Windows 7 deprecation

Windows 7 will be removed from tria.ge on 2025-03-31

Analysis

  • max time kernel
    30s
  • max time network
    120s
  • platform
    windows7_x64
  • resource
    win7-20240221-en
  • resource tags

    arch:x64arch:x86image:win7-20240221-enlocale:en-usos:windows7-x64system
  • submitted
    21/04/2024, 02:15

General

  • Target

    fe3256d09a364c11382f92d5c7d40045_JaffaCakes118.exe

  • Size

    184KB

  • MD5

    fe3256d09a364c11382f92d5c7d40045

  • SHA1

    dbf293e4d6cc5bb5d8464aa97dac5f96b1b1b8f5

  • SHA256

    82c9168153948bf9828b4fe4ebedfb7a8da3dd728392d397ade0e76184a9fb53

  • SHA512

    905e3c23e91d6aba94327eefead3704b487c14f73be46f9d02d52d9b79e646e2291f448f2631cdd4654f400e107e73c3a558ecc8de4f64d410e03ca07ead532c

  • SSDEEP

    3072:M4H9ocKfSA0lEjhdhAWozFbOWo6G/LIQDYxA2Pl+7lPdpFV:M4dov30lUdeWozsk8D7lPdpF

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 64 IoCs
  • Loads dropped DLL 64 IoCs
  • Program crash 1 IoCs
  • Suspicious use of SetWindowsHookEx 64 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\fe3256d09a364c11382f92d5c7d40045_JaffaCakes118.exe
    "C:\Users\Admin\AppData\Local\Temp\fe3256d09a364c11382f92d5c7d40045_JaffaCakes118.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2120
    • C:\Users\Admin\AppData\Local\Temp\Unicorn-27670.exe
      C:\Users\Admin\AppData\Local\Temp\Unicorn-27670.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:904
      • C:\Users\Admin\AppData\Local\Temp\Unicorn-20958.exe
        C:\Users\Admin\AppData\Local\Temp\Unicorn-20958.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2256
        • C:\Users\Admin\AppData\Local\Temp\Unicorn-64061.exe
          C:\Users\Admin\AppData\Local\Temp\Unicorn-64061.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2560
          • C:\Users\Admin\AppData\Local\Temp\Unicorn-36226.exe
            C:\Users\Admin\AppData\Local\Temp\Unicorn-36226.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2768
            • C:\Users\Admin\AppData\Local\Temp\Unicorn-5632.exe
              C:\Users\Admin\AppData\Local\Temp\Unicorn-5632.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • Suspicious use of SetWindowsHookEx
              PID:2788
              • C:\Users\Admin\AppData\Local\Temp\Unicorn-63837.exe
                C:\Users\Admin\AppData\Local\Temp\Unicorn-63837.exe
                7⤵
                • Executes dropped EXE
                • Suspicious use of SetWindowsHookEx
                PID:2200
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-24863.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-24863.exe
                  8⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:2008
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-22918.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-22918.exe
                    9⤵
                      PID:2020
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-40575.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-40575.exe
                  7⤵
                  • Executes dropped EXE
                  • Suspicious use of SetWindowsHookEx
                  PID:904
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-27832.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-27832.exe
                    8⤵
                      PID:2892
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-15796.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-15796.exe
                        9⤵
                          PID:2392
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-51026.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-51026.exe
                        8⤵
                          PID:2140
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-14947.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-14947.exe
                      6⤵
                      • Executes dropped EXE
                      • Suspicious use of SetWindowsHookEx
                      PID:2860
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-51225.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-51225.exe
                        7⤵
                        • Executes dropped EXE
                        • Suspicious use of SetWindowsHookEx
                        PID:1060
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-11324.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-11324.exe
                          8⤵
                            PID:1668
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-53086.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-53086.exe
                          7⤵
                            PID:1988
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-17401.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-17401.exe
                              8⤵
                                PID:3720
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-3556.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-3556.exe
                          5⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • Suspicious use of SetWindowsHookEx
                          PID:3000
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-34813.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-34813.exe
                            6⤵
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            PID:564
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-24001.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-24001.exe
                              7⤵
                              • Executes dropped EXE
                              • Suspicious use of SetWindowsHookEx
                              PID:956
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-32703.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-32703.exe
                            6⤵
                            • Executes dropped EXE
                            • Suspicious use of SetWindowsHookEx
                            PID:308
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-60175.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-60175.exe
                              7⤵
                                PID:2556
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-57107.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-57107.exe
                                  8⤵
                                    PID:3480
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-18690.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-18690.exe
                            4⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • Suspicious use of SetWindowsHookEx
                            • Suspicious use of WriteProcessMemory
                            PID:2884
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-22654.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-22654.exe
                              5⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • Suspicious use of SetWindowsHookEx
                              PID:2084
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-47776.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-47776.exe
                                6⤵
                                • Executes dropped EXE
                                • Suspicious use of SetWindowsHookEx
                                PID:2336
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-39798.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-39798.exe
                                  7⤵
                                  • Executes dropped EXE
                                  • Suspicious use of SetWindowsHookEx
                                  PID:1764
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-57458.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-57458.exe
                                    8⤵
                                      PID:2824
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-2616.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-2616.exe
                                    7⤵
                                      PID:2476
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-20508.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-20508.exe
                                    6⤵
                                    • Executes dropped EXE
                                    • Suspicious use of SetWindowsHookEx
                                    PID:3068
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-22482.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-22482.exe
                                      7⤵
                                        PID:2456
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-10339.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-10339.exe
                                    5⤵
                                    • Executes dropped EXE
                                    • Suspicious use of SetWindowsHookEx
                                    PID:2292
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-26975.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-26975.exe
                                      6⤵
                                      • Executes dropped EXE
                                      • Suspicious use of SetWindowsHookEx
                                      PID:2532
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-26078.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-26078.exe
                                        7⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetWindowsHookEx
                                        PID:1660
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-40420.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-40420.exe
                                      6⤵
                                      • Executes dropped EXE
                                      • Suspicious use of SetWindowsHookEx
                                      PID:2384
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-7414.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-7414.exe
                                        7⤵
                                          PID:2688
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-44388.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-44388.exe
                                  3⤵
                                  • Executes dropped EXE
                                  • Loads dropped DLL
                                  • Suspicious use of SetWindowsHookEx
                                  • Suspicious use of WriteProcessMemory
                                  PID:2516
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-54015.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-54015.exe
                                    4⤵
                                    • Executes dropped EXE
                                    • Loads dropped DLL
                                    • Suspicious use of SetWindowsHookEx
                                    PID:2004
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-7962.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-7962.exe
                                      5⤵
                                      • Executes dropped EXE
                                      • Loads dropped DLL
                                      • Suspicious use of SetWindowsHookEx
                                      PID:2136
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-19930.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-19930.exe
                                        6⤵
                                        • Executes dropped EXE
                                        • Suspicious use of SetWindowsHookEx
                                        PID:1784
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-24915.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-24915.exe
                                          7⤵
                                          • Executes dropped EXE
                                          • Suspicious use of SetWindowsHookEx
                                          PID:3016
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-30328.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-30328.exe
                                            8⤵
                                              PID:2204
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-32590.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-32590.exe
                                                9⤵
                                                  PID:3108
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-61308.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-61308.exe
                                              7⤵
                                                PID:2832
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-53757.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-53757.exe
                                              6⤵
                                              • Executes dropped EXE
                                              • Suspicious use of SetWindowsHookEx
                                              PID:2132
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-41231.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-41231.exe
                                                7⤵
                                                  PID:2680
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-15715.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-15715.exe
                                              5⤵
                                              • Executes dropped EXE
                                              • Suspicious use of SetWindowsHookEx
                                              PID:1352
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-1915.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-1915.exe
                                                6⤵
                                                • Executes dropped EXE
                                                • Suspicious use of SetWindowsHookEx
                                                PID:2792
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-41231.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-41231.exe
                                                  7⤵
                                                    PID:2368
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-3052.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-3052.exe
                                                  6⤵
                                                    PID:2928
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-33540.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-33540.exe
                                                4⤵
                                                • Executes dropped EXE
                                                • Loads dropped DLL
                                                • Suspicious use of SetWindowsHookEx
                                                PID:1076
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-46240.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-46240.exe
                                                  5⤵
                                                  • Executes dropped EXE
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:2868
                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-34998.exe
                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-34998.exe
                                                    6⤵
                                                    • Executes dropped EXE
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:2808
                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-40271.exe
                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-40271.exe
                                                      7⤵
                                                        PID:2604
                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-21365.exe
                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-21365.exe
                                                      6⤵
                                                        PID:2588
                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-31359.exe
                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-31359.exe
                                                      5⤵
                                                      • Executes dropped EXE
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:1064
                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-11324.exe
                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-11324.exe
                                                        6⤵
                                                          PID:2000
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-51362.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-51362.exe
                                                  2⤵
                                                  • Executes dropped EXE
                                                  • Loads dropped DLL
                                                  • Suspicious use of SetWindowsHookEx
                                                  • Suspicious use of WriteProcessMemory
                                                  PID:2688
                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-48602.exe
                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-48602.exe
                                                    3⤵
                                                    • Executes dropped EXE
                                                    • Loads dropped DLL
                                                    • Suspicious use of SetWindowsHookEx
                                                    • Suspicious use of WriteProcessMemory
                                                    PID:2708
                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-53247.exe
                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-53247.exe
                                                      4⤵
                                                      • Executes dropped EXE
                                                      • Loads dropped DLL
                                                      • Suspicious use of SetWindowsHookEx
                                                      • Suspicious use of WriteProcessMemory
                                                      PID:2704
                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-45601.exe
                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-45601.exe
                                                        5⤵
                                                        • Executes dropped EXE
                                                        • Loads dropped DLL
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:1052
                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-5378.exe
                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-5378.exe
                                                          6⤵
                                                          • Executes dropped EXE
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:452
                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-36456.exe
                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-36456.exe
                                                            7⤵
                                                            • Executes dropped EXE
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:2244
                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-46887.exe
                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-46887.exe
                                                              8⤵
                                                              • Executes dropped EXE
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:692
                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-7414.exe
                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-7414.exe
                                                                9⤵
                                                                  PID:2904
                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-7204.exe
                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-7204.exe
                                                                    10⤵
                                                                      PID:3580
                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-53086.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-53086.exe
                                                                  8⤵
                                                                    PID:2044
                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-42698.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-42698.exe
                                                                  7⤵
                                                                  • Executes dropped EXE
                                                                  • Suspicious use of SetWindowsHookEx
                                                                  PID:876
                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-34379.exe
                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-34379.exe
                                                                6⤵
                                                                • Executes dropped EXE
                                                                • Suspicious use of SetWindowsHookEx
                                                                PID:2668
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 2668 -s 240
                                                                  7⤵
                                                                  • Program crash
                                                                  PID:1448
                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-59623.exe
                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-59623.exe
                                                              5⤵
                                                              • Executes dropped EXE
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:2156
                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-19461.exe
                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-19461.exe
                                                                6⤵
                                                                • Executes dropped EXE
                                                                • Suspicious use of SetWindowsHookEx
                                                                PID:2468
                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-33924.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-33924.exe
                                                                  7⤵
                                                                  • Executes dropped EXE
                                                                  • Suspicious use of SetWindowsHookEx
                                                                  PID:1868
                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-45117.exe
                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-45117.exe
                                                                    8⤵
                                                                      PID:3692
                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-49445.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-49445.exe
                                                                  6⤵
                                                                  • Executes dropped EXE
                                                                  • Suspicious use of SetWindowsHookEx
                                                                  PID:1048
                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-7414.exe
                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-7414.exe
                                                                    7⤵
                                                                      PID:1680
                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-54583.exe
                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-54583.exe
                                                                        8⤵
                                                                          PID:3800
                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-43332.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-43332.exe
                                                                  4⤵
                                                                  • Executes dropped EXE
                                                                  • Loads dropped DLL
                                                                  • Suspicious use of SetWindowsHookEx
                                                                  PID:1440
                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-46816.exe
                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-46816.exe
                                                                    5⤵
                                                                    • Executes dropped EXE
                                                                    • Suspicious use of SetWindowsHookEx
                                                                    PID:892
                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-19461.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-19461.exe
                                                                      6⤵
                                                                      • Executes dropped EXE
                                                                      • Suspicious use of SetWindowsHookEx
                                                                      PID:2996
                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-26078.exe
                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-26078.exe
                                                                        7⤵
                                                                        • Executes dropped EXE
                                                                        PID:1856
                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-53086.exe
                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-53086.exe
                                                                        7⤵
                                                                          PID:1828
                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-39486.exe
                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-39486.exe
                                                                        6⤵
                                                                        • Executes dropped EXE
                                                                        • Suspicious use of SetWindowsHookEx
                                                                        PID:1132
                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-42899.exe
                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-42899.exe
                                                                          7⤵
                                                                            PID:2064
                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-26389.exe
                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-26389.exe
                                                                              8⤵
                                                                                PID:3752
                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-35173.exe
                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-35173.exe
                                                                          5⤵
                                                                          • Executes dropped EXE
                                                                          • Suspicious use of SetWindowsHookEx
                                                                          PID:2508
                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-34526.exe
                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-34526.exe
                                                                            6⤵
                                                                            • Executes dropped EXE
                                                                            • Suspicious use of SetWindowsHookEx
                                                                            PID:1340
                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-7414.exe
                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-7414.exe
                                                                              7⤵
                                                                                PID:2256
                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-46118.exe
                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-46118.exe
                                                                                  8⤵
                                                                                    PID:3404
                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-564.exe
                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-564.exe
                                                                                6⤵
                                                                                  PID:1564
                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-50979.exe
                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-50979.exe
                                                                            3⤵
                                                                            • Executes dropped EXE
                                                                            • Loads dropped DLL
                                                                            • Suspicious use of SetWindowsHookEx
                                                                            • Suspicious use of WriteProcessMemory
                                                                            PID:2436
                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-46369.exe
                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-46369.exe
                                                                              4⤵
                                                                              • Executes dropped EXE
                                                                              • Loads dropped DLL
                                                                              • Suspicious use of SetWindowsHookEx
                                                                              PID:1696
                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-62467.exe
                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-62467.exe
                                                                                5⤵
                                                                                • Executes dropped EXE
                                                                                • Suspicious use of SetWindowsHookEx
                                                                                PID:1792
                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-51993.exe
                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-51993.exe
                                                                                  6⤵
                                                                                  • Executes dropped EXE
                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                  PID:2756
                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-64920.exe
                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-64920.exe
                                                                                    7⤵
                                                                                      PID:2320
                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-27483.exe
                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-27483.exe
                                                                                    6⤵
                                                                                      PID:2644
                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-415.exe
                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-415.exe
                                                                                    5⤵
                                                                                    • Executes dropped EXE
                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                    PID:2784
                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-22918.exe
                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-22918.exe
                                                                                      6⤵
                                                                                        PID:2628
                                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-60391.exe
                                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-60391.exe
                                                                                    4⤵
                                                                                    • Executes dropped EXE
                                                                                    • Suspicious use of SetWindowsHookEx
                                                                                    PID:2864
                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-54847.exe
                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-54847.exe
                                                                                      5⤵
                                                                                      • Executes dropped EXE
                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                      PID:2496
                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-3773.exe
                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-3773.exe
                                                                                        6⤵
                                                                                        • Executes dropped EXE
                                                                                        • Suspicious use of SetWindowsHookEx
                                                                                        PID:2516
                                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-14660.exe
                                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-14660.exe
                                                                                      5⤵
                                                                                      • Executes dropped EXE
                                                                                      • Suspicious use of SetWindowsHookEx
                                                                                      PID:1940
                                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-18671.exe
                                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-18671.exe
                                                                                        6⤵
                                                                                          PID:3320

                                                                              Network

                                                                              MITRE ATT&CK Matrix

                                                                              Replay Monitor

                                                                              Loading Replay Monitor...

                                                                              Downloads

                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-40420.exe

                                                                                Filesize

                                                                                184KB

                                                                                MD5

                                                                                5acc73adcda4f0fdc46846f3c89651b7

                                                                                SHA1

                                                                                d7f70796ffc6d2931b6ec85b9b795d18a2411d7f

                                                                                SHA256

                                                                                80cf47a96ef15b76d1226b5e88750bb3e79bedda643d059616b8f7c5a133060b

                                                                                SHA512

                                                                                e7aaeeec53dbc5e6e5534d68556126527dc142385ddfd7c2d91e17d7ef9f1ffb5932267b03b5f782747e5937fef4484a7457c7154484896abc6163d6120fac35

                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-40575.exe

                                                                                Filesize

                                                                                184KB

                                                                                MD5

                                                                                bacfc592a2836cc97de7f4a9fb85106f

                                                                                SHA1

                                                                                8ac766d7b931bd7134928ef8b40d34181d9327a4

                                                                                SHA256

                                                                                28767acaad856c731d6a6d5c080579d4a64071f5d39e6300a0b0f32d2ba79bb5

                                                                                SHA512

                                                                                d91ec44646079eb494886e061cec9545d9d162860024a9ba4378ca8fc5d0f7160aead09a5aa0265749019af30c05aa8c4288ab7cc6ccc18cb4b7231f092f2473

                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-44388.exe

                                                                                Filesize

                                                                                184KB

                                                                                MD5

                                                                                c82fe78c63671d047e77eeaac01f5fc3

                                                                                SHA1

                                                                                d1be216d5e45e63e837b5096bf9c5707ecb2dcb1

                                                                                SHA256

                                                                                c11953cbe97c0d0c13857b43146daa5714b606bf6b660914823b5fc864cfbf93

                                                                                SHA512

                                                                                b08de69e7ab1765b79bc6ef5c41dfc5e04d403527f7549aceff1f1f1d4efe83832608045d9f984d771e1e6a050de3b5ef9cd0fca03e3c9755ab4269b205cf156

                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-54015.exe

                                                                                Filesize

                                                                                184KB

                                                                                MD5

                                                                                4d17a7e5683ce7a8765c02d82e94a5c4

                                                                                SHA1

                                                                                fa0b66ee7b3f1dba666b390961e1a1e9e76faf44

                                                                                SHA256

                                                                                4581a95ba7d607ccb7e81e41ea4865a209013646f31fc6596955054ae3f4d31a

                                                                                SHA512

                                                                                f448d134fed1b6b4c65598e3b5ee6e1ec970c6af05f0dc4e3419136f02649809a3418fa34afbe5fccf48165b2aa132bf55303003d0452191a060933257a1fddd

                                                                              • \Users\Admin\AppData\Local\Temp\Unicorn-18690.exe

                                                                                Filesize

                                                                                184KB

                                                                                MD5

                                                                                a12069eca8b5876d2f69ca31dbded248

                                                                                SHA1

                                                                                be6a06c0181319597a40e04c94c1a7e105809e1f

                                                                                SHA256

                                                                                1987eb6c18ac31ad99f364fa1527a48485b68b57143472e9778fe7f5298155a9

                                                                                SHA512

                                                                                fdb4b51fd24fceeafc003aab2285bebe82e08fa35859ac1809dc5d4e0c6daf161b2f1ccef88886dc21d3adbe994b63744d77abedb468ff51daf66b059f39b976

                                                                              • \Users\Admin\AppData\Local\Temp\Unicorn-20958.exe

                                                                                Filesize

                                                                                184KB

                                                                                MD5

                                                                                0b0201365406aef6a43efde3cc61806c

                                                                                SHA1

                                                                                54cb956a6755a7ce87b2fba6c4b4d3be683228a0

                                                                                SHA256

                                                                                55b28afa6daffd8b3be9603592a8bb5fc3cbd226e3f4a78ef4b529ca40cda877

                                                                                SHA512

                                                                                b1bd315ec09949a97951b36581498ed1c0e013907a50d5abf7c3c49e8ffdbbf6aa12b1d8f62dcf4f5508d1f5a22a0226fbb8c60cda8422dde4aacd6a1df815e4

                                                                              • \Users\Admin\AppData\Local\Temp\Unicorn-22654.exe

                                                                                Filesize

                                                                                184KB

                                                                                MD5

                                                                                9b2b6bebef95b807eef86e19217e9bf5

                                                                                SHA1

                                                                                58d808f4ff3d69bf41fa8dfc88d72419b5951011

                                                                                SHA256

                                                                                f24fe4a65e17a52e1b4e11484fc5539a41eeeb7dc18b3737b05009ae7f5975d1

                                                                                SHA512

                                                                                3e9fc3f9b7992ef7642a14da9f957881ac58f7b4387b8be50a28c748e4e66b2fce9a711945d9ac66e358a6d859bdf155e3d59a4dd1b31a4126752d867faf0b7b

                                                                              • \Users\Admin\AppData\Local\Temp\Unicorn-27670.exe

                                                                                Filesize

                                                                                184KB

                                                                                MD5

                                                                                2e5418692ca92c46bdf672d205a40946

                                                                                SHA1

                                                                                b41bbff2191cea3263d04a0659b42e29e8251342

                                                                                SHA256

                                                                                30738b6b66c7f38be6161d00386b7fe6064e69bc20491a53bfd607821763621d

                                                                                SHA512

                                                                                bb9189ef62fd477fd3ac3084705b98c07658969177949d630bfa0e227da6a9112c8dcb2c7157c42c6efd9bab27c911aa567525e3b4994006dc1058800118d523

                                                                              • \Users\Admin\AppData\Local\Temp\Unicorn-3556.exe

                                                                                Filesize

                                                                                184KB

                                                                                MD5

                                                                                fde9584607df6a0df7e93b51e428dbc8

                                                                                SHA1

                                                                                d64e476b6b4f63ea0759e22d2b436649fd9f41ec

                                                                                SHA256

                                                                                77cd448554ba9fea8f92c58bfffb41370351d3e32a54e87776915051136a3ab0

                                                                                SHA512

                                                                                4205bad6a4f5c2753f9672cc66fe58140c27c4cafb1241e5efdd36c55d147d0d6a8e02615a46bf870ff0944a864a0e654b66c1ec218876a1365bbb7ed0141af4

                                                                              • \Users\Admin\AppData\Local\Temp\Unicorn-36226.exe

                                                                                Filesize

                                                                                184KB

                                                                                MD5

                                                                                1d3ecc7b318bb57eb6288b1474b09ec9

                                                                                SHA1

                                                                                2029e4e4dd04a52abb345b3f053de5cd7c435901

                                                                                SHA256

                                                                                b6b9ca2b57f924985e79e433739487c9ec3b7cf9b7ee0970cd815d79529691c9

                                                                                SHA512

                                                                                00d2b99f49b683e4a5b8fa07ba8c56338b08319172a2eac0ae3b9837455d8ff5cb79076960292be0ab586e4cffdb211149ac6d24a7d6d269d6b72fe04a28fa62

                                                                              • \Users\Admin\AppData\Local\Temp\Unicorn-43332.exe

                                                                                Filesize

                                                                                184KB

                                                                                MD5

                                                                                7de18b2ce01a3f92b6a65a29da595a31

                                                                                SHA1

                                                                                f19d042676373dddf381e84510271785770149ae

                                                                                SHA256

                                                                                e5eb84e0ca6b4f14b109f45e236a15c80bd6f44dd0e0254f897ef545fc9091ab

                                                                                SHA512

                                                                                5d236cc624e337567f87f2eb9609a3f7d296cb9594e6c2c8c90bed24ea04293bccbd751d976c93324ac2045ee93e9b3d37b6fbc7456c1289cc2cba0c41b38846

                                                                              • \Users\Admin\AppData\Local\Temp\Unicorn-45601.exe

                                                                                Filesize

                                                                                184KB

                                                                                MD5

                                                                                a62d53b14bd1f0e8c94f0a40531169e7

                                                                                SHA1

                                                                                d9dd8d27e1026258965e9e555e259254e701c757

                                                                                SHA256

                                                                                32067975f7af3822bcf7c86043db97f1c2a23caf05a3f585124914438d2f02b3

                                                                                SHA512

                                                                                16b6ad68a3733ae7f09563b892c2244b7e88d364f687640374b38e5cc6190da786c6987d2ba9cd991d07e1eaa31f8cab2d2f43e8dda7a624879f53b9af6a9f03

                                                                              • \Users\Admin\AppData\Local\Temp\Unicorn-46369.exe

                                                                                Filesize

                                                                                184KB

                                                                                MD5

                                                                                341e370d8beb576e34f25a78128632b8

                                                                                SHA1

                                                                                92f161ee1dab59ef1c3f837d3c87f0f0a38db1a9

                                                                                SHA256

                                                                                da8ffbd082d8fa060308593458ac0f6e09ff374e8d0a8788c166bfbe4b6f7cb7

                                                                                SHA512

                                                                                6d305a9c813dc4b265b74ea7784146c9cf92155c17af405a51a925814431c462a2c285d6448e038e90519cf23e228fb29f866ad90d105f2ebd94c2155f9a70ca

                                                                              • \Users\Admin\AppData\Local\Temp\Unicorn-48602.exe

                                                                                Filesize

                                                                                184KB

                                                                                MD5

                                                                                379b8d238c0e3eff7d7add0a29993483

                                                                                SHA1

                                                                                75a9d5b28b36232e16b6611b8673c6c393257678

                                                                                SHA256

                                                                                547ace0dd6854d72f947a7e1491cbd324e7e6212d98b56745f56b34872dfc2aa

                                                                                SHA512

                                                                                7bc33a07af3e3b43129384f0f1f3202adb3e8be8407e46ac0f80e8886172547d574ab79f4c38601204b60a1d10f3c7cb6ede265521ee0d13905f5ede04e2707a

                                                                              • \Users\Admin\AppData\Local\Temp\Unicorn-50979.exe

                                                                                Filesize

                                                                                184KB

                                                                                MD5

                                                                                3abb3576ced9924c08f27e7fcdb471f0

                                                                                SHA1

                                                                                a98f04125c85139547824123fda825df479f215a

                                                                                SHA256

                                                                                0488505c6270b2d471d182956f513d6ccde4738d0a4ba2af148e5dd63e3f051e

                                                                                SHA512

                                                                                08a5bb2cf26ed3d3abbb1dd8864102dc5ba27e72652c50b800b855802a86693f94cbe950a6bb76fdfc3c2c471bd327deceff35f4e388c06b5029909080e46595

                                                                              • \Users\Admin\AppData\Local\Temp\Unicorn-51362.exe

                                                                                Filesize

                                                                                184KB

                                                                                MD5

                                                                                be21160e63383b288243942038ea50d4

                                                                                SHA1

                                                                                6aecf304cbfd1b00aa4cf43807594374502df23b

                                                                                SHA256

                                                                                ef227f38ebe202c84dedcea682ce09f7cf3678d0a0e6ccc07fd5052d6c936906

                                                                                SHA512

                                                                                77dda3910c73580597f440ae1b159810584efbd843a51681032d0ff0e8655a576e75edab316ff931dad28e9dfdb537bc5b68c80b8d568ca322fdc1d587c28ffa

                                                                              • \Users\Admin\AppData\Local\Temp\Unicorn-53247.exe

                                                                                Filesize

                                                                                184KB

                                                                                MD5

                                                                                dc0f26892f24798b659b11420e7bb526

                                                                                SHA1

                                                                                05dba28b03433f5a5ed8f7d1fdc7432191b605be

                                                                                SHA256

                                                                                49665ce9e245d4b289accb7ae1a504dace67c05aa1548b6d13e4f4e939dc80b1

                                                                                SHA512

                                                                                10e1998459b7ec56dae51973b5b6d3c5613e17ec325661bf1734498e71c3ff59179a2c53adbc5577e2856737156a03d96b2cc610834eb2e58ac5618dcbce789c

                                                                              • \Users\Admin\AppData\Local\Temp\Unicorn-5632.exe

                                                                                Filesize

                                                                                184KB

                                                                                MD5

                                                                                f4352f2da2c57457385605c5c172580f

                                                                                SHA1

                                                                                b72eb67e8b3aa979ab53a5d20555328c98828bcb

                                                                                SHA256

                                                                                f3ad5cb50d62415e1ac0738a1da1a34a41c862c0a6b67de194aa54b88506d7c1

                                                                                SHA512

                                                                                26857e6a78b45edb743349f0c25d7c4ed72cf9277e9c3314ab2e4d552ec94679e388953432a780f99b7ab33b03dd5e6003e8e7a68f715f370e73db27ae1a7ece

                                                                              • \Users\Admin\AppData\Local\Temp\Unicorn-64061.exe

                                                                                Filesize

                                                                                184KB

                                                                                MD5

                                                                                f5a52872947e65843e4cbdac7dafc359

                                                                                SHA1

                                                                                e48b6d74753d8eecda5d3705defa96c722aaa3ac

                                                                                SHA256

                                                                                4703683a3b3574c02089fb82c585a939b79c0c4caeae2770fb8d22f7fa37bf0d

                                                                                SHA512

                                                                                f662b31034850f61c3a75e17f06fd9d0a87d408c1599934537dc392b23163a4a6f922e34519dad4920d00d7e767a8dca4b8dbe59ad31180e4f1274666c41e073

                                                                              • \Users\Admin\AppData\Local\Temp\Unicorn-7962.exe

                                                                                Filesize

                                                                                184KB

                                                                                MD5

                                                                                c36ba0ab527d039dea3d2832a8ed1536

                                                                                SHA1

                                                                                02a8e3a47e31810be60e67b61c0d5721be9f5b12

                                                                                SHA256

                                                                                147ae451741a5653c2e193eef0242c52117ddca8a1ae6c548c1b1dfc137e35e2

                                                                                SHA512

                                                                                1ab41fc029dddfec76b31c9e05a72e9c74a1f5cb790ac077d3049a1f3d7f3b178ead48ddcdb8cea5f98961a53af4b8eef3fcaa62d3a9f96c8e549ba39b1c8986