Analysis
-
max time kernel
122s -
max time network
124s -
platform
windows7_x64 -
resource
win7-20240419-en -
resource tags
arch:x64arch:x86image:win7-20240419-enlocale:en-usos:windows7-x64system -
submitted
22-05-2024 23:49
Static task
static1
Behavioral task
behavioral1
Sample
83f8ad17d73fd863a35dfb4766d22f58086dab7d9262ec576bc4c63c43c3747d.exe
Resource
win7-20240419-en
Behavioral task
behavioral2
Sample
83f8ad17d73fd863a35dfb4766d22f58086dab7d9262ec576bc4c63c43c3747d.exe
Resource
win10v2004-20240226-en
General
-
Target
83f8ad17d73fd863a35dfb4766d22f58086dab7d9262ec576bc4c63c43c3747d.exe
-
Size
184KB
-
MD5
ff476f4567d0548d3d802612b9cbc9c0
-
SHA1
cd240e0b7befcc4dc5eb540eaf5222c457b1423e
-
SHA256
83f8ad17d73fd863a35dfb4766d22f58086dab7d9262ec576bc4c63c43c3747d
-
SHA512
6085e622eb0da629b9205b60dc0791b0cd28d27129912338fbaaff8ddcd7ef1f961e9bca05be2945d2041f8db5ca38c7674e21be536c59566902673cb9c494ee
-
SSDEEP
1536:5BSj6dZluP0xoKx1hPeANawS/u9yvZc8amd9sFL+2oznzeIl5hj5nizpv+:LJgP0xom3Pe7j/AWe7FL+nzeIlnViFm
Malware Config
Signatures
-
Executes dropped EXE 5 IoCs
Processes:
Unicorn-4712.exeUnicorn-62164.exeUnicorn-52818.exeUnicorn-32445.exeUnicorn-6954.exepid process 2300 Unicorn-4712.exe 2996 Unicorn-62164.exe 2684 Unicorn-52818.exe 2668 Unicorn-32445.exe 380 Unicorn-6954.exe -
Loads dropped DLL 10 IoCs
Processes:
83f8ad17d73fd863a35dfb4766d22f58086dab7d9262ec576bc4c63c43c3747d.exeUnicorn-4712.exeUnicorn-62164.exeUnicorn-52818.exeUnicorn-32445.exepid process 1148 83f8ad17d73fd863a35dfb4766d22f58086dab7d9262ec576bc4c63c43c3747d.exe 1148 83f8ad17d73fd863a35dfb4766d22f58086dab7d9262ec576bc4c63c43c3747d.exe 2300 Unicorn-4712.exe 2300 Unicorn-4712.exe 2996 Unicorn-62164.exe 2996 Unicorn-62164.exe 2684 Unicorn-52818.exe 2684 Unicorn-52818.exe 2668 Unicorn-32445.exe 2668 Unicorn-32445.exe -
Suspicious use of SetWindowsHookEx 6 IoCs
Processes:
83f8ad17d73fd863a35dfb4766d22f58086dab7d9262ec576bc4c63c43c3747d.exeUnicorn-4712.exeUnicorn-62164.exeUnicorn-52818.exeUnicorn-32445.exeUnicorn-6954.exepid process 1148 83f8ad17d73fd863a35dfb4766d22f58086dab7d9262ec576bc4c63c43c3747d.exe 2300 Unicorn-4712.exe 2996 Unicorn-62164.exe 2684 Unicorn-52818.exe 2668 Unicorn-32445.exe 380 Unicorn-6954.exe -
Suspicious use of WriteProcessMemory 20 IoCs
Processes:
83f8ad17d73fd863a35dfb4766d22f58086dab7d9262ec576bc4c63c43c3747d.exeUnicorn-4712.exeUnicorn-62164.exeUnicorn-52818.exeUnicorn-32445.exedescription pid process target process PID 1148 wrote to memory of 2300 1148 83f8ad17d73fd863a35dfb4766d22f58086dab7d9262ec576bc4c63c43c3747d.exe Unicorn-4712.exe PID 1148 wrote to memory of 2300 1148 83f8ad17d73fd863a35dfb4766d22f58086dab7d9262ec576bc4c63c43c3747d.exe Unicorn-4712.exe PID 1148 wrote to memory of 2300 1148 83f8ad17d73fd863a35dfb4766d22f58086dab7d9262ec576bc4c63c43c3747d.exe Unicorn-4712.exe PID 1148 wrote to memory of 2300 1148 83f8ad17d73fd863a35dfb4766d22f58086dab7d9262ec576bc4c63c43c3747d.exe Unicorn-4712.exe PID 2300 wrote to memory of 2996 2300 Unicorn-4712.exe Unicorn-62164.exe PID 2300 wrote to memory of 2996 2300 Unicorn-4712.exe Unicorn-62164.exe PID 2300 wrote to memory of 2996 2300 Unicorn-4712.exe Unicorn-62164.exe PID 2300 wrote to memory of 2996 2300 Unicorn-4712.exe Unicorn-62164.exe PID 2996 wrote to memory of 2684 2996 Unicorn-62164.exe Unicorn-52818.exe PID 2996 wrote to memory of 2684 2996 Unicorn-62164.exe Unicorn-52818.exe PID 2996 wrote to memory of 2684 2996 Unicorn-62164.exe Unicorn-52818.exe PID 2996 wrote to memory of 2684 2996 Unicorn-62164.exe Unicorn-52818.exe PID 2684 wrote to memory of 2668 2684 Unicorn-52818.exe Unicorn-32445.exe PID 2684 wrote to memory of 2668 2684 Unicorn-52818.exe Unicorn-32445.exe PID 2684 wrote to memory of 2668 2684 Unicorn-52818.exe Unicorn-32445.exe PID 2684 wrote to memory of 2668 2684 Unicorn-52818.exe Unicorn-32445.exe PID 2668 wrote to memory of 380 2668 Unicorn-32445.exe Unicorn-6954.exe PID 2668 wrote to memory of 380 2668 Unicorn-32445.exe Unicorn-6954.exe PID 2668 wrote to memory of 380 2668 Unicorn-32445.exe Unicorn-6954.exe PID 2668 wrote to memory of 380 2668 Unicorn-32445.exe Unicorn-6954.exe
Processes
-
C:\Users\Admin\AppData\Local\Temp\83f8ad17d73fd863a35dfb4766d22f58086dab7d9262ec576bc4c63c43c3747d.exe"C:\Users\Admin\AppData\Local\Temp\83f8ad17d73fd863a35dfb4766d22f58086dab7d9262ec576bc4c63c43c3747d.exe"1⤵
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1148 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-4712.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4712.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2300 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62164.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62164.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2996 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-52818.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52818.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2684 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-32445.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32445.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6954.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6954.exe6⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:380
Network
MITRE ATT&CK Matrix
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
184KB
MD5397c768f7b633b7862531319f8816435
SHA1965f6486834862f17eda8042014a41a656b044a0
SHA256f99611ee6bfc1a7a7b7db421c19e7e5e76ef78e050dab290c7b95b26e0f9e200
SHA51227fec34c0adcef268cd8da2dd8d8a71892c87b0eb117d00f0f9565ee55ce594a11faa2e2322916273942ce8ed641c6af8948bc43e7e6433130a1d9e92deef430
-
Filesize
184KB
MD51a8c3a0d68ec0531dd5462f4b02b73a6
SHA150ecba08ac1f8264718ed8806350a9c888055bf6
SHA2561bdc4bd8f4864912e80bd550129ae8e7f27a7864b61e380ac29e96ef53ad521c
SHA5124fbb7be2b11375e31dd6dc8732ee544cbe0554b8863a78fc1d5cc552b4cc28825ed2fcce8878351ce2094f751169c7d876052ae45f88e17a1894d661ef3c6d8a
-
Filesize
184KB
MD5dc8f678ec7d221aec6ddbe0fe321eb01
SHA1540118a8d1035714bde60e1e3b997d940eee92b4
SHA25613b38d029d7648e6505ebd7ad6c6f607898762cc1fa92825ad5b6899cca167f4
SHA512939eea177a8521fa6d8c257b81314449b3b80b8532a0ef56487954653790ccba4fef69465fed49a9dbe1431e93cdf6957d3eb026adc429a333bbec913565b875
-
Filesize
184KB
MD5d937ee265e7836e31f45ec813b8d8499
SHA1797e353a45cb2fdc7a3b4f008dacf511e24ce20d
SHA2564cd58aea3afde86ec3cbfa79e073fd98a2d5f935c65dd464ec95107893e0d986
SHA512aaaaad13d8f8a8a8dc78b96f66dee3cae20cc440f161399aeaee5182fba5d0ead0e4eb1a9dc504b2aba4a6b633cc787e25d1757d21268e33ac20667b15cda6b6
-
Filesize
184KB
MD57657e147e57d4a552d6663411546a775
SHA113858cbad17ebf63a67eb4ffacb6ef8161718209
SHA25686373efd98bca8206601551ee40c581b1f444d21407ca4f6df37e9de73adf15c
SHA512decc2069eb56f7ff2947e0aefe84d13022310b851e9ecc9ffc303d70bc4e4e5518b7da8b54fa380724bcee908c4670b245d51c6105f9aa050d308f75db6a55d0