Analysis

  • max time kernel
    122s
  • max time network
    124s
  • platform
    windows7_x64
  • resource
    win7-20240419-en
  • resource tags

    arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system
  • submitted
    22-05-2024 23:49

General

  • Target

    83f8ad17d73fd863a35dfb4766d22f58086dab7d9262ec576bc4c63c43c3747d.exe

  • Size

    184KB

  • MD5

    ff476f4567d0548d3d802612b9cbc9c0

  • SHA1

    cd240e0b7befcc4dc5eb540eaf5222c457b1423e

  • SHA256

    83f8ad17d73fd863a35dfb4766d22f58086dab7d9262ec576bc4c63c43c3747d

  • SHA512

    6085e622eb0da629b9205b60dc0791b0cd28d27129912338fbaaff8ddcd7ef1f961e9bca05be2945d2041f8db5ca38c7674e21be536c59566902673cb9c494ee

  • SSDEEP

    1536:5BSj6dZluP0xoKx1hPeANawS/u9yvZc8amd9sFL+2oznzeIl5hj5nizpv+:LJgP0xom3Pe7j/AWe7FL+nzeIlnViFm

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 5 IoCs
  • Loads dropped DLL 10 IoCs
  • Suspicious use of SetWindowsHookEx 6 IoCs
  • Suspicious use of WriteProcessMemory 20 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\83f8ad17d73fd863a35dfb4766d22f58086dab7d9262ec576bc4c63c43c3747d.exe
    "C:\Users\Admin\AppData\Local\Temp\83f8ad17d73fd863a35dfb4766d22f58086dab7d9262ec576bc4c63c43c3747d.exe"
    1⤵
    • Loads dropped DLL
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:1148
    • C:\Users\Admin\AppData\Local\Temp\Unicorn-4712.exe
      C:\Users\Admin\AppData\Local\Temp\Unicorn-4712.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2300
      • C:\Users\Admin\AppData\Local\Temp\Unicorn-62164.exe
        C:\Users\Admin\AppData\Local\Temp\Unicorn-62164.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2996
        • C:\Users\Admin\AppData\Local\Temp\Unicorn-52818.exe
          C:\Users\Admin\AppData\Local\Temp\Unicorn-52818.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2684
          • C:\Users\Admin\AppData\Local\Temp\Unicorn-32445.exe
            C:\Users\Admin\AppData\Local\Temp\Unicorn-32445.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2668
            • C:\Users\Admin\AppData\Local\Temp\Unicorn-6954.exe
              C:\Users\Admin\AppData\Local\Temp\Unicorn-6954.exe
              6⤵
              • Executes dropped EXE
              • Suspicious use of SetWindowsHookEx
              PID:380

Network

MITRE ATT&CK Matrix

Replay Monitor

Loading Replay Monitor...

Downloads

  • \Users\Admin\AppData\Local\Temp\Unicorn-32445.exe

    Filesize

    184KB

    MD5

    397c768f7b633b7862531319f8816435

    SHA1

    965f6486834862f17eda8042014a41a656b044a0

    SHA256

    f99611ee6bfc1a7a7b7db421c19e7e5e76ef78e050dab290c7b95b26e0f9e200

    SHA512

    27fec34c0adcef268cd8da2dd8d8a71892c87b0eb117d00f0f9565ee55ce594a11faa2e2322916273942ce8ed641c6af8948bc43e7e6433130a1d9e92deef430

  • \Users\Admin\AppData\Local\Temp\Unicorn-4712.exe

    Filesize

    184KB

    MD5

    1a8c3a0d68ec0531dd5462f4b02b73a6

    SHA1

    50ecba08ac1f8264718ed8806350a9c888055bf6

    SHA256

    1bdc4bd8f4864912e80bd550129ae8e7f27a7864b61e380ac29e96ef53ad521c

    SHA512

    4fbb7be2b11375e31dd6dc8732ee544cbe0554b8863a78fc1d5cc552b4cc28825ed2fcce8878351ce2094f751169c7d876052ae45f88e17a1894d661ef3c6d8a

  • \Users\Admin\AppData\Local\Temp\Unicorn-52818.exe

    Filesize

    184KB

    MD5

    dc8f678ec7d221aec6ddbe0fe321eb01

    SHA1

    540118a8d1035714bde60e1e3b997d940eee92b4

    SHA256

    13b38d029d7648e6505ebd7ad6c6f607898762cc1fa92825ad5b6899cca167f4

    SHA512

    939eea177a8521fa6d8c257b81314449b3b80b8532a0ef56487954653790ccba4fef69465fed49a9dbe1431e93cdf6957d3eb026adc429a333bbec913565b875

  • \Users\Admin\AppData\Local\Temp\Unicorn-62164.exe

    Filesize

    184KB

    MD5

    d937ee265e7836e31f45ec813b8d8499

    SHA1

    797e353a45cb2fdc7a3b4f008dacf511e24ce20d

    SHA256

    4cd58aea3afde86ec3cbfa79e073fd98a2d5f935c65dd464ec95107893e0d986

    SHA512

    aaaaad13d8f8a8a8dc78b96f66dee3cae20cc440f161399aeaee5182fba5d0ead0e4eb1a9dc504b2aba4a6b633cc787e25d1757d21268e33ac20667b15cda6b6

  • \Users\Admin\AppData\Local\Temp\Unicorn-6954.exe

    Filesize

    184KB

    MD5

    7657e147e57d4a552d6663411546a775

    SHA1

    13858cbad17ebf63a67eb4ffacb6ef8161718209

    SHA256

    86373efd98bca8206601551ee40c581b1f444d21407ca4f6df37e9de73adf15c

    SHA512

    decc2069eb56f7ff2947e0aefe84d13022310b851e9ecc9ffc303d70bc4e4e5518b7da8b54fa380724bcee908c4670b245d51c6105f9aa050d308f75db6a55d0