Analysis
-
max time kernel
149s -
max time network
120s -
platform
windows7_x64 -
resource
win7-20240220-en -
resource tags
arch:x64arch:x86image:win7-20240220-enlocale:en-usos:windows7-x64system -
submitted
21/04/2024, 09:36
Static task
static1
Behavioral task
behavioral1
Sample
fefc3e214bbbfaa97f87a0d3b66625fc_JaffaCakes118.exe
Resource
win7-20240220-en
Behavioral task
behavioral2
Sample
fefc3e214bbbfaa97f87a0d3b66625fc_JaffaCakes118.exe
Resource
win10v2004-20240412-en
General
-
Target
fefc3e214bbbfaa97f87a0d3b66625fc_JaffaCakes118.exe
-
Size
184KB
-
MD5
fefc3e214bbbfaa97f87a0d3b66625fc
-
SHA1
2ae8d066b215e59e261f58a58d721735aa85d611
-
SHA256
6cca8137216ab6be9bcb0dc715764c764d45e50bb7cd7c15e222f35b4f67da09
-
SHA512
db2dfa3e2456233c80ab04d10104e6a130f7253ea7172edfc9043a6423772a3a34a308b78bb2a69417b3a1ff18e6f6898617bf1767ee900a2c049a33fff131ca
-
SSDEEP
3072:wTiEomRLyUT0nOj4MRPovJ01yv0MR8l48SxKia1uNlPMpFC:wT5oL+0n7MtovJzMP2NlPMpF
Malware Config
Signatures
-
Executes dropped EXE 49 IoCs
pid Process 2980 Unicorn-14995.exe 2620 Unicorn-51041.exe 2528 Unicorn-9261.exe 2116 Unicorn-45307.exe 1516 Unicorn-3563.exe 328 Unicorn-44726.exe 1768 Unicorn-15234.exe 856 Unicorn-38992.exe 2160 Unicorn-9500.exe 2776 Unicorn-50699.exe 572 Unicorn-29436.exe 836 Unicorn-4028.exe 2592 Unicorn-27822.exe 2244 Unicorn-58268.exe 360 Unicorn-20609.exe 2176 Unicorn-48450.exe 1964 Unicorn-6706.exe 2668 Unicorn-47905.exe 2492 Unicorn-10209.exe 2220 Unicorn-34003.exe 2892 Unicorn-45508.exe 1920 Unicorn-37506.exe 1800 Unicorn-61299.exe 2256 Unicorn-7267.exe 1312 Unicorn-47397.exe 1952 Unicorn-23059.exe 980 Unicorn-34564.exe 452 Unicorn-9156.exe 1960 Unicorn-20662.exe 2768 Unicorn-61860.exe 1576 Unicorn-36453.exe 2640 Unicorn-15189.exe 2972 Unicorn-38983.exe 1484 Unicorn-30981.exe 1744 Unicorn-42486.exe 1028 Unicorn-742.exe 1404 Unicorn-28584.exe 1208 Unicorn-5781.exe 2208 Unicorn-29575.exe 2372 Unicorn-53332.exe 2312 Unicorn-27925.exe 1732 Unicorn-52751.exe 2420 Unicorn-23260.exe 2136 Unicorn-63389.exe 1180 Unicorn-9357.exe 1940 Unicorn-50556.exe 1724 Unicorn-21065.exe 2272 Unicorn-44822.exe 1004 Unicorn-3078.exe -
Loads dropped DLL 64 IoCs
pid Process 2968 fefc3e214bbbfaa97f87a0d3b66625fc_JaffaCakes118.exe 2968 fefc3e214bbbfaa97f87a0d3b66625fc_JaffaCakes118.exe 2980 Unicorn-14995.exe 2980 Unicorn-14995.exe 2720 WerFault.exe 2720 WerFault.exe 2720 WerFault.exe 2720 WerFault.exe 2720 WerFault.exe 2720 WerFault.exe 2720 WerFault.exe 2620 Unicorn-51041.exe 2620 Unicorn-51041.exe 1720 WerFault.exe 1720 WerFault.exe 1720 WerFault.exe 1720 WerFault.exe 1720 WerFault.exe 1720 WerFault.exe 1720 WerFault.exe 2528 Unicorn-9261.exe 2528 Unicorn-9261.exe 1792 WerFault.exe 1792 WerFault.exe 1792 WerFault.exe 1792 WerFault.exe 1792 WerFault.exe 1792 WerFault.exe 1792 WerFault.exe 2116 Unicorn-45307.exe 2116 Unicorn-45307.exe 2316 WerFault.exe 2316 WerFault.exe 2316 WerFault.exe 2316 WerFault.exe 2316 WerFault.exe 2316 WerFault.exe 2316 WerFault.exe 1516 Unicorn-3563.exe 1516 Unicorn-3563.exe 2068 WerFault.exe 2068 WerFault.exe 2068 WerFault.exe 2068 WerFault.exe 2068 WerFault.exe 2068 WerFault.exe 2068 WerFault.exe 328 Unicorn-44726.exe 328 Unicorn-44726.exe 2516 WerFault.exe 2516 WerFault.exe 2516 WerFault.exe 2516 WerFault.exe 2516 WerFault.exe 2516 WerFault.exe 2516 WerFault.exe 1768 Unicorn-15234.exe 1768 Unicorn-15234.exe 2684 WerFault.exe 2684 WerFault.exe 2684 WerFault.exe 2684 WerFault.exe 2684 WerFault.exe 2684 WerFault.exe -
Program crash 49 IoCs
pid pid_target Process procid_target 3048 2968 WerFault.exe 27 2720 2980 WerFault.exe 28 1720 2620 WerFault.exe 30 1792 2528 WerFault.exe 32 2316 2116 WerFault.exe 34 2068 1516 WerFault.exe 36 2516 328 WerFault.exe 38 2684 1768 WerFault.exe 40 2164 856 WerFault.exe 42 336 2160 WerFault.exe 44 1712 2776 WerFault.exe 46 3028 572 WerFault.exe 48 2748 836 WerFault.exe 50 816 2592 WerFault.exe 52 2948 2244 WerFault.exe 54 1424 360 WerFault.exe 56 1632 2176 WerFault.exe 60 2548 1964 WerFault.exe 62 1820 2668 WerFault.exe 64 2336 2492 WerFault.exe 66 2804 2220 WerFault.exe 68 1360 2892 WerFault.exe 70 1696 1920 WerFault.exe 72 1780 1800 WerFault.exe 74 1680 2256 WerFault.exe 76 1924 1312 WerFault.exe 78 812 1952 WerFault.exe 80 320 980 WerFault.exe 82 948 452 WerFault.exe 84 1524 1960 WerFault.exe 86 2076 2768 WerFault.exe 88 2504 1576 WerFault.exe 90 1944 2640 WerFault.exe 92 2236 2972 WerFault.exe 94 1772 1484 WerFault.exe 96 3044 1744 WerFault.exe 98 2728 1028 WerFault.exe 100 1664 1404 WerFault.exe 102 2428 1208 WerFault.exe 104 1292 2208 WerFault.exe 106 1584 2372 WerFault.exe 108 604 2312 WerFault.exe 110 2216 1732 WerFault.exe 112 2508 2420 WerFault.exe 114 2112 2136 WerFault.exe 116 1256 1180 WerFault.exe 118 1636 1940 WerFault.exe 120 2480 1724 WerFault.exe 122 952 2272 WerFault.exe 124 -
Suspicious use of SetWindowsHookEx 50 IoCs
pid Process 2968 fefc3e214bbbfaa97f87a0d3b66625fc_JaffaCakes118.exe 2980 Unicorn-14995.exe 2620 Unicorn-51041.exe 2528 Unicorn-9261.exe 2116 Unicorn-45307.exe 1516 Unicorn-3563.exe 328 Unicorn-44726.exe 1768 Unicorn-15234.exe 856 Unicorn-38992.exe 2160 Unicorn-9500.exe 2776 Unicorn-50699.exe 572 Unicorn-29436.exe 836 Unicorn-4028.exe 2592 Unicorn-27822.exe 2244 Unicorn-58268.exe 360 Unicorn-20609.exe 2176 Unicorn-48450.exe 1964 Unicorn-6706.exe 2668 Unicorn-47905.exe 2492 Unicorn-10209.exe 2220 Unicorn-34003.exe 2892 Unicorn-45508.exe 1920 Unicorn-37506.exe 1800 Unicorn-61299.exe 2256 Unicorn-7267.exe 1312 Unicorn-47397.exe 1952 Unicorn-23059.exe 980 Unicorn-34564.exe 452 Unicorn-9156.exe 1960 Unicorn-20662.exe 2768 Unicorn-61860.exe 1576 Unicorn-36453.exe 2640 Unicorn-15189.exe 2972 Unicorn-38983.exe 1484 Unicorn-30981.exe 1744 Unicorn-42486.exe 1028 Unicorn-742.exe 1404 Unicorn-28584.exe 1208 Unicorn-5781.exe 2208 Unicorn-29575.exe 2372 Unicorn-53332.exe 2312 Unicorn-27925.exe 1732 Unicorn-52751.exe 2420 Unicorn-23260.exe 2136 Unicorn-63389.exe 1180 Unicorn-9357.exe 1940 Unicorn-50556.exe 1724 Unicorn-21065.exe 2272 Unicorn-44822.exe 1004 Unicorn-3078.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2968 wrote to memory of 2980 2968 fefc3e214bbbfaa97f87a0d3b66625fc_JaffaCakes118.exe 28 PID 2968 wrote to memory of 2980 2968 fefc3e214bbbfaa97f87a0d3b66625fc_JaffaCakes118.exe 28 PID 2968 wrote to memory of 2980 2968 fefc3e214bbbfaa97f87a0d3b66625fc_JaffaCakes118.exe 28 PID 2968 wrote to memory of 2980 2968 fefc3e214bbbfaa97f87a0d3b66625fc_JaffaCakes118.exe 28 PID 2968 wrote to memory of 3048 2968 fefc3e214bbbfaa97f87a0d3b66625fc_JaffaCakes118.exe 29 PID 2968 wrote to memory of 3048 2968 fefc3e214bbbfaa97f87a0d3b66625fc_JaffaCakes118.exe 29 PID 2968 wrote to memory of 3048 2968 fefc3e214bbbfaa97f87a0d3b66625fc_JaffaCakes118.exe 29 PID 2968 wrote to memory of 3048 2968 fefc3e214bbbfaa97f87a0d3b66625fc_JaffaCakes118.exe 29 PID 2980 wrote to memory of 2620 2980 Unicorn-14995.exe 30 PID 2980 wrote to memory of 2620 2980 Unicorn-14995.exe 30 PID 2980 wrote to memory of 2620 2980 Unicorn-14995.exe 30 PID 2980 wrote to memory of 2620 2980 Unicorn-14995.exe 30 PID 2980 wrote to memory of 2720 2980 Unicorn-14995.exe 31 PID 2980 wrote to memory of 2720 2980 Unicorn-14995.exe 31 PID 2980 wrote to memory of 2720 2980 Unicorn-14995.exe 31 PID 2980 wrote to memory of 2720 2980 Unicorn-14995.exe 31 PID 2620 wrote to memory of 2528 2620 Unicorn-51041.exe 32 PID 2620 wrote to memory of 2528 2620 Unicorn-51041.exe 32 PID 2620 wrote to memory of 2528 2620 Unicorn-51041.exe 32 PID 2620 wrote to memory of 2528 2620 Unicorn-51041.exe 32 PID 2620 wrote to memory of 1720 2620 Unicorn-51041.exe 33 PID 2620 wrote to memory of 1720 2620 Unicorn-51041.exe 33 PID 2620 wrote to memory of 1720 2620 Unicorn-51041.exe 33 PID 2620 wrote to memory of 1720 2620 Unicorn-51041.exe 33 PID 2528 wrote to memory of 2116 2528 Unicorn-9261.exe 34 PID 2528 wrote to memory of 2116 2528 Unicorn-9261.exe 34 PID 2528 wrote to memory of 2116 2528 Unicorn-9261.exe 34 PID 2528 wrote to memory of 2116 2528 Unicorn-9261.exe 34 PID 2528 wrote to memory of 1792 2528 Unicorn-9261.exe 35 PID 2528 wrote to memory of 1792 2528 Unicorn-9261.exe 35 PID 2528 wrote to memory of 1792 2528 Unicorn-9261.exe 35 PID 2528 wrote to memory of 1792 2528 Unicorn-9261.exe 35 PID 2116 wrote to memory of 1516 2116 Unicorn-45307.exe 36 PID 2116 wrote to memory of 1516 2116 Unicorn-45307.exe 36 PID 2116 wrote to memory of 1516 2116 Unicorn-45307.exe 36 PID 2116 wrote to memory of 1516 2116 Unicorn-45307.exe 36 PID 2116 wrote to memory of 2316 2116 Unicorn-45307.exe 37 PID 2116 wrote to memory of 2316 2116 Unicorn-45307.exe 37 PID 2116 wrote to memory of 2316 2116 Unicorn-45307.exe 37 PID 2116 wrote to memory of 2316 2116 Unicorn-45307.exe 37 PID 1516 wrote to memory of 328 1516 Unicorn-3563.exe 38 PID 1516 wrote to memory of 328 1516 Unicorn-3563.exe 38 PID 1516 wrote to memory of 328 1516 Unicorn-3563.exe 38 PID 1516 wrote to memory of 328 1516 Unicorn-3563.exe 38 PID 1516 wrote to memory of 2068 1516 Unicorn-3563.exe 39 PID 1516 wrote to memory of 2068 1516 Unicorn-3563.exe 39 PID 1516 wrote to memory of 2068 1516 Unicorn-3563.exe 39 PID 1516 wrote to memory of 2068 1516 Unicorn-3563.exe 39 PID 328 wrote to memory of 1768 328 Unicorn-44726.exe 40 PID 328 wrote to memory of 1768 328 Unicorn-44726.exe 40 PID 328 wrote to memory of 1768 328 Unicorn-44726.exe 40 PID 328 wrote to memory of 1768 328 Unicorn-44726.exe 40 PID 328 wrote to memory of 2516 328 Unicorn-44726.exe 41 PID 328 wrote to memory of 2516 328 Unicorn-44726.exe 41 PID 328 wrote to memory of 2516 328 Unicorn-44726.exe 41 PID 328 wrote to memory of 2516 328 Unicorn-44726.exe 41 PID 1768 wrote to memory of 856 1768 Unicorn-15234.exe 42 PID 1768 wrote to memory of 856 1768 Unicorn-15234.exe 42 PID 1768 wrote to memory of 856 1768 Unicorn-15234.exe 42 PID 1768 wrote to memory of 856 1768 Unicorn-15234.exe 42 PID 1768 wrote to memory of 2684 1768 Unicorn-15234.exe 43 PID 1768 wrote to memory of 2684 1768 Unicorn-15234.exe 43 PID 1768 wrote to memory of 2684 1768 Unicorn-15234.exe 43 PID 1768 wrote to memory of 2684 1768 Unicorn-15234.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\fefc3e214bbbfaa97f87a0d3b66625fc_JaffaCakes118.exe"C:\Users\Admin\AppData\Local\Temp\fefc3e214bbbfaa97f87a0d3b66625fc_JaffaCakes118.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2968 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14995.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14995.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2980 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51041.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51041.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2620 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9261.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9261.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2528 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45307.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45307.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2116 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3563.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3563.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1516 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44726.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44726.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:328 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15234.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15234.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1768 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38992.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38992.exe9⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:856 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9500.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9500.exe10⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2160 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50699.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50699.exe11⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-29436.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29436.exe12⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:572 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-4028.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4028.exe13⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:836 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27822.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27822.exe14⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2592 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-58268.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-58268.exe15⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-20609.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20609.exe16⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:360 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-48450.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-48450.exe17⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2176 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6706.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6706.exe18⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1964 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47905.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47905.exe19⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10209.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10209.exe20⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2492 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34003.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34003.exe21⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45508.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45508.exe22⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-37506.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-37506.exe23⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1920 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61299.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61299.exe24⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1800 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-7267.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7267.exe25⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2256 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47397.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47397.exe26⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1312 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23059.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23059.exe27⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1952 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34564.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34564.exe28⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:980 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9156.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9156.exe29⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:452 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-20662.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20662.exe30⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61860.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61860.exe31⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2768 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-36453.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36453.exe32⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1576 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15189.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15189.exe33⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2640 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38983.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38983.exe34⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2972 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30981.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30981.exe35⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1484 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-42486.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42486.exe36⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1744 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-742.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-742.exe37⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1028 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-28584.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28584.exe38⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1404 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5781.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5781.exe39⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1208 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-29575.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29575.exe40⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2208 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-53332.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53332.exe41⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-27925.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-27925.exe42⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2312 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-52751.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52751.exe43⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1732 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23260.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23260.exe44⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2420 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-63389.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63389.exe45⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2136 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9357.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9357.exe46⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1180 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50556.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50556.exe47⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1940 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21065.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21065.exe48⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44822.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44822.exe49⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3078.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3078.exe50⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:1004
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2272 -s 23650⤵
- Program crash
PID:952
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1724 -s 23649⤵
- Program crash
PID:2480
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1940 -s 23648⤵
- Program crash
PID:1636
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1180 -s 23647⤵
- Program crash
PID:1256
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2136 -s 23646⤵
- Program crash
PID:2112
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2420 -s 23645⤵
- Program crash
PID:2508
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1732 -s 23644⤵
- Program crash
PID:2216
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 23643⤵
- Program crash
PID:604
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2372 -s 23642⤵
- Program crash
PID:1584
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2208 -s 23641⤵
- Program crash
PID:1292
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1208 -s 23640⤵
- Program crash
PID:2428
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1404 -s 23639⤵
- Program crash
PID:1664
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1028 -s 23638⤵
- Program crash
PID:2728
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1744 -s 23637⤵
- Program crash
PID:3044
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1484 -s 23636⤵
- Program crash
PID:1772
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2972 -s 23635⤵
- Program crash
PID:2236
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2640 -s 23634⤵
- Program crash
PID:1944
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1576 -s 23633⤵
- Program crash
PID:2504
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2768 -s 23632⤵
- Program crash
PID:2076
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1960 -s 23631⤵
- Program crash
PID:1524
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 452 -s 23630⤵
- Program crash
PID:948
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 980 -s 23629⤵
- Program crash
PID:320
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1952 -s 23628⤵
- Program crash
PID:812
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1312 -s 23627⤵
- Program crash
PID:1924
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2256 -s 23626⤵
- Program crash
PID:1680
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1800 -s 23625⤵
- Program crash
PID:1780
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1920 -s 23624⤵
- Program crash
PID:1696
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2892 -s 23623⤵
- Program crash
PID:1360
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2220 -s 23622⤵
- Program crash
PID:2804
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2492 -s 23621⤵
- Program crash
PID:2336
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2668 -s 23620⤵
- Program crash
PID:1820
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1964 -s 23619⤵
- Program crash
PID:2548
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2176 -s 23618⤵
- Program crash
PID:1632
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 360 -s 23617⤵
- Program crash
PID:1424
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2244 -s 23616⤵
- Program crash
PID:2948
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2592 -s 23615⤵
- Program crash
PID:816
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 836 -s 23614⤵
- Program crash
PID:2748
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 572 -s 23613⤵
- Program crash
PID:3028
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2776 -s 23612⤵
- Program crash
PID:1712
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2160 -s 23611⤵
- Program crash
PID:336
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 856 -s 23610⤵
- Program crash
PID:2164
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1768 -s 2369⤵
- Loads dropped DLL
- Program crash
PID:2684
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 328 -s 2368⤵
- Loads dropped DLL
- Program crash
PID:2516
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1516 -s 2367⤵
- Loads dropped DLL
- Program crash
PID:2068
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2116 -s 2366⤵
- Loads dropped DLL
- Program crash
PID:2316
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2528 -s 2365⤵
- Loads dropped DLL
- Program crash
PID:1792
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2620 -s 2364⤵
- Loads dropped DLL
- Program crash
PID:1720
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2980 -s 2363⤵
- Loads dropped DLL
- Program crash
PID:2720
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2968 -s 2362⤵
- Program crash
PID:3048
-
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD5453d45f38145d985b7bbb3fa279d534f
SHA1be90429a2cadd258a61ae8619ae53d16132462d4
SHA256d25decfeb0b132ea7edd2508a2c7117aabf8b1d3e9485bff235783eb8bad4293
SHA5125d350da5aa188628d3b99cebe95fae141811db08af3efb9da1c0e73f51fc6f884a0b3ab7633d01f3b78ac50f20394169314e3ab5c1c3c7d2ad4e63114ba0b68e
-
Filesize
184KB
MD5c3b1eca892ca52c8daf97d0c4848adc0
SHA12aa22030df1a5f85a4cd6aa35c935dc1cd63f18f
SHA256bed10380ab5e0a4e64aa075b1674b130c91c78e23714954f77f57b6593a373ea
SHA5124b8eb6fcc0d9185f7c0d74dba2763c6f1b237ebb0f507e0c07427db99741985c1b1dac9a3df424e49579114c94003d21a082c01c6f29214dc4aa5a51439e59ba
-
Filesize
184KB
MD52f3393261ec74ff07e75a5162b07e733
SHA1cd25956868ef2380817f372059a329fe337c8511
SHA256966154d26bf9c0755d8746762ebb037bcb94679b2489633789b04a3a5a2f50d8
SHA512e3b6f40024bf1e7b76d77e02ae6b8c54307410aecd8cb779811d4dc130522b0c63ba4083e27c332d817a501233fb551b730e56985fda920bc1b9b84f3e5f053b
-
Filesize
184KB
MD5f1bef738f205483051d5a6a4cdd8041d
SHA1748cae1e1863c2bc28d3959e13d373325c695602
SHA25671ed7845bc1aa85afadfdc5ce5e5a874e46e257aef51db0eb175f8bcf09b341e
SHA51274aea1bc4f6a02db8606443200b9b0145e6cd8a812fc2bc628e28b49c66533d9e2bd21573a62ebf9b3eb35a2e02ea6fe6eabc799a80e04a313a121fe8ec4110b
-
Filesize
184KB
MD5caf09c60eaf83c3e81e548a272375b77
SHA13f29e895c1b73b4207f0fdf06f9b0bec32257cac
SHA256d9c4669c13ef4b0d573e744e0d1ba16b1948f4e56b079629af4480e49c9939b1
SHA512e43e929ba11a5a47b8737d051193258c114e8206473b200ffbcfccefde166f0b93ec41bcb68bbc181845911a76db1e1938bd349cb57ecf3e331623f7f945156c
-
Filesize
184KB
MD5a762a123281362c41e707f2e6667bddd
SHA17e3b1c164e4519f95f176633825e55da5fb85b89
SHA2565921354e9850ce8e204cc4c0ecea30925f9b48f6fe0c869fb1c27a259f8518bf
SHA512a1227fe102d1759da0cb6415027f9e4c8053b569da297817bbef1d39e87b33e5125e1e078fb166e9ecbc4c630d407fa4a11e1bd9a09279e31a82815b5135aae9
-
Filesize
184KB
MD537eb294602523edd04307971b571a5c9
SHA106894723ece11143d7133a885d64fafb43229b80
SHA2563da58c4b9db870c436d5189f0a96dd97658d28cf2323c12080c80b575de8e04e
SHA5123636dd633c6f6de9595f7f304ce17d06a930cfe4b2ee8e5a88d068fbd603f4eb9967e5583069927f8a021b002bc4263934b3ff57c4aad3ad255b85e6517a6503
-
Filesize
184KB
MD59cce46aabb02d98a3899a2fc1df9bc1d
SHA119a0da56984fb0fe6f22c4b1ca02437e962715ae
SHA25632d042ccf49b0264b9bc9e4d121177a3b1baf02945748f03f060b8232c11937e
SHA51259d21d90cbcad1cf6b77f5350fc8e19235227a78887201fc3fc4130fbfaee38363583e568e6769e4aba782ccc52e8e54b68f91eb074a624a6879cbc9874adc0d
-
Filesize
184KB
MD5b3389d0006ae6c8055c9ef52e501978a
SHA188a46ab9e3b71d9d253f03834b9a73a77fee68db
SHA256dc8f5cfe3cf311225c2cefae7d24c2b98a574511abc8532080a789a08b88443d
SHA512bb32f7bb57073e2bc901a242afc0de4bb82c790fcec27365f86cd237aa7409112631105d087b8885c3ec9fa7823dacc996b9b87a8f860337936b23233a253eb0