Analysis
-
max time kernel
119s -
max time network
17s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
05/08/2024, 10:38
Static task
static1
Behavioral task
behavioral1
Sample
7fd5adc8de3d581b1e6a4def98615850N.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
7fd5adc8de3d581b1e6a4def98615850N.exe
Resource
win10v2004-20240802-en
General
-
Target
7fd5adc8de3d581b1e6a4def98615850N.exe
-
Size
468KB
-
MD5
7fd5adc8de3d581b1e6a4def98615850
-
SHA1
5f5664f9544f0220aeda444f9d75cb4ded19b756
-
SHA256
482d3734754565ccb8720e761025016b2ed553bf3b3254e4b9df8d70aa0f421d
-
SHA512
8eb9e04cff807a5a9de47b866eaa78dc89fd64e0ecce21b34e4ba5560980ab746a6667d05112bb89717987ad8b546eca151e20a41bca41f054a3922c34a2cd65
-
SSDEEP
3072:fqmtVgsMjb8U2bY9Pz36rfc/YICKj7IpCNmHBvVpQBGSAmkfNzhl/:fqMVaYU2+PD6rf40t4BGXnfNz
Malware Config
Signatures
-
Executes dropped EXE 39 IoCs
pid Process 1448 Unicorn-60338.exe 2740 Unicorn-26727.exe 2924 Unicorn-22809.exe 2668 Unicorn-38242.exe 1108 Unicorn-41483.exe 2888 Unicorn-41649.exe 1844 Unicorn-17742.exe 2232 Unicorn-21115.exe 2028 Unicorn-12043.exe 2644 Unicorn-45038.exe 2008 Unicorn-44327.exe 1788 Unicorn-14799.exe 3044 Unicorn-30425.exe 1480 Unicorn-6086.exe 1592 Unicorn-42096.exe 2568 Unicorn-4436.exe 2864 Unicorn-60902.exe 2660 Unicorn-35459.exe 1260 Unicorn-15204.exe 852 Unicorn-59574.exe 2952 Unicorn-62755.exe 1388 Unicorn-21012.exe 2236 Unicorn-21334.exe 2584 Unicorn-20431.exe 2444 Unicorn-46697.exe 1916 Unicorn-22359.exe 2376 Unicorn-64626.exe 2796 Unicorn-8456.exe 2624 Unicorn-1523.exe 1696 Unicorn-26386.exe 2292 Unicorn-35753.exe 1032 Unicorn-28820.exe 612 Unicorn-30019.exe 1724 Unicorn-5680.exe 2792 Unicorn-39780.exe 2244 Unicorn-61399.exe 2004 Unicorn-38130.exe 932 Unicorn-42380.exe 888 Unicorn-64191.exe -
Loads dropped DLL 64 IoCs
pid Process 2372 7fd5adc8de3d581b1e6a4def98615850N.exe 2372 7fd5adc8de3d581b1e6a4def98615850N.exe 1448 Unicorn-60338.exe 1448 Unicorn-60338.exe 2916 WerFault.exe 2916 WerFault.exe 2916 WerFault.exe 2916 WerFault.exe 2916 WerFault.exe 2916 WerFault.exe 2916 WerFault.exe 2740 Unicorn-26727.exe 2740 Unicorn-26727.exe 2356 WerFault.exe 2356 WerFault.exe 2356 WerFault.exe 2356 WerFault.exe 2356 WerFault.exe 2356 WerFault.exe 2356 WerFault.exe 2924 Unicorn-22809.exe 2924 Unicorn-22809.exe 2772 WerFault.exe 2772 WerFault.exe 2772 WerFault.exe 2772 WerFault.exe 2772 WerFault.exe 2772 WerFault.exe 2772 WerFault.exe 2668 Unicorn-38242.exe 2668 Unicorn-38242.exe 2976 WerFault.exe 2976 WerFault.exe 2976 WerFault.exe 2976 WerFault.exe 2976 WerFault.exe 2976 WerFault.exe 2976 WerFault.exe 1108 Unicorn-41483.exe 1108 Unicorn-41483.exe 1312 WerFault.exe 1312 WerFault.exe 1312 WerFault.exe 1312 WerFault.exe 1312 WerFault.exe 1312 WerFault.exe 1312 WerFault.exe 2888 Unicorn-41649.exe 2888 Unicorn-41649.exe 3052 WerFault.exe 3052 WerFault.exe 3052 WerFault.exe 3052 WerFault.exe 3052 WerFault.exe 3052 WerFault.exe 3052 WerFault.exe 1844 Unicorn-17742.exe 1844 Unicorn-17742.exe 2120 WerFault.exe 2120 WerFault.exe 2120 WerFault.exe 2120 WerFault.exe 2120 WerFault.exe 2120 WerFault.exe -
Program crash 39 IoCs
pid pid_target Process procid_target 2836 2372 WerFault.exe 29 2916 1448 WerFault.exe 30 2356 2740 WerFault.exe 33 2772 2924 WerFault.exe 35 2976 2668 WerFault.exe 37 1312 1108 WerFault.exe 39 3052 2888 WerFault.exe 41 2120 1844 WerFault.exe 43 2484 2232 WerFault.exe 45 1396 2028 WerFault.exe 47 1060 2644 WerFault.exe 49 2196 2008 WerFault.exe 51 1660 1788 WerFault.exe 53 2580 3044 WerFault.exe 55 2384 1480 WerFault.exe 57 2824 1592 WerFault.exe 59 3068 2568 WerFault.exe 61 2352 2864 WerFault.exe 63 2780 2660 WerFault.exe 65 988 1260 WerFault.exe 67 1676 852 WerFault.exe 69 1988 2952 WerFault.exe 71 916 1388 WerFault.exe 73 1816 2236 WerFault.exe 75 2896 2584 WerFault.exe 77 1596 2444 WerFault.exe 79 2728 1916 WerFault.exe 81 2720 2376 WerFault.exe 83 1308 2796 WerFault.exe 85 1984 2624 WerFault.exe 87 1076 1696 WerFault.exe 89 3020 2292 WerFault.exe 91 1152 1032 WerFault.exe 93 2932 612 WerFault.exe 95 2852 1724 WerFault.exe 97 2508 2792 WerFault.exe 99 2364 2244 WerFault.exe 101 1512 2004 WerFault.exe 103 1956 932 WerFault.exe 105 -
System Location Discovery: System Language Discovery 1 TTPs 40 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-45038.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-35753.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-41649.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-30425.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-5680.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-42380.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-26386.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-61399.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-41483.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-21115.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-60902.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-64626.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-6086.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-59574.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-21334.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-30019.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-22359.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-64191.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-22809.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-12043.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-15204.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-62755.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-39780.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-38130.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-38242.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-44327.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-4436.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-46697.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-1523.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-60338.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-26727.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-35459.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-21012.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-20431.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-8456.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-28820.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 7fd5adc8de3d581b1e6a4def98615850N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-17742.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-14799.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-42096.exe -
Suspicious use of SetWindowsHookEx 40 IoCs
pid Process 2372 7fd5adc8de3d581b1e6a4def98615850N.exe 1448 Unicorn-60338.exe 2740 Unicorn-26727.exe 2924 Unicorn-22809.exe 2668 Unicorn-38242.exe 1108 Unicorn-41483.exe 2888 Unicorn-41649.exe 1844 Unicorn-17742.exe 2232 Unicorn-21115.exe 2028 Unicorn-12043.exe 2644 Unicorn-45038.exe 2008 Unicorn-44327.exe 1788 Unicorn-14799.exe 3044 Unicorn-30425.exe 1480 Unicorn-6086.exe 1592 Unicorn-42096.exe 2568 Unicorn-4436.exe 2864 Unicorn-60902.exe 2660 Unicorn-35459.exe 1260 Unicorn-15204.exe 852 Unicorn-59574.exe 2952 Unicorn-62755.exe 1388 Unicorn-21012.exe 2236 Unicorn-21334.exe 2584 Unicorn-20431.exe 2444 Unicorn-46697.exe 1916 Unicorn-22359.exe 2376 Unicorn-64626.exe 2796 Unicorn-8456.exe 2624 Unicorn-1523.exe 1696 Unicorn-26386.exe 2292 Unicorn-35753.exe 1032 Unicorn-28820.exe 612 Unicorn-30019.exe 1724 Unicorn-5680.exe 2792 Unicorn-39780.exe 2244 Unicorn-61399.exe 2004 Unicorn-38130.exe 932 Unicorn-42380.exe 888 Unicorn-64191.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2372 wrote to memory of 1448 2372 7fd5adc8de3d581b1e6a4def98615850N.exe 30 PID 2372 wrote to memory of 1448 2372 7fd5adc8de3d581b1e6a4def98615850N.exe 30 PID 2372 wrote to memory of 1448 2372 7fd5adc8de3d581b1e6a4def98615850N.exe 30 PID 2372 wrote to memory of 1448 2372 7fd5adc8de3d581b1e6a4def98615850N.exe 30 PID 2372 wrote to memory of 2836 2372 7fd5adc8de3d581b1e6a4def98615850N.exe 31 PID 2372 wrote to memory of 2836 2372 7fd5adc8de3d581b1e6a4def98615850N.exe 31 PID 2372 wrote to memory of 2836 2372 7fd5adc8de3d581b1e6a4def98615850N.exe 31 PID 2372 wrote to memory of 2836 2372 7fd5adc8de3d581b1e6a4def98615850N.exe 31 PID 1448 wrote to memory of 2740 1448 Unicorn-60338.exe 33 PID 1448 wrote to memory of 2740 1448 Unicorn-60338.exe 33 PID 1448 wrote to memory of 2740 1448 Unicorn-60338.exe 33 PID 1448 wrote to memory of 2740 1448 Unicorn-60338.exe 33 PID 1448 wrote to memory of 2916 1448 Unicorn-60338.exe 34 PID 1448 wrote to memory of 2916 1448 Unicorn-60338.exe 34 PID 1448 wrote to memory of 2916 1448 Unicorn-60338.exe 34 PID 1448 wrote to memory of 2916 1448 Unicorn-60338.exe 34 PID 2740 wrote to memory of 2924 2740 Unicorn-26727.exe 35 PID 2740 wrote to memory of 2924 2740 Unicorn-26727.exe 35 PID 2740 wrote to memory of 2924 2740 Unicorn-26727.exe 35 PID 2740 wrote to memory of 2924 2740 Unicorn-26727.exe 35 PID 2740 wrote to memory of 2356 2740 Unicorn-26727.exe 36 PID 2740 wrote to memory of 2356 2740 Unicorn-26727.exe 36 PID 2740 wrote to memory of 2356 2740 Unicorn-26727.exe 36 PID 2740 wrote to memory of 2356 2740 Unicorn-26727.exe 36 PID 2924 wrote to memory of 2668 2924 Unicorn-22809.exe 37 PID 2924 wrote to memory of 2668 2924 Unicorn-22809.exe 37 PID 2924 wrote to memory of 2668 2924 Unicorn-22809.exe 37 PID 2924 wrote to memory of 2668 2924 Unicorn-22809.exe 37 PID 2924 wrote to memory of 2772 2924 Unicorn-22809.exe 38 PID 2924 wrote to memory of 2772 2924 Unicorn-22809.exe 38 PID 2924 wrote to memory of 2772 2924 Unicorn-22809.exe 38 PID 2924 wrote to memory of 2772 2924 Unicorn-22809.exe 38 PID 2668 wrote to memory of 1108 2668 Unicorn-38242.exe 39 PID 2668 wrote to memory of 1108 2668 Unicorn-38242.exe 39 PID 2668 wrote to memory of 1108 2668 Unicorn-38242.exe 39 PID 2668 wrote to memory of 1108 2668 Unicorn-38242.exe 39 PID 2668 wrote to memory of 2976 2668 Unicorn-38242.exe 40 PID 2668 wrote to memory of 2976 2668 Unicorn-38242.exe 40 PID 2668 wrote to memory of 2976 2668 Unicorn-38242.exe 40 PID 2668 wrote to memory of 2976 2668 Unicorn-38242.exe 40 PID 1108 wrote to memory of 2888 1108 Unicorn-41483.exe 41 PID 1108 wrote to memory of 2888 1108 Unicorn-41483.exe 41 PID 1108 wrote to memory of 2888 1108 Unicorn-41483.exe 41 PID 1108 wrote to memory of 2888 1108 Unicorn-41483.exe 41 PID 1108 wrote to memory of 1312 1108 Unicorn-41483.exe 42 PID 1108 wrote to memory of 1312 1108 Unicorn-41483.exe 42 PID 1108 wrote to memory of 1312 1108 Unicorn-41483.exe 42 PID 1108 wrote to memory of 1312 1108 Unicorn-41483.exe 42 PID 2888 wrote to memory of 1844 2888 Unicorn-41649.exe 43 PID 2888 wrote to memory of 1844 2888 Unicorn-41649.exe 43 PID 2888 wrote to memory of 1844 2888 Unicorn-41649.exe 43 PID 2888 wrote to memory of 1844 2888 Unicorn-41649.exe 43 PID 2888 wrote to memory of 3052 2888 Unicorn-41649.exe 44 PID 2888 wrote to memory of 3052 2888 Unicorn-41649.exe 44 PID 2888 wrote to memory of 3052 2888 Unicorn-41649.exe 44 PID 2888 wrote to memory of 3052 2888 Unicorn-41649.exe 44 PID 1844 wrote to memory of 2232 1844 Unicorn-17742.exe 45 PID 1844 wrote to memory of 2232 1844 Unicorn-17742.exe 45 PID 1844 wrote to memory of 2232 1844 Unicorn-17742.exe 45 PID 1844 wrote to memory of 2232 1844 Unicorn-17742.exe 45 PID 1844 wrote to memory of 2120 1844 Unicorn-17742.exe 46 PID 1844 wrote to memory of 2120 1844 Unicorn-17742.exe 46 PID 1844 wrote to memory of 2120 1844 Unicorn-17742.exe 46 PID 1844 wrote to memory of 2120 1844 Unicorn-17742.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\7fd5adc8de3d581b1e6a4def98615850N.exe"C:\Users\Admin\AppData\Local\Temp\7fd5adc8de3d581b1e6a4def98615850N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2372 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60338.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60338.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1448 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26727.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26727.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2740 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22809.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22809.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2924 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38242.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38242.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2668 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-41483.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41483.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1108 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-41649.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-41649.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-17742.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-17742.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1844 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21115.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21115.exe9⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2232 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-12043.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-12043.exe10⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2028 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45038.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45038.exe11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44327.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44327.exe12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2008 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14799.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14799.exe13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1788 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30425.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30425.exe14⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-6086.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-6086.exe15⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1480 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-42096.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42096.exe16⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1592 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-4436.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4436.exe17⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2568 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60902.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60902.exe18⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2864 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35459.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35459.exe19⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2660 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-15204.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-15204.exe20⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1260 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-59574.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59574.exe21⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:852 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62755.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62755.exe22⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21012.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21012.exe23⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1388 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21334.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21334.exe24⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2236 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-20431.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20431.exe25⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2584 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46697.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46697.exe26⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2444 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22359.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22359.exe27⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-64626.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64626.exe28⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2376 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-8456.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-8456.exe29⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-1523.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1523.exe30⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2624 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26386.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26386.exe31⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1696 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35753.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35753.exe32⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-28820.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28820.exe33⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1032 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30019.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30019.exe34⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:612 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5680.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5680.exe35⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1724 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-39780.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39780.exe36⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2792 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61399.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61399.exe37⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2244 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38130.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38130.exe38⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2004 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-42380.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42380.exe39⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:932 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-64191.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64191.exe40⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:888
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 932 -s 23640⤵
- Program crash
PID:1956
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2004 -s 23639⤵
- Program crash
PID:1512
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2244 -s 23638⤵
- Program crash
PID:2364
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2792 -s 23637⤵
- Program crash
PID:2508
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1724 -s 23636⤵
- Program crash
PID:2852
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 612 -s 23635⤵
- Program crash
PID:2932
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1032 -s 23634⤵
- Program crash
PID:1152
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2292 -s 23633⤵
- Program crash
PID:3020
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1696 -s 23632⤵
- Program crash
PID:1076
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2624 -s 23631⤵
- Program crash
PID:1984
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2796 -s 23630⤵
- Program crash
PID:1308
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2376 -s 23629⤵
- Program crash
PID:2720
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1916 -s 23628⤵
- Program crash
PID:2728
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2444 -s 23627⤵
- Program crash
PID:1596
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2584 -s 23626⤵
- Program crash
PID:2896
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2236 -s 23625⤵
- Program crash
PID:1816
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1388 -s 23624⤵
- Program crash
PID:916
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2952 -s 23623⤵
- Program crash
PID:1988
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 852 -s 23622⤵
- Program crash
PID:1676
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1260 -s 23621⤵
- Program crash
PID:988
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2660 -s 23620⤵
- Program crash
PID:2780
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2864 -s 23619⤵
- Program crash
PID:2352
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2568 -s 23618⤵
- Program crash
PID:3068
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1592 -s 23617⤵
- Program crash
PID:2824
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1480 -s 23616⤵
- Program crash
PID:2384
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3044 -s 23615⤵
- Program crash
PID:2580
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1788 -s 23614⤵
- Program crash
PID:1660
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2008 -s 23613⤵
- Program crash
PID:2196
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2644 -s 23612⤵
- Program crash
PID:1060
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2028 -s 23611⤵
- Program crash
PID:1396
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2232 -s 23610⤵
- Program crash
PID:2484
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1844 -s 2369⤵
- Loads dropped DLL
- Program crash
PID:2120
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2888 -s 2368⤵
- Loads dropped DLL
- Program crash
PID:3052
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1108 -s 2367⤵
- Loads dropped DLL
- Program crash
PID:1312
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2668 -s 2366⤵
- Loads dropped DLL
- Program crash
PID:2976
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2924 -s 2365⤵
- Loads dropped DLL
- Program crash
PID:2772
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2740 -s 2364⤵
- Loads dropped DLL
- Program crash
PID:2356
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1448 -s 2363⤵
- Loads dropped DLL
- Program crash
PID:2916
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2372 -s 2362⤵
- Program crash
PID:2836
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
468KB
MD52dcd49fe713c2bdced087f73dcae2bf6
SHA133a95ef4cc4061d378112f3b89a2595081a7b6bb
SHA25606197a2ccf6425d9decfbacfdaab2ec93632958b7285aea77fb7bd9e3d741e4c
SHA512a212499b5f9c60a1e9044042dc70db6612079e53c9ad99b9bd77373ef319103cf22b5cdeb70200295f1b9b394ce034a8a0c198869858a658dd7e09459e4e7609
-
Filesize
468KB
MD51a3cbdbed98ba4b9c9e689bae21eba6a
SHA18938be66cbc242841c6065fa99ff0756e03b8809
SHA2566ceeb314af4dbd1da81bf0ae123fe56fe8efa3e125814cbdad41f40647d547b5
SHA5121065d87c6b95172a3999d2a5dda7cf48d3065c36c804be8928d23f2f59081fe105034139dbc5087c470bf8ddd83e5ecac520256423f784cb1fa61e867b8696a3
-
Filesize
468KB
MD52a1ab5bd467f69f8fa7952379579c1e5
SHA16ddb0b3e2c624f35b45315c0bdb91cb48a6e446c
SHA2563f9c6d90246f2f4621c36f1efbffe7aa04cc2712f7a8a36b723aa2e6a982d357
SHA512a4403ac16be5161a97c2abe8c4078d16aed2876e9d905339886dc460c83f46d31d10e34a7ed53da565c915edddf19bc6b6549c6991b9c9261444acb74f039174
-
Filesize
468KB
MD5ad221d87c8bb0ff0c506d59962ebddf2
SHA141d7bb2a0b71b5d0902772bb2f6307e41a2c9240
SHA256d980aba79aee31b6e36970674b47d3737f4e747572be860f15bd08ef221662f1
SHA512cb23aa97165e92b5edb4a3cd2749aa6f0f1ec53fa474b6ca924aa4e85a8be4ef863cbd6bbe72655936bedb1345a002391c5cf2e8c14653b33187be1f119ec556
-
Filesize
468KB
MD5d36d818047dc924c5298d6ea443f041c
SHA1d7f612bab64a64fcdf604343122629320a22bd3c
SHA2564ea75024080fdaa4b05b94887eb4e2ed7c8c76a4dcf895f99f6988ff25117bf2
SHA51226a4dd7bd1da5fe1faf2c535e8617c984381739b39fa499fabb6ae0906a3ac2392219a0e971430d8a8a3b8ceeccef0f64e99f18145433ea358220e36ff161731
-
Filesize
468KB
MD563f6b3aa6f9cd52c8db6fc1b58c3cf2b
SHA17eec2f35bdd032a8bfd256738e247c635f14a80e
SHA2561770575c749e30cd82cf6ed72fca2539123f1c71f4695d9ad5d2584cb4796a37
SHA512055523507f4770141164205641058085a7e370abab6d1fd830aa50370d5a1ff1283fd83949084e44d8a079b81127773f3cf5ef7916dd5c8c38ad436b3f049d53
-
Filesize
468KB
MD56b551db73b94c4c5e4f623e090f65e84
SHA119cc3f645eaf1a91fb2df6ba5577680f313aee28
SHA256fa553772b657752817305339d82cfbeb32195960c460d7c4fbcc2cc3c5d6b19c
SHA5123bd5c623ee7f28dda20ea0751945aa0124f1e9ef2245ac36b5f7e703033e28855655cc95eb1fa04f897e667874aa437bedfc03e04f9ea54eed6883c4c4ed81fd
-
Filesize
468KB
MD54676e556f1f63758427a763227512810
SHA11184b8e80a032cba79b42d953305fd1ee69a64a0
SHA25675379ce0d7710fc2bccb824186d910a62dbab8f9e5d445602b513b37c8626e08
SHA5121e2158a7b4df1a3ad9513952b3135a836340c72336b9b122f1b72113c04ce261b753d4218b20602430c2bd77a91c5ced67d91daef195f174021644b6bd851d27