
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-6237.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-6237.exe
                                  9⤵
                                    PID:1568
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-43319.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-43319.exe
                                      10⤵
                                        PID:2388
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-36655.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-36655.exe
                                          11⤵
                                            PID:3588
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-8079.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-8079.exe
                                      8⤵
                                      • Executes dropped EXE
                                      • Suspicious use of SetWindowsHookEx
                                      PID:300
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-51567.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-51567.exe
                                        9⤵
                                          PID:1160
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-12879.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-12879.exe
                                    6⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • Suspicious use of SetWindowsHookEx
                                    PID:308
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-16658.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-16658.exe
                                      7⤵
                                      • Executes dropped EXE
                                      • Suspicious use of SetWindowsHookEx
                                      PID:1720
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-37016.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-37016.exe
                                        8⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetWindowsHookEx
                                        PID:2996
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-45620.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-45620.exe
                                          9⤵
                                            PID:2272
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-58183.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-58183.exe
                                        7⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetWindowsHookEx
                                        PID:2572
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-49325.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-49325.exe
                                          8⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetWindowsHookEx
                                          PID:1756
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-42247.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-42247.exe
                                            9⤵
                                              PID:2512
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-64123.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-64123.exe
                                                10⤵
                                                  PID:2256
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-31701.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-31701.exe
                                              8⤵
                                                PID:1020
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 1020 -s 244
                                                  9⤵
                                                  • Program crash
                                                  PID:3176
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-58743.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-58743.exe
                                          5⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetWindowsHookEx
                                          PID:2460
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-10129.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-10129.exe
                                            6⤵
                                              PID:2504
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-28516.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-28516.exe
                                                7⤵
                                                  PID:1744
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-8650.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-8650.exe
                                                6⤵
                                                  PID:788
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-5100.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-5100.exe
                                              4⤵
                                              • Executes dropped EXE
                                              • Loads dropped DLL
                                              • Suspicious use of SetWindowsHookEx
                                              • Suspicious use of WriteProcessMemory
                                              PID:2948
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-37576.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-37576.exe
                                                5⤵
                                                • Executes dropped EXE
                                                • Loads dropped DLL
                                                • Suspicious use of SetWindowsHookEx
                                                PID:864
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-58401.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-58401.exe
                                                  6⤵
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:564
                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-49522.exe
                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-49522.exe
                                                    7⤵
                                                    • Executes dropped EXE
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:1052
                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-41292.exe
                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-41292.exe
                                                      8⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:2408
                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-45620.exe
                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-45620.exe
                                                        9⤵
                                                          PID:2772
                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-37954.exe
                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-37954.exe
                                                      7⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:2404
                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-49709.exe
                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-49709.exe
                                                        8⤵
                                                        • Executes dropped EXE
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:2108
                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-34463.exe
                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-34463.exe
                                                          9⤵
                                                            PID:2628
                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-48010.exe
                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-48010.exe
                                                              10⤵
                                                                PID:1276
                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-50970.exe
                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-50970.exe
                                                            8⤵
                                                              PID:1284
                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-33740.exe
                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-33740.exe
                                                          6⤵
                                                          • Executes dropped EXE
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:3068
                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-37016.exe
                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-37016.exe
                                                            7⤵
                                                            • Executes dropped EXE
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:2196
                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-14597.exe
                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-14597.exe
                                                              8⤵
                                                                PID:2592
                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-43740.exe
                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-43740.exe
                                                              7⤵
                                                              • Executes dropped EXE
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:1476
                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-45620.exe
                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-45620.exe
                                                                8⤵
                                                                  PID:656
                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-30367.exe
                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-30367.exe
                                                            5⤵
                                                            • Executes dropped EXE
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:1732
                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-36886.exe
                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-36886.exe
                                                              6⤵
                                                              • Executes dropped EXE
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:1912
                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-17748.exe
                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-17748.exe
                                                                7⤵
                                                                • Executes dropped EXE
                                                                • Suspicious use of SetWindowsHookEx
                                                                PID:1728
                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-26103.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-26103.exe
                                                                  8⤵
                                                                    PID:2588
                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-55251.exe
                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-55251.exe
                                                                6⤵
                                                                • Executes dropped EXE
                                                                • Suspicious use of SetWindowsHookEx
                                                                PID:2384
                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-46118.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-46118.exe
                                                                  7⤵
                                                                  • Executes dropped EXE
                                                                  • Suspicious use of SetWindowsHookEx
                                                                  PID:852
                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-22595.exe
                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-22595.exe
                                                                    8⤵
                                                                      PID:2208
                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-15123.exe
                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-15123.exe
                                                                        9⤵
                                                                          PID:3424
                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-43761.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-43761.exe
                                                                      7⤵
                                                                        PID:2288
                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-18447.exe
                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-18447.exe
                                                                3⤵
                                                                • Executes dropped EXE
                                                                • Loads dropped DLL
                                                                • Suspicious use of SetWindowsHookEx
                                                                • Suspicious use of WriteProcessMemory
                                                                PID:2548
                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-41494.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-41494.exe
                                                                  4⤵
                                                                  • Executes dropped EXE
                                                                  • Loads dropped DLL
                                                                  • Suspicious use of SetWindowsHookEx
                                                                  • Suspicious use of WriteProcessMemory
                                                                  PID:828
                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-53720.exe
                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-53720.exe
                                                                    5⤵
                                                                    • Executes dropped EXE
                                                                    • Loads dropped DLL
                                                                    • Suspicious use of SetWindowsHookEx
                                                                    PID:2508
                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-1032.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-1032.exe
                                                                      6⤵
                                                                      • Executes dropped EXE
                                                                      • Suspicious use of SetWindowsHookEx
                                                                      PID:1600
                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-45931.exe
                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-45931.exe
                                                                        7⤵
                                                                        • Executes dropped EXE
                                                                        • Suspicious use of SetWindowsHookEx
                                                                        PID:1540
                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-37784.exe
                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-37784.exe
                                                                          8⤵
                                                                          • Executes dropped EXE
                                                                          • Suspicious use of SetWindowsHookEx
                                                                          PID:2952
                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-47462.exe
                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-47462.exe
                                                                            9⤵
                                                                            • Executes dropped EXE
                                                                            • Suspicious use of SetWindowsHookEx
                                                                            PID:2496
                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-28516.exe
                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-28516.exe
                                                                              10⤵
                                                                                PID:380
                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-8650.exe
                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-8650.exe
                                                                              9⤵
                                                                                PID:2276
                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-2516.exe
                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-2516.exe
                                                                              8⤵
                                                                                PID:2684
                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-28516.exe
                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-28516.exe
                                                                                  9⤵
                                                                                    PID:2704
                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-30170.exe
                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-30170.exe
                                                                                7⤵
                                                                                • Executes dropped EXE
                                                                                PID:1596
                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-42593.exe
                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-42593.exe
                                                                              6⤵
                                                                              • Executes dropped EXE
                                                                              • Suspicious use of SetWindowsHookEx
                                                                              PID:1676
                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-62672.exe
                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-62672.exe
                                                                                7⤵
                                                                                • Executes dropped EXE
                                                                                • Suspicious use of SetWindowsHookEx
                                                                                PID:1332
                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-39102.exe
                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-39102.exe
                                                                                  8⤵
                                                                                    PID:1548
                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-28516.exe
                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-28516.exe
                                                                                      9⤵
                                                                                        PID:324
                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-8650.exe
                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-8650.exe
                                                                                      8⤵
                                                                                        PID:560
                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-55801.exe
                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-55801.exe
                                                                                      7⤵
                                                                                        PID:1972
                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-45620.exe
                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-45620.exe
                                                                                          8⤵
                                                                                            PID:308
                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-22199.exe
                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-22199.exe
                                                                                      5⤵
                                                                                      • Executes dropped EXE
                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                      PID:2896
                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-36886.exe
                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-36886.exe
                                                                                        6⤵
                                                                                        • Executes dropped EXE
                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                        PID:3024
                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-33892.exe
                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-33892.exe
                                                                                          7⤵
                                                                                          • Executes dropped EXE
                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                          PID:1804
                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-4566.exe
                                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-4566.exe
                                                                                            8⤵
                                                                                              PID:2792
                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-22194.exe
                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-22194.exe
                                                                                          6⤵
                                                                                          • Executes dropped EXE
                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                          PID:2936
                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-28516.exe
                                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-28516.exe
                                                                                            7⤵
                                                                                              PID:976
                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-34522.exe
                                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-34522.exe
                                                                                                8⤵
                                                                                                  PID:3536
                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-29770.exe
                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-29770.exe
                                                                                          4⤵
                                                                                          • Executes dropped EXE
                                                                                          • Loads dropped DLL
                                                                                          • Suspicious use of SetWindowsHookEx
                                                                                          PID:2248
                                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-5116.exe
                                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-5116.exe
                                                                                            5⤵
                                                                                            • Executes dropped EXE
                                                                                            • Loads dropped DLL
                                                                                            • Suspicious use of SetWindowsHookEx
                                                                                            PID:656
                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-129.exe
                                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-129.exe
                                                                                              6⤵
                                                                                              • Executes dropped EXE
                                                                                              • Suspicious use of SetWindowsHookEx
                                                                                              PID:1016
                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-32740.exe
                                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-32740.exe
                                                                                                7⤵
                                                                                                • Executes dropped EXE
                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                PID:2676
                                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-61577.exe
                                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-61577.exe
                                                                                                  8⤵
                                                                                                  • Executes dropped EXE
                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                  PID:1520
                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 1520 -s 188
                                                                                                    9⤵
                                                                                                    • Program crash
                                                                                                    PID:1692
                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-46673.exe
                                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-46673.exe
                                                                                                7⤵
                                                                                                • Executes dropped EXE
                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                PID:2216
                                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-5298.exe
                                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-5298.exe
                                                                                                  8⤵
                                                                                                    PID:1704
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-14784.exe
                                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-14784.exe
                                                                                                      9⤵
                                                                                                        PID:2092
                                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-25126.exe
                                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-25126.exe
                                                                                                  6⤵
                                                                                                  • Executes dropped EXE
                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                  PID:2748
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-508.exe
                                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-508.exe
                                                                                                    7⤵
                                                                                                    • Executes dropped EXE
                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                    PID:3016
                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-57861.exe
                                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-57861.exe
                                                                                                5⤵
                                                                                                • Executes dropped EXE
                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                PID:904
                                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-38168.exe
                                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-38168.exe
                                                                                                  6⤵
                                                                                                  • Executes dropped EXE
                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                  PID:1868
                                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-14597.exe
                                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-14597.exe
                                                                                                    7⤵
                                                                                                    • Executes dropped EXE
                                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                                    PID:1140
                                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-28516.exe
                                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-28516.exe
                                                                                                      8⤵
                                                                                                        PID:2836
                                                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-20549.exe
                                                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-20549.exe
                                                                                                          9⤵
                                                                                                            PID:3280
                                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-25754.exe
                                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-25754.exe
                                                                                                        7⤵
                                                                                                          PID:2160
                                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-60227.exe
                                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-60227.exe
                                                                                                2⤵
                                                                                                • Executes dropped EXE
                                                                                                • Loads dropped DLL
                                                                                                • Suspicious use of SetWindowsHookEx
                                                                                                • Suspicious use of WriteProcessMemory
                                                                                                PID:2836
                                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-62625.exe
                                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-62625.exe
                                                                                                  3⤵
                                                                                                  • Executes dropped EXE
                                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                                  • Suspicious use of WriteProcessMemory
                                                                                                  PID:2440
                                                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 2440 -s 200
                                                                                                    4⤵
                                                                                                    • Loads dropped DLL
                                                                                                    • Program crash
                                                                                                    PID:2584

                                                                                            Network

                                                                                            MITRE ATT&CK Matrix

                                                                                            Replay Monitor

                                                                                            Loading Replay Monitor...

                                                                                            Downloads

                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-40943.exe

                                                                                              Filesize

                                                                                              192KB

                                                                                              MD5

                                                                                              21ca4b756ff3829559fa854d9893c2e1

                                                                                              SHA1

                                                                                              207d653bbbc3dd5de65c717139c983573fff126e

                                                                                              SHA256

                                                                                              25d0209956890f38bf19dc559cfd22cbadeeb4d6175521c9b3bd617f6599383c

                                                                                              SHA512

                                                                                              6ba3a969c4b7e21c347494ce058f6c9ae4ff453851973de43c768b8462612fb7e42a297deb2e82966b46b55e261aa6c75d75e6d7e0dc085b23430609b95d54d3

                                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-5100.exe

                                                                                              Filesize

                                                                                              192KB

                                                                                              MD5

                                                                                              59cdc6c1f5043c1348cf0f6b13d8cc43

                                                                                              SHA1

                                                                                              f261bdf2d1d152ff59f3552be54d57cfec853f26

                                                                                              SHA256

                                                                                              c6b395c10d9199dcba21d52d4abf4105a82af5b36d1abee614e1d5fdd8a96453

                                                                                              SHA512

                                                                                              889182c4751a653806b8536bd16ed4d60624e1078822d44467f5531d22a32b6ba052420d1c1c7d2cb6efb51f33351588166d27f353da95a540eb6e4a3eb5983d

                                                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-12879.exe

                                                                                              Filesize

                                                                                              192KB

                                                                                              MD5

                                                                                              4cf44df196cf1a979d1825afbe9772e6

                                                                                              SHA1

                                                                                              f403c3efc6833865a496c2a21233c50da168e575

                                                                                              SHA256

                                                                                              4b87579c5b590dddb7575b8c87e53bf58415b6fcc7e7aa831634f8f2da1cf2ee

                                                                                              SHA512

                                                                                              1af12f11e5b575471e07fe069d1c3c533bd5cc35ea3ad9bec257a3ecc66cdfb96ca027bce47651266714ebf36f24447cfcdeb7594f9cec9cb645170bd87bcc54

                                                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-18447.exe

                                                                                              Filesize

                                                                                              192KB

                                                                                              MD5

                                                                                              caabcf0753cfb4c376c144573a9658ef

                                                                                              SHA1

                                                                                              6c83c019f9bb558115edfad46668c5c0aa48f015

                                                                                              SHA256

                                                                                              aa5d0a130c228a994469424bbc4112d5ba3d27e32c44f1f764aa000b199a9adf

                                                                                              SHA512

                                                                                              6da780342ddae8138f193948d186b33208f414de239e3a1069a2de246f57fd77ca81725c269064ef938e5520bc6c7ab2294743788c0be64bdffea94ae4391817

                                                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-18640.exe

                                                                                              Filesize

                                                                                              192KB

                                                                                              MD5

                                                                                              733f38bfa4e7ed3b93ca03fe35f7daca

                                                                                              SHA1

                                                                                              7e0dbd64df06c7419b3bc9856c0f39ca1ec9df01

                                                                                              SHA256

                                                                                              18b1b6e37e42f9311d6ad7c038a2001cbd1a4e6558731e8a1d1c46fafea8d7da

                                                                                              SHA512

                                                                                              cf72cf3a11e25ccd2134f8b45a521d8c4f6495469288c86778aacbe111ffa8b646dbbe3eb792a986743c41086d070560c5645168f1d7657f779dc79860b9cc2c

                                                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-29770.exe

                                                                                              Filesize

                                                                                              192KB

                                                                                              MD5

                                                                                              7944b2f7a4d98c14e3893665fd61ca2e

                                                                                              SHA1

                                                                                              169744fde10c3bc1bbf02bfd9d9ca6cefaded8ce

                                                                                              SHA256

                                                                                              3f0325a65ab10c70cd44da350b728f7329d1f653b4acc24d9ec9b9d4209afec0

                                                                                              SHA512

                                                                                              2a99f057512ea1ba69e579ee26c2c9bd273ca7c423b5a9d9f777536196bb594b1b8e168ba58518aad2daa69920c9860d17b536ed724ee3f613f0444df5e3dede

                                                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-37218.exe

                                                                                              Filesize

                                                                                              192KB

                                                                                              MD5

                                                                                              df4aa6911489a6ae666f2a6902439ccd

                                                                                              SHA1

                                                                                              7175ffd5d317abba18e6b9dcd998659af213a49f

                                                                                              SHA256

                                                                                              bb265607505f3bb593c02a52eabc74f6b7ab76c0e46afc9370ad61222cdc40ee

                                                                                              SHA512

                                                                                              635ef90e565f337a5fd975d5da67e1f9a4034b073eb1c7692e8d9d04c9c4cea7e5e64f5dfae9f981e57ce3302dfe496f38f9146deb9f149595a8364dd9938448

                                                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-37576.exe

                                                                                              Filesize

                                                                                              192KB

                                                                                              MD5

                                                                                              b6da1a5651c8227707f3d704d77a28a1

                                                                                              SHA1

                                                                                              f3cb8fad8a932700d45d26dddab6ae62114f2c0e

                                                                                              SHA256

                                                                                              5e4aa619e934a9b2f9e31d97d39653fff5a5369a3a2b58a4f28fc8ad5d04ab96

                                                                                              SHA512

                                                                                              9be92ec1777dbfb508bc2412cd27bc4c30d27afb52f27971c4ffc6453c9cb2d56ddd361b5158d4a2566a4a758f2e800978bb648449f1808ea221548c53c14e5a

                                                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-40913.exe

                                                                                              Filesize

                                                                                              192KB

                                                                                              MD5

                                                                                              6348da55763a42a7dcfe11dcaf733a75

                                                                                              SHA1

                                                                                              be90609c0f848911f5bfafc10ab723e5b0572c9a

                                                                                              SHA256

                                                                                              ce439149a6fa0b774fc83ae85efc85142399b0224441cbade6f1f7fc38be9d3b

                                                                                              SHA512

                                                                                              cfcba76e3c851a9f517a49912a5965258b71efecd7fd1ee73e83cade2bc5fdabd9c73c574a7f1a03fffda1d58fac2ea69f3ee63c8f3241e068f6bc4d918cf42a

                                                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-41494.exe

                                                                                              Filesize

                                                                                              192KB

                                                                                              MD5

                                                                                              2b8da637a2d8a5cee61df2d43f5adf31

                                                                                              SHA1

                                                                                              2eaf764cf8a50fdb274ac4f9e150e5c9eb2a7abe

                                                                                              SHA256

                                                                                              d6af7b8750c57e83ac8c3fb1be37f95815276804fd5127686e05d151dd7eb754

                                                                                              SHA512

                                                                                              0208fe4d146435059b4b00f855a83900369015f3deeae247ede6e281c90c70e8f32d8e697d0f575ac69e2255ee6bfac97532e56b8d53bdefdfd449c8c49da79e

                                                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-42397.exe

                                                                                              Filesize

                                                                                              192KB

                                                                                              MD5

                                                                                              646bfe07dd51226985325dd393a83a9c

                                                                                              SHA1

                                                                                              c51c8279158843a3064875b04d38ef569767e3a0

                                                                                              SHA256

                                                                                              385f090c5f4c9660ab01dbf5b8803ed4e13d982cfd3d8678f0e29a8a66476aa1

                                                                                              SHA512

                                                                                              10f27ab5dcf97455b1daf98e053c520f0b3d43aebce31168eda613e175b93d3863fe4837e00b3769f6a9deaa517a1ea4b74caf43f8989af1b911fdebc7dc816e

                                                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-47939.exe

                                                                                              Filesize

                                                                                              192KB

                                                                                              MD5

                                                                                              632f86c9e7abe3a98e3da0947fc109f5

                                                                                              SHA1

                                                                                              180391d230061574526dfa04c1dadc37ba76c814

                                                                                              SHA256

                                                                                              9227df1dfc9e84cc17632ee202621032a42f868e843135d77328ec6cb5247b6b

                                                                                              SHA512

                                                                                              af68ed35067a5f6b2e977fd826686c823f0bcfe70ba5bf833ffb2c93e08ce268c211cecfdbb74eebbfcad388af8fe4755da2af9c0df57ee5b3b4e5322d821c70

                                                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-53720.exe

                                                                                              Filesize

                                                                                              192KB

                                                                                              MD5

                                                                                              27051f7573f24f9f754fc0e262ebec82

                                                                                              SHA1

                                                                                              15ab9b4eff1befc11242253955bd764cd7116e4f

                                                                                              SHA256

                                                                                              4a7f71410a19ce21c39ba23dd9255157f43ef8e914f7d3346fcaf09f4afe8d0d

                                                                                              SHA512

                                                                                              1033aa8a140a79c0a6ee8e68994235da55c8ee85882655497c2c70b0b002b7a870c0b44783c257cf5e5fd34be48eccfc8b38fd5546f2d0a7d412906f9c6bfdcb

                                                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-57996.exe

                                                                                              Filesize

                                                                                              192KB

                                                                                              MD5

                                                                                              db5be7e31e7698c99a25c9d4477ab2e2

                                                                                              SHA1

                                                                                              244c85000a75932311196ee6e47de336b811a1ba

                                                                                              SHA256

                                                                                              581ba8d87934180445e1ec19a3e4c299461e6716508602ff068a7c8098ef3fa1

                                                                                              SHA512

                                                                                              ae66ebc33276323f67c1bdaec7eeca10fa848aac65a181fad74e5466da0a96167293400c9f305ecc5de31488dc196863835d865873f173ff0dbb998adf49a467

                                                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-58743.exe

                                                                                              Filesize

                                                                                              192KB

                                                                                              MD5

                                                                                              e6a2c61813f561250135df7988eee94a

                                                                                              SHA1

                                                                                              8dfc883f582d4929b346ed1a93d79532f02aa9be

                                                                                              SHA256

                                                                                              8a1f10bef0695a294dfb445a644317b40d9f580be31293532c400696e828d84e

                                                                                              SHA512

                                                                                              ba85c0a976c1312c9be0b99d7b8cd401a52d8b04c9bba8bc96fec3ea2995c9883e8fd3754fab46c54f0e8fba9e923e6e236965e7bd11fa9a18ee1984ee67adbf

                                                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-60227.exe

                                                                                              Filesize

                                                                                              192KB

                                                                                              MD5

                                                                                              4b1b45585d3f7d17fddde5721bf159e5

                                                                                              SHA1

                                                                                              b8ad681398fda575c967cbe657e89611451d4cce

                                                                                              SHA256

                                                                                              dd285264efd7a8bc5a708dfbbae2fb51305bcf310af1fab43efb68c7286c4fac

                                                                                              SHA512

                                                                                              ff308a242db052ad2b09395115e804f905a6805cf6de19ccd461c575e781627c9427121c1581e28e529a1c5ee14161fb2032f07df98205653c99fdca00ba8b32

                                                                                            • \Users\Admin\AppData\Local\Temp\Unicorn-62625.exe

                                                                                              Filesize

                                                                                              192KB

                                                                                              MD5

                                                                                              1b835b5e3e901596ef95215b28c4efb4

                                                                                              SHA1

                                                                                              1c2a0f49696ad518abe93df57f65d0bdaefd6fd5

                                                                                              SHA256

                                                                                              45222bf50afbddf9af32bb2e0415b43610d7079e212e0fdf0179fa06976129dc

                                                                                              SHA512

                                                                                              b813f39cd085c40a15926daf95dc56c0385cf8ea837e6da1852066f6ff58c98886b3426165edc4e92a2fb5cb8735d4cc9d74a6e10bfbd82155c2599816383ef7