Analysis
-
max time kernel
146s -
max time network
127s -
platform
windows7_x64 -
resource
win7-20240221-en -
resource tags
arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system -
submitted
19-04-2024 18:41
Static task
static1
Behavioral task
behavioral1
Sample
0f5428a3da9012298293f53e62671f561cd96dc775826a4896320776b74e2dc2.exe
Resource
win7-20240221-en
Behavioral task
behavioral2
Sample
0f5428a3da9012298293f53e62671f561cd96dc775826a4896320776b74e2dc2.exe
Resource
win10v2004-20240412-en
General
-
Target
0f5428a3da9012298293f53e62671f561cd96dc775826a4896320776b74e2dc2.exe
-
Size
184KB
-
MD5
8974b95a436f8f6a41fdf85808b3331c
-
SHA1
7b8061653d16ce26a9ce99ebcaa315c30afd0c0a
-
SHA256
0f5428a3da9012298293f53e62671f561cd96dc775826a4896320776b74e2dc2
-
SHA512
13d040029ca07e0fa86fc8bf2e1bf4c9943ceba91cdb9114fe5e197558f68d5c2e2905ffa6c07676b134129d4765d90e22da777e28d9aba5e148284fbe91419c
-
SSDEEP
3072:Ey976QAoYbAusdZ3tMjl8p77IlvxqsviuN:Ey9aosYZ388Z7IlJqsviu
Malware Config
Signatures
-
Executes dropped EXE 13 IoCs
pid Process 2036 Unicorn-10334.exe 3032 Unicorn-62633.exe 2576 Unicorn-46852.exe 2800 Unicorn-44818.exe 1604 Unicorn-38688.exe 2388 Unicorn-20169.exe 2396 Unicorn-303.exe 2972 Unicorn-37081.exe 2732 Unicorn-2005.exe 2888 Unicorn-12659.exe 2936 Unicorn-64361.exe 1908 Unicorn-41632.exe 764 Unicorn-8859.exe -
Loads dropped DLL 26 IoCs
pid Process 2012 0f5428a3da9012298293f53e62671f561cd96dc775826a4896320776b74e2dc2.exe 2012 0f5428a3da9012298293f53e62671f561cd96dc775826a4896320776b74e2dc2.exe 2036 Unicorn-10334.exe 2036 Unicorn-10334.exe 2012 0f5428a3da9012298293f53e62671f561cd96dc775826a4896320776b74e2dc2.exe 2012 0f5428a3da9012298293f53e62671f561cd96dc775826a4896320776b74e2dc2.exe 2576 Unicorn-46852.exe 2576 Unicorn-46852.exe 2012 0f5428a3da9012298293f53e62671f561cd96dc775826a4896320776b74e2dc2.exe 2012 0f5428a3da9012298293f53e62671f561cd96dc775826a4896320776b74e2dc2.exe 2800 Unicorn-44818.exe 2576 Unicorn-46852.exe 2576 Unicorn-46852.exe 2800 Unicorn-44818.exe 1604 Unicorn-38688.exe 1604 Unicorn-38688.exe 2012 0f5428a3da9012298293f53e62671f561cd96dc775826a4896320776b74e2dc2.exe 2012 0f5428a3da9012298293f53e62671f561cd96dc775826a4896320776b74e2dc2.exe 2388 Unicorn-20169.exe 2388 Unicorn-20169.exe 2800 Unicorn-44818.exe 2800 Unicorn-44818.exe 2396 Unicorn-303.exe 2396 Unicorn-303.exe 2576 Unicorn-46852.exe 2576 Unicorn-46852.exe -
Suspicious use of SetWindowsHookEx 12 IoCs
pid Process 2012 0f5428a3da9012298293f53e62671f561cd96dc775826a4896320776b74e2dc2.exe 2036 Unicorn-10334.exe 3032 Unicorn-62633.exe 2576 Unicorn-46852.exe 2800 Unicorn-44818.exe 1604 Unicorn-38688.exe 2388 Unicorn-20169.exe 2396 Unicorn-303.exe 2972 Unicorn-37081.exe 2732 Unicorn-2005.exe 2888 Unicorn-12659.exe 2936 Unicorn-64361.exe -
Suspicious use of WriteProcessMemory 52 IoCs
description pid Process procid_target PID 2012 wrote to memory of 2036 2012 0f5428a3da9012298293f53e62671f561cd96dc775826a4896320776b74e2dc2.exe 28 PID 2012 wrote to memory of 2036 2012 0f5428a3da9012298293f53e62671f561cd96dc775826a4896320776b74e2dc2.exe 28 PID 2012 wrote to memory of 2036 2012 0f5428a3da9012298293f53e62671f561cd96dc775826a4896320776b74e2dc2.exe 28 PID 2012 wrote to memory of 2036 2012 0f5428a3da9012298293f53e62671f561cd96dc775826a4896320776b74e2dc2.exe 28 PID 2036 wrote to memory of 3032 2036 Unicorn-10334.exe 29 PID 2036 wrote to memory of 3032 2036 Unicorn-10334.exe 29 PID 2036 wrote to memory of 3032 2036 Unicorn-10334.exe 29 PID 2036 wrote to memory of 3032 2036 Unicorn-10334.exe 29 PID 2012 wrote to memory of 2576 2012 0f5428a3da9012298293f53e62671f561cd96dc775826a4896320776b74e2dc2.exe 30 PID 2012 wrote to memory of 2576 2012 0f5428a3da9012298293f53e62671f561cd96dc775826a4896320776b74e2dc2.exe 30 PID 2012 wrote to memory of 2576 2012 0f5428a3da9012298293f53e62671f561cd96dc775826a4896320776b74e2dc2.exe 30 PID 2012 wrote to memory of 2576 2012 0f5428a3da9012298293f53e62671f561cd96dc775826a4896320776b74e2dc2.exe 30 PID 2576 wrote to memory of 2800 2576 Unicorn-46852.exe 31 PID 2576 wrote to memory of 2800 2576 Unicorn-46852.exe 31 PID 2576 wrote to memory of 2800 2576 Unicorn-46852.exe 31 PID 2576 wrote to memory of 2800 2576 Unicorn-46852.exe 31 PID 2012 wrote to memory of 1604 2012 0f5428a3da9012298293f53e62671f561cd96dc775826a4896320776b74e2dc2.exe 32 PID 2012 wrote to memory of 1604 2012 0f5428a3da9012298293f53e62671f561cd96dc775826a4896320776b74e2dc2.exe 32 PID 2012 wrote to memory of 1604 2012 0f5428a3da9012298293f53e62671f561cd96dc775826a4896320776b74e2dc2.exe 32 PID 2012 wrote to memory of 1604 2012 0f5428a3da9012298293f53e62671f561cd96dc775826a4896320776b74e2dc2.exe 32 PID 2576 wrote to memory of 2396 2576 Unicorn-46852.exe 34 PID 2576 wrote to memory of 2396 2576 Unicorn-46852.exe 34 PID 2576 wrote to memory of 2396 2576 Unicorn-46852.exe 34 PID 2576 wrote to memory of 2396 2576 Unicorn-46852.exe 34 PID 2800 wrote to memory of 2388 2800 Unicorn-44818.exe 33 PID 2800 wrote to memory of 2388 2800 Unicorn-44818.exe 33 PID 2800 wrote to memory of 2388 2800 Unicorn-44818.exe 33 PID 2800 wrote to memory of 2388 2800 Unicorn-44818.exe 33 PID 1604 wrote to memory of 2972 1604 Unicorn-38688.exe 35 PID 1604 wrote to memory of 2972 1604 Unicorn-38688.exe 35 PID 1604 wrote to memory of 2972 1604 Unicorn-38688.exe 35 PID 1604 wrote to memory of 2972 1604 Unicorn-38688.exe 35 PID 2012 wrote to memory of 2732 2012 0f5428a3da9012298293f53e62671f561cd96dc775826a4896320776b74e2dc2.exe 36 PID 2012 wrote to memory of 2732 2012 0f5428a3da9012298293f53e62671f561cd96dc775826a4896320776b74e2dc2.exe 36 PID 2012 wrote to memory of 2732 2012 0f5428a3da9012298293f53e62671f561cd96dc775826a4896320776b74e2dc2.exe 36 PID 2012 wrote to memory of 2732 2012 0f5428a3da9012298293f53e62671f561cd96dc775826a4896320776b74e2dc2.exe 36 PID 2388 wrote to memory of 2888 2388 Unicorn-20169.exe 37 PID 2388 wrote to memory of 2888 2388 Unicorn-20169.exe 37 PID 2388 wrote to memory of 2888 2388 Unicorn-20169.exe 37 PID 2388 wrote to memory of 2888 2388 Unicorn-20169.exe 37 PID 2800 wrote to memory of 2936 2800 Unicorn-44818.exe 38 PID 2800 wrote to memory of 2936 2800 Unicorn-44818.exe 38 PID 2800 wrote to memory of 2936 2800 Unicorn-44818.exe 38 PID 2800 wrote to memory of 2936 2800 Unicorn-44818.exe 38 PID 2396 wrote to memory of 1908 2396 Unicorn-303.exe 39 PID 2396 wrote to memory of 1908 2396 Unicorn-303.exe 39 PID 2396 wrote to memory of 1908 2396 Unicorn-303.exe 39 PID 2396 wrote to memory of 1908 2396 Unicorn-303.exe 39 PID 2576 wrote to memory of 764 2576 Unicorn-46852.exe 40 PID 2576 wrote to memory of 764 2576 Unicorn-46852.exe 40 PID 2576 wrote to memory of 764 2576 Unicorn-46852.exe 40 PID 2576 wrote to memory of 764 2576 Unicorn-46852.exe 40
Processes
-
C:\Users\Admin\AppData\Local\Temp\0f5428a3da9012298293f53e62671f561cd96dc775826a4896320776b74e2dc2.exe"C:\Users\Admin\AppData\Local\Temp\0f5428a3da9012298293f53e62671f561cd96dc775826a4896320776b74e2dc2.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2012 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10334.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10334.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2036 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62633.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62633.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:3032
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22726.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22726.exe3⤵PID:2144
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7964.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7964.exe3⤵PID:1436
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28599.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28599.exe3⤵PID:2120
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9020.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9020.exe3⤵PID:1472
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16875.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16875.exe3⤵PID:2720
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11569.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11569.exe3⤵PID:3044
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10236.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10236.exe3⤵PID:320
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3225.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3225.exe3⤵PID:2536
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46852.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46852.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44818.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44818.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2800 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-20169.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20169.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2388 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12659.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12659.exe5⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-42976.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42976.exe6⤵PID:1416
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51277.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51277.exe7⤵PID:2596
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28365.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28365.exe7⤵PID:1852
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30310.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30310.exe7⤵PID:960
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62450.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62450.exe7⤵PID:1836
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31561.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31561.exe6⤵PID:1536
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62204.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62204.exe6⤵PID:2760
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-28677.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28677.exe6⤵PID:1980
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-23110.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23110.exe5⤵PID:336
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50960.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50960.exe6⤵PID:1664
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29034.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29034.exe6⤵PID:2712
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-14752.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14752.exe6⤵PID:1960
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26249.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26249.exe7⤵PID:1244
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41463.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41463.exe7⤵PID:2216
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1226.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1226.exe6⤵PID:1180
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-63326.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63326.exe6⤵PID:2440
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44830.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44830.exe5⤵PID:2112
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-26762.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26762.exe5⤵PID:2900
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55917.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55917.exe5⤵PID:2364
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-44996.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44996.exe5⤵PID:1996
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46489.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46489.exe5⤵PID:1004
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64616.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64616.exe5⤵PID:2588
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58180.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58180.exe5⤵PID:2176
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3061.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3061.exe5⤵PID:932
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64361.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64361.exe4⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2936 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-32478.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32478.exe5⤵PID:2676
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55381.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55381.exe5⤵PID:2360
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-53927.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53927.exe5⤵PID:2276
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64063.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64063.exe5⤵PID:1040
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-61198.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61198.exe5⤵PID:332
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13012.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13012.exe5⤵PID:1684
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43753.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43753.exe4⤵PID:2876
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9444.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9444.exe4⤵PID:1544
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51127.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51127.exe4⤵PID:1576
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38862.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38862.exe4⤵PID:1884
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-303.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-303.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2396 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-41632.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41632.exe4⤵
- Executes dropped EXE
PID:1908 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9426.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9426.exe5⤵PID:2344
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39433.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39433.exe5⤵PID:2660
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45368.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45368.exe4⤵PID:1888
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57632.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57632.exe4⤵PID:2540
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-51816.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51816.exe4⤵PID:2088
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38206.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38206.exe4⤵PID:2744
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-60041.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60041.exe4⤵PID:1872
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-31767.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31767.exe4⤵PID:760
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-8859.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8859.exe3⤵
- Executes dropped EXE
PID:764 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50267.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50267.exe4⤵PID:3064
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39433.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39433.exe4⤵PID:2420
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64836.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64836.exe4⤵PID:1516
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-29907.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29907.exe4⤵PID:2000
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50975.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50975.exe4⤵PID:2892
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-4034.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4034.exe4⤵PID:2320
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-9608.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9608.exe4⤵PID:2028
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50002.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50002.exe3⤵PID:304
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-13415.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13415.exe3⤵PID:1592
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-34591.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34591.exe3⤵PID:2880
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-55928.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55928.exe3⤵PID:1232
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-49611.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-49611.exe3⤵PID:1208
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38688.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38688.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1604 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37081.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37081.exe3⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2972 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21788.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21788.exe4⤵PID:2632
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22255.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22255.exe5⤵PID:2592
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2480.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2480.exe5⤵PID:1912
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43896.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43896.exe5⤵PID:2996
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-41283.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41283.exe4⤵PID:2224
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-16215.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-16215.exe4⤵PID:2524
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10975.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10975.exe4⤵PID:2452
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-1921.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1921.exe4⤵PID:2992
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18437.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18437.exe4⤵PID:2688
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3401.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3401.exe4⤵PID:1452
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-7952.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7952.exe3⤵PID:1008
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45148.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45148.exe4⤵PID:1492
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18406.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18406.exe4⤵PID:2156
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58971.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58971.exe4⤵PID:1688
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-38573.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38573.exe4⤵PID:1952
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-62466.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62466.exe4⤵PID:2128
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22765.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22765.exe4⤵PID:2304
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-36510.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36510.exe4⤵PID:1796
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39018.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39018.exe3⤵PID:2292
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43352.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43352.exe3⤵PID:2716
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35065.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35065.exe3⤵PID:2256
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-64903.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64903.exe3⤵PID:2192
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-58118.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58118.exe3⤵PID:2628
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-18959.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18959.exe3⤵PID:2528
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-43709.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43709.exe3⤵PID:848
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-2005.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2005.exe2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62628.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62628.exe3⤵PID:1520
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-59766.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59766.exe3⤵PID:892
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-22733.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22733.exe3⤵PID:2752
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-17685.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17685.exe3⤵PID:452
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-50228.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50228.exe3⤵PID:324
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-19924.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19924.exe3⤵PID:2684
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-27055.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27055.exe2⤵PID:1048
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-57641.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57641.exe3⤵PID:1876
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-5770.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5770.exe3⤵PID:2392
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-20268.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20268.exe3⤵PID:944
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-46871.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46871.exe3⤵PID:2736
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-11039.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11039.exe3⤵PID:1624
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30091.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30091.exe3⤵PID:352
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-40919.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40919.exe2⤵PID:2104
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-39109.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39109.exe2⤵PID:2520
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-35170.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35170.exe2⤵PID:2424
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-3572.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3572.exe2⤵PID:2288
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-45374.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45374.exe2⤵PID:2372
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-30737.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30737.exe2⤵PID:2564
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD5e20a8bf86fe20432ffd743270197c94d
SHA1d434f0fb3917a60feaf01f262d3d167d698f92ec
SHA256874420c23a60334af37ec9ca2fcb326acbc136102f0f14e6ff7f61597f32c910
SHA512abc9e5397cbc5505a897fa765050ec1006f47ef66af2a7a698371693d96adbd2efcf7e3db691af2657b8a4f8fbef0f84fd8ba06bcadc96e855bd096b4fcea15f
-
Filesize
184KB
MD5525f14d3646f5293a6519839ba77bac1
SHA1c7e9acea78f58c5ca6d4be17a855755c364110fc
SHA2560ab3d8df145adb75a2d347ec61009a0abcac90f13f19c92d8f7277a12a455de3
SHA512a88fe6e19d101ef15f8641049a0f4701a8143702f2bf8f28b4948bdce96b96a0c98178582deffeeab9ebfa2dcdb3e380394279448b271dec9f59c247e6ae197f
-
Filesize
184KB
MD5efa5965d138b23e595c8ef1e52fcc8fe
SHA142b7e7753d05f1d1c4adf4e59b749fa11d70b166
SHA25668ce06e090667002b9f8baa2726d7e31a46b5b8298dbd94badbdb4e3e2ad76ba
SHA5126d4785f8933a8dfcaed6d5edb198e3ed44bba0da09b32df48ad58fa785fce5a019f7d96d8faab90dca96676d3f1943dd62f995859433aad7cd127a0474b5e375
-
Filesize
184KB
MD597e785ae1352b835d260c9218fe32d7a
SHA1f65208cc1543465e6dc5d9266d271880d48b7ee2
SHA25680f0ed0a96aa1ec5210524cd277fa2916cc0e9691e2cb78b190979e0d91f671b
SHA51260e013f68a75387204a91adc7c899cddd95813e16b38344e938f38dc201af1e19dd675ecd58af46e5a70a3d37f663690df0a9423298a939bbede620009298e03
-
Filesize
184KB
MD5f4a742a954716dc345c5295f79cb43fb
SHA1aa6fc39cbb79231b0842c15f086d7172a01217a2
SHA256682779095037fe5e99535657dbcfdf2e9550df517e67466224e70d70fb0378ac
SHA51212d4b038785b47e4019ff9493553cf8eddbf604e668c86c8c4498759a5f47d641d7e7255fdae8f28539484eb957ab32ef4a890c3bb3921e0a4f63f77c7ac3f35
-
Filesize
184KB
MD569ca305398b4e0981a3aab3eb7c80867
SHA1d98af7ea5c67b573503b8a13346250d4fd98ee4f
SHA256910dbb31e4c8c68d921be00cb4011e8745395cf617c548e1a17c2de9a6203fd1
SHA51200272906c827a562d3435524f713ccbecb389e85d67e975d1e4173c39c1806a508469506c3b7f7d460ecb66c82e6e52bcb02cf6bc66049932600ff4567dd0b71
-
Filesize
184KB
MD570e7bb8f148f6a4e56d49d44654a2cc5
SHA198ee2b5b23fada9be3a6180c24137bd32bf5b7d2
SHA256074e5ba1eee1df0a4ff61d61fe884a9d0d81598536031a0e11985c71c27a7568
SHA5126dc552b843e50361c70c86e582a20799bf27ea540146864962d51eac9ae66cb770e8bfd51d30fdf73c50a48881a88114ec931c3f51db4b7fad6cc89260a9f7e3
-
Filesize
184KB
MD5e196b2749b4b5d6a07019ba850ae942f
SHA1a0769116de3b735b163d7729e55616d5612e7b93
SHA256b6f539d7a0151068cb4624b3eca2ace820467758ff07b3d78c760f277fa63c6e
SHA512a11c6c48dd890b4162331daa32c2efdeed4e7ed62cf9d1689ad2ce05d648f8d83e5572b21985927cab39c6c67b38332e3423cb6b995bb99a0bb06197e46d149c
-
Filesize
184KB
MD5a045accf7653365ee21250362a71f8a8
SHA11dbeb23866a6cc1f6b9aff8a6a155fefdf1baf3b
SHA256667e21d459ffcc0278e752f41297786dc14f1404dae8b1a6adec38e90ebc68fa
SHA512264bf57ac7a275f9d5a2276a605e7bc6b737e46e8be45319c6b1b47a9784b9c4c51740ba92325a898e4992c24656511a8d8d998aec1935e9aea8945a3bd9a907
-
Filesize
184KB
MD5d071e45efcd5f75a53ed12dfc31057ba
SHA14e1956e605f92646d709ac2bafa90c8bfd03e8dd
SHA256bd190e3c6970ed2b1624e12af8a672da3a7e484ec7d2f6f20c623c39323cc491
SHA51246124bff8d4fc15e1315990905f9fd79b88dae9c4271026e4c710d930e32c73ec30ac0a6153fa3ee6396acd7138cf32415f7eda5c3289c57c3914b21b0d73b16
-
Filesize
184KB
MD53e54de902fa3dec62ab53c2481332229
SHA1560980b63f614f170eafc206ee01b68e3e7113a8
SHA256a49cffaad7bba25b6d7560e11f000128dd4857642da99c357cf80776cbf04080
SHA5120f9b4197ade23027bd9031ed8602a878c7f76852104bb3379f5d46c2b905438653598fb316adbd6aec21d990de17e1d789313dff594199d70314b17ccb9aa1b0
-
Filesize
184KB
MD5131a3b9345c35d046ca3e34778a3242c
SHA1a425d9df579d81ed5ccfa9ef5ef0c5eee0cbe790
SHA256ed488454ea3bbc10f188835aa0b19d0c42040f8990b43b30439c12b02cbdc4b7
SHA5120776e1e44b1536c93803c230342471c2138b1212c1c9b17b2643cbfbac550a183ad7771093eb1cd35645bf46d0f45d09629fa968024a2272c0bf5821423d904a
-
Filesize
184KB
MD58a59015b51181e8d488a717be56f717f
SHA1f24d01d0dd7158a3320d26ca82613ba32eeec984
SHA25651dba3225b811377034a7c7e3a5e4d47b08860ba4763075bd49bae35ec2cb59f
SHA5121d6b5c86e4f5b0da913c941cdc9c4b9097aba175404790c9003958b3be62c6d94624c233f49eacf23cef185f7da5e703856ad3f5011277210f8525435b354c1c
-
Filesize
184KB
MD56745c48d04161217fe150b6699296688
SHA1264f34dff6cfc8c9d2c0b7e3997e3b9bfbbe3c60
SHA256f9fcb4a369cce21bea24d62bea13ac43167bbcfd54ce30ef5d62a6a9e3f19444
SHA512e0b4d5f333398807d2085ce8804f313ca117ff085704fc7e014718d94e76fa98f8c952fa4e619a2e2738ed63272f14aad1f5a4968c2ec0400e383c24fb1287fe
-
Filesize
184KB
MD53b75545da2cf8cecde99288fc5bb8161
SHA118335b4d2996943e26bc6e3662490c5116677f06
SHA2564cfeafd40bc8fda4880b50d6c41cb87cb770ad6dac6780c99bb11c896c33a3e0
SHA5121973142520d494b29287f9c0de98559f4ce1ff6453f66d4251558e056ca17e19711c796e1300f1049a8ea5a0a62766a2150c8c98cad4a2abb1e086771717a9a7
-
Filesize
184KB
MD5ea1af4c820dfb34594fd80d3d657457e
SHA141ea2ec6942be6c22b111d0e0bcaacfdc70163e3
SHA256db5ce384b8c2585d62f761052ad8dde34fc371b2716626308b91248a34d5edc7
SHA5127b91566368464b9ce5feda3df4cec9dc7a8d63d5c9eb1facedd89f51081933338518299eb3bd0db725f371fdd3707eaad935b185af8bd2384f70f0dfc8281277
-
Filesize
184KB
MD5723733dedbded1918324e6372c2e5c2d
SHA1137f14fc50fe07903843b1542546ae259da5110c
SHA256ec0f7038e168b8ba600b1d77541d874bb4c782e616567adc928d2da479ba8740
SHA51273345e2e960a2f38a6b3d7d6fcba01b1f88adcfc5bf0cff6320ac53f1b0acf435291c96200541db8392bf6057013afe2b14b86670a4c5356497bef9dc0c9b1b4
-
Filesize
184KB
MD5cd188d9d075a382b3b080b0b21b4af55
SHA132c198303ff589bc3c042bf4ce60a6a9681f0344
SHA25678e212610672eacffc85e553cac45acf0817abcd806f1eef9a467407f8c263a4
SHA512482dbaa2a26c5748fbc255fd2fdac4afdf8a9624de20af8003c34d4e16e417ab2880fd891cb40ed60ca523e7a20fab88d80e35ee0fd3838949848d1c05dee55f
-
Filesize
184KB
MD542785c0d56962b0bab92c384ff77bef5
SHA1f02998cea2df38eed62ceffbf9dbe15a2cc0bdd2
SHA256b54ecff53ee24646ef51e90fc7d2e9365716ee3f8c7d222e876c295fca37ff85
SHA5124a7ddceb9176233b38f02f23f81e9be7b95fbd6d1d6f91b462578b7a2d2689be1add25cf39319de25f0e434a8f7a4e21dd45531c8d56e0ffddf2f9f1e81affe3