Analysis

  • max time kernel
    119s
  • max time network
    17s
  • platform
    windows7_x64
  • resource
    win7-20240708-en
  • resource tags

    arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system
  • submitted
    05/08/2024, 10:38

General

  • Target

    7fd5adc8de3d581b1e6a4def98615850N.exe

  • Size

    468KB

  • MD5

    7fd5adc8de3d581b1e6a4def98615850

  • SHA1

    5f5664f9544f0220aeda444f9d75cb4ded19b756

  • SHA256

    482d3734754565ccb8720e761025016b2ed553bf3b3254e4b9df8d70aa0f421d

  • SHA512

    8eb9e04cff807a5a9de47b866eaa78dc89fd64e0ecce21b34e4ba5560980ab746a6667d05112bb89717987ad8b546eca151e20a41bca41f054a3922c34a2cd65

  • SSDEEP

    3072:fqmtVgsMjb8U2bY9Pz36rfc/YICKj7IpCNmHBvVpQBGSAmkfNzhl/:fqMVaYU2+PD6rf40t4BGXnfNz

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 39 IoCs
  • Loads dropped DLL 64 IoCs
  • Program crash 39 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 40 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 40 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\7fd5adc8de3d581b1e6a4def98615850N.exe
    "C:\Users\Admin\AppData\Local\Temp\7fd5adc8de3d581b1e6a4def98615850N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2372
    • C:\Users\Admin\AppData\Local\Temp\Unicorn-60338.exe
      C:\Users\Admin\AppData\Local\Temp\Unicorn-60338.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:1448
      • C:\Users\Admin\AppData\Local\Temp\Unicorn-26727.exe
        C:\Users\Admin\AppData\Local\Temp\Unicorn-26727.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2740
        • C:\Users\Admin\AppData\Local\Temp\Unicorn-22809.exe
          C:\Users\Admin\AppData\Local\Temp\Unicorn-22809.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2924
          • C:\Users\Admin\AppData\Local\Temp\Unicorn-38242.exe
            C:\Users\Admin\AppData\Local\Temp\Unicorn-38242.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2668
            • C:\Users\Admin\AppData\Local\Temp\Unicorn-41483.exe
              C:\Users\Admin\AppData\Local\Temp\Unicorn-41483.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:1108
              • C:\Users\Admin\AppData\Local\Temp\Unicorn-41649.exe
                C:\Users\Admin\AppData\Local\Temp\Unicorn-41649.exe
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:2888
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-17742.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-17742.exe
                  8⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:1844
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-21115.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-21115.exe
                    9⤵
                    • Executes dropped EXE
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of SetWindowsHookEx
                    PID:2232
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-12043.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-12043.exe
                      10⤵
                      • Executes dropped EXE
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of SetWindowsHookEx
                      PID:2028
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-45038.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-45038.exe
                        11⤵
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of SetWindowsHookEx
                        PID:2644
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-44327.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-44327.exe
                          12⤵
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          • Suspicious use of SetWindowsHookEx
                          PID:2008
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-14799.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-14799.exe
                            13⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            • Suspicious use of SetWindowsHookEx
                            PID:1788
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-30425.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-30425.exe
                              14⤵
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of SetWindowsHookEx
                              PID:3044
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-6086.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-6086.exe
                                15⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                • Suspicious use of SetWindowsHookEx
                                PID:1480
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-42096.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-42096.exe
                                  16⤵
                                  • Executes dropped EXE
                                  • System Location Discovery: System Language Discovery
                                  • Suspicious use of SetWindowsHookEx
                                  PID:1592
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-4436.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-4436.exe
                                    17⤵
                                    • Executes dropped EXE
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious use of SetWindowsHookEx
                                    PID:2568
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-60902.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-60902.exe
                                      18⤵
                                      • Executes dropped EXE
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious use of SetWindowsHookEx
                                      PID:2864
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-35459.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-35459.exe
                                        19⤵
                                        • Executes dropped EXE
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious use of SetWindowsHookEx
                                        PID:2660
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-15204.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-15204.exe
                                          20⤵
                                          • Executes dropped EXE
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious use of SetWindowsHookEx
                                          PID:1260
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-59574.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-59574.exe
                                            21⤵
                                            • Executes dropped EXE
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious use of SetWindowsHookEx
                                            PID:852
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-62755.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-62755.exe
                                              22⤵
                                              • Executes dropped EXE
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious use of SetWindowsHookEx
                                              PID:2952
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-21012.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-21012.exe
                                                23⤵
                                                • Executes dropped EXE
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious use of SetWindowsHookEx
                                                PID:1388
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-21334.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-21334.exe
                                                  24⤵
                                                  • Executes dropped EXE
                                                  • System Location Discovery: System Language Discovery
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:2236
                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-20431.exe
                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-20431.exe
                                                    25⤵
                                                    • Executes dropped EXE
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:2584
                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-46697.exe
                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-46697.exe
                                                      26⤵
                                                      • Executes dropped EXE
                                                      • System Location Discovery: System Language Discovery
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:2444
                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-22359.exe
                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-22359.exe
                                                        27⤵
                                                        • Executes dropped EXE
                                                        • System Location Discovery: System Language Discovery
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:1916
                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-64626.exe
                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-64626.exe
                                                          28⤵
                                                          • Executes dropped EXE
                                                          • System Location Discovery: System Language Discovery
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:2376
                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-8456.exe
                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-8456.exe
                                                            29⤵
                                                            • Executes dropped EXE
                                                            • System Location Discovery: System Language Discovery
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:2796
                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-1523.exe
                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-1523.exe
                                                              30⤵
                                                              • Executes dropped EXE
                                                              • System Location Discovery: System Language Discovery
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:2624
                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-26386.exe
                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-26386.exe
                                                                31⤵
                                                                • Executes dropped EXE
                                                                • System Location Discovery: System Language Discovery
                                                                • Suspicious use of SetWindowsHookEx
                                                                PID:1696
                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-35753.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-35753.exe
                                                                  32⤵
                                                                  • Executes dropped EXE
                                                                  • System Location Discovery: System Language Discovery
                                                                  • Suspicious use of SetWindowsHookEx
                                                                  PID:2292
                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-28820.exe
                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-28820.exe
                                                                    33⤵
                                                                    • Executes dropped EXE
                                                                    • System Location Discovery: System Language Discovery
                                                                    • Suspicious use of SetWindowsHookEx
                                                                    PID:1032
                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-30019.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-30019.exe
                                                                      34⤵
                                                                      • Executes dropped EXE
                                                                      • System Location Discovery: System Language Discovery
                                                                      • Suspicious use of SetWindowsHookEx
                                                                      PID:612
                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-5680.exe
                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-5680.exe
                                                                        35⤵
                                                                        • Executes dropped EXE
                                                                        • System Location Discovery: System Language Discovery
                                                                        • Suspicious use of SetWindowsHookEx
                                                                        PID:1724
                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-39780.exe
                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-39780.exe
                                                                          36⤵
                                                                          • Executes dropped EXE
                                                                          • System Location Discovery: System Language Discovery
                                                                          • Suspicious use of SetWindowsHookEx
                                                                          PID:2792
                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-61399.exe
                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-61399.exe
                                                                            37⤵
                                                                            • Executes dropped EXE
                                                                            • System Location Discovery: System Language Discovery
                                                                            • Suspicious use of SetWindowsHookEx
                                                                            PID:2244
                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-38130.exe
                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-38130.exe
                                                                              38⤵
                                                                              • Executes dropped EXE
                                                                              • System Location Discovery: System Language Discovery
                                                                              • Suspicious use of SetWindowsHookEx
                                                                              PID:2004
                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-42380.exe
                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-42380.exe
                                                                                39⤵
                                                                                • Executes dropped EXE
                                                                                • System Location Discovery: System Language Discovery
                                                                                • Suspicious use of SetWindowsHookEx
                                                                                PID:932
                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-64191.exe
                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-64191.exe
                                                                                  40⤵
                                                                                  • Executes dropped EXE
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                  PID:888
                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 932 -s 236
                                                                                  40⤵
                                                                                  • Program crash
                                                                                  PID:1956
                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 2004 -s 236
                                                                                39⤵
                                                                                • Program crash
                                                                                PID:1512
                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 2244 -s 236
                                                                              38⤵
                                                                              • Program crash
                                                                              PID:2364
                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 2792 -s 236
                                                                            37⤵
                                                                            • Program crash
                                                                            PID:2508
                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                          C:\Windows\SysWOW64\WerFault.exe -u -p 1724 -s 236
                                                                          36⤵
                                                                          • Program crash
                                                                          PID:2852
                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 612 -s 236
                                                                        35⤵
                                                                        • Program crash
                                                                        PID:2932
                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 1032 -s 236
                                                                      34⤵
                                                                      • Program crash
                                                                      PID:1152
                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 2292 -s 236
                                                                    33⤵
                                                                    • Program crash
                                                                    PID:3020
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 1696 -s 236
                                                                  32⤵
                                                                  • Program crash
                                                                  PID:1076
                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 2624 -s 236
                                                                31⤵
                                                                • Program crash
                                                                PID:1984
                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 2796 -s 236
                                                              30⤵
                                                              • Program crash
                                                              PID:1308
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 2376 -s 236
                                                            29⤵
                                                            • Program crash
                                                            PID:2720
                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                          C:\Windows\SysWOW64\WerFault.exe -u -p 1916 -s 236
                                                          28⤵
                                                          • Program crash
                                                          PID:2728
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 2444 -s 236
                                                        27⤵
                                                        • Program crash
                                                        PID:1596
                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 2584 -s 236
                                                      26⤵
                                                      • Program crash
                                                      PID:2896
                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 2236 -s 236
                                                    25⤵
                                                    • Program crash
                                                    PID:1816
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 1388 -s 236
                                                  24⤵
                                                  • Program crash
                                                  PID:916
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -u -p 2952 -s 236
                                                23⤵
                                                • Program crash
                                                PID:1988
                                            • C:\Windows\SysWOW64\WerFault.exe
                                              C:\Windows\SysWOW64\WerFault.exe -u -p 852 -s 236
                                              22⤵
                                              • Program crash
                                              PID:1676
                                          • C:\Windows\SysWOW64\WerFault.exe
                                            C:\Windows\SysWOW64\WerFault.exe -u -p 1260 -s 236
                                            21⤵
                                            • Program crash
                                            PID:988
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -u -p 2660 -s 236
                                          20⤵
                                          • Program crash
                                          PID:2780
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -u -p 2864 -s 236
                                        19⤵
                                        • Program crash
                                        PID:2352
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -u -p 2568 -s 236
                                      18⤵
                                      • Program crash
                                      PID:3068
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -u -p 1592 -s 236
                                    17⤵
                                    • Program crash
                                    PID:2824
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -u -p 1480 -s 236
                                  16⤵
                                  • Program crash
                                  PID:2384
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 3044 -s 236
                                15⤵
                                • Program crash
                                PID:2580
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 1788 -s 236
                              14⤵
                              • Program crash
                              PID:1660
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 2008 -s 236
                            13⤵
                            • Program crash
                            PID:2196
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 2644 -s 236
                          12⤵
                          • Program crash
                          PID:1060
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 2028 -s 236
                        11⤵
                        • Program crash
                        PID:1396
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 2232 -s 236
                      10⤵
                      • Program crash
                      PID:2484
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 1844 -s 236
                    9⤵
                    • Loads dropped DLL
                    • Program crash
                    PID:2120
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 2888 -s 236
                  8⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:3052
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 1108 -s 236
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:1312
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 2668 -s 236
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:2976
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2924 -s 236
            5⤵
            • Loads dropped DLL
            • Program crash
            PID:2772
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2740 -s 236
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:2356
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 1448 -s 236
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:2916
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2372 -s 236
      2⤵
      • Program crash
      PID:2836

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • C:\Users\Admin\AppData\Local\Temp\Unicorn-5680.exe

          Filesize

          468KB

          MD5

          2dcd49fe713c2bdced087f73dcae2bf6

          SHA1

          33a95ef4cc4061d378112f3b89a2595081a7b6bb

          SHA256

          06197a2ccf6425d9decfbacfdaab2ec93632958b7285aea77fb7bd9e3d741e4c

          SHA512

          a212499b5f9c60a1e9044042dc70db6612079e53c9ad99b9bd77373ef319103cf22b5cdeb70200295f1b9b394ce034a8a0c198869858a658dd7e09459e4e7609

        • \Users\Admin\AppData\Local\Temp\Unicorn-17742.exe

          Filesize

          468KB

          MD5

          1a3cbdbed98ba4b9c9e689bae21eba6a

          SHA1

          8938be66cbc242841c6065fa99ff0756e03b8809

          SHA256

          6ceeb314af4dbd1da81bf0ae123fe56fe8efa3e125814cbdad41f40647d547b5

          SHA512

          1065d87c6b95172a3999d2a5dda7cf48d3065c36c804be8928d23f2f59081fe105034139dbc5087c470bf8ddd83e5ecac520256423f784cb1fa61e867b8696a3

        • \Users\Admin\AppData\Local\Temp\Unicorn-22809.exe

          Filesize

          468KB

          MD5

          2a1ab5bd467f69f8fa7952379579c1e5

          SHA1

          6ddb0b3e2c624f35b45315c0bdb91cb48a6e446c

          SHA256

          3f9c6d90246f2f4621c36f1efbffe7aa04cc2712f7a8a36b723aa2e6a982d357

          SHA512

          a4403ac16be5161a97c2abe8c4078d16aed2876e9d905339886dc460c83f46d31d10e34a7ed53da565c915edddf19bc6b6549c6991b9c9261444acb74f039174

        • \Users\Admin\AppData\Local\Temp\Unicorn-26727.exe

          Filesize

          468KB

          MD5

          ad221d87c8bb0ff0c506d59962ebddf2

          SHA1

          41d7bb2a0b71b5d0902772bb2f6307e41a2c9240

          SHA256

          d980aba79aee31b6e36970674b47d3737f4e747572be860f15bd08ef221662f1

          SHA512

          cb23aa97165e92b5edb4a3cd2749aa6f0f1ec53fa474b6ca924aa4e85a8be4ef863cbd6bbe72655936bedb1345a002391c5cf2e8c14653b33187be1f119ec556

        • \Users\Admin\AppData\Local\Temp\Unicorn-38242.exe

          Filesize

          468KB

          MD5

          d36d818047dc924c5298d6ea443f041c

          SHA1

          d7f612bab64a64fcdf604343122629320a22bd3c

          SHA256

          4ea75024080fdaa4b05b94887eb4e2ed7c8c76a4dcf895f99f6988ff25117bf2

          SHA512

          26a4dd7bd1da5fe1faf2c535e8617c984381739b39fa499fabb6ae0906a3ac2392219a0e971430d8a8a3b8ceeccef0f64e99f18145433ea358220e36ff161731

        • \Users\Admin\AppData\Local\Temp\Unicorn-41483.exe

          Filesize

          468KB

          MD5

          63f6b3aa6f9cd52c8db6fc1b58c3cf2b

          SHA1

          7eec2f35bdd032a8bfd256738e247c635f14a80e

          SHA256

          1770575c749e30cd82cf6ed72fca2539123f1c71f4695d9ad5d2584cb4796a37

          SHA512

          055523507f4770141164205641058085a7e370abab6d1fd830aa50370d5a1ff1283fd83949084e44d8a079b81127773f3cf5ef7916dd5c8c38ad436b3f049d53

        • \Users\Admin\AppData\Local\Temp\Unicorn-41649.exe

          Filesize

          468KB

          MD5

          6b551db73b94c4c5e4f623e090f65e84

          SHA1

          19cc3f645eaf1a91fb2df6ba5577680f313aee28

          SHA256

          fa553772b657752817305339d82cfbeb32195960c460d7c4fbcc2cc3c5d6b19c

          SHA512

          3bd5c623ee7f28dda20ea0751945aa0124f1e9ef2245ac36b5f7e703033e28855655cc95eb1fa04f897e667874aa437bedfc03e04f9ea54eed6883c4c4ed81fd

        • \Users\Admin\AppData\Local\Temp\Unicorn-60338.exe

          Filesize

          468KB

          MD5

          4676e556f1f63758427a763227512810

          SHA1

          1184b8e80a032cba79b42d953305fd1ee69a64a0

          SHA256

          75379ce0d7710fc2bccb824186d910a62dbab8f9e5d445602b513b37c8626e08

          SHA512

          1e2158a7b4df1a3ad9513952b3135a836340c72336b9b122f1b72113c04ce261b753d4218b20602430c2bd77a91c5ced67d91daef195f174021644b6bd851d27

        • memory/612-384-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/852-252-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/852-261-0x0000000002640000-0x00000000026B5000-memory.dmp

          Filesize

          468KB

        • memory/852-263-0x0000000002640000-0x00000000026B5000-memory.dmp

          Filesize

          468KB

        • memory/1032-374-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/1032-383-0x0000000002390000-0x0000000002405000-memory.dmp

          Filesize

          468KB

        • memory/1108-99-0x00000000023D0000-0x0000000002445000-memory.dmp

          Filesize

          468KB

        • memory/1108-85-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/1260-244-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/1260-251-0x0000000000480000-0x00000000004F5000-memory.dmp

          Filesize

          468KB

        • memory/1260-250-0x0000000000480000-0x00000000004F5000-memory.dmp

          Filesize

          468KB

        • memory/1388-282-0x0000000002630000-0x00000000026A5000-memory.dmp

          Filesize

          468KB

        • memory/1388-274-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/1388-281-0x0000000002630000-0x00000000026A5000-memory.dmp

          Filesize

          468KB

        • memory/1448-371-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/1448-13-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/1448-20-0x00000000025A0000-0x0000000002615000-memory.dmp

          Filesize

          468KB

        • memory/1480-200-0x0000000001D60000-0x0000000001DD5000-memory.dmp

          Filesize

          468KB

        • memory/1480-201-0x0000000001D60000-0x0000000001DD5000-memory.dmp

          Filesize

          468KB

        • memory/1480-193-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/1592-213-0x00000000024F0000-0x0000000002565000-memory.dmp

          Filesize

          468KB

        • memory/1592-202-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/1592-212-0x00000000024F0000-0x0000000002565000-memory.dmp

          Filesize

          468KB

        • memory/1696-354-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/1696-362-0x0000000001CC0000-0x0000000001D35000-memory.dmp

          Filesize

          468KB

        • memory/1696-363-0x0000000001CC0000-0x0000000001D35000-memory.dmp

          Filesize

          468KB

        • memory/1724-403-0x0000000002790000-0x0000000002805000-memory.dmp

          Filesize

          468KB

        • memory/1724-401-0x0000000002790000-0x0000000002805000-memory.dmp

          Filesize

          468KB

        • memory/1724-391-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/1788-174-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/1788-183-0x0000000003300000-0x0000000003375000-memory.dmp

          Filesize

          468KB

        • memory/1788-182-0x0000000003300000-0x0000000003375000-memory.dmp

          Filesize

          468KB

        • memory/1844-126-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/1916-323-0x0000000001D90000-0x0000000001E05000-memory.dmp

          Filesize

          468KB

        • memory/1916-322-0x0000000001D90000-0x0000000001E05000-memory.dmp

          Filesize

          468KB

        • memory/1916-314-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/2008-172-0x0000000001C40000-0x0000000001CB5000-memory.dmp

          Filesize

          468KB

        • memory/2008-162-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/2008-173-0x0000000001C40000-0x0000000001CB5000-memory.dmp

          Filesize

          468KB

        • memory/2028-151-0x0000000000480000-0x00000000004F5000-memory.dmp

          Filesize

          468KB

        • memory/2028-144-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/2232-142-0x00000000033C0000-0x0000000003435000-memory.dmp

          Filesize

          468KB

        • memory/2232-135-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/2236-290-0x0000000000480000-0x00000000004F5000-memory.dmp

          Filesize

          468KB

        • memory/2236-291-0x0000000000480000-0x00000000004F5000-memory.dmp

          Filesize

          468KB

        • memory/2236-284-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/2244-413-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/2292-364-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/2372-375-0x0000000002400000-0x0000000002475000-memory.dmp

          Filesize

          468KB

        • memory/2372-0-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/2372-11-0x0000000002400000-0x0000000002475000-memory.dmp

          Filesize

          468KB

        • memory/2372-370-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/2372-12-0x0000000002400000-0x0000000002475000-memory.dmp

          Filesize

          468KB

        • memory/2376-333-0x0000000002700000-0x0000000002775000-memory.dmp

          Filesize

          468KB

        • memory/2376-332-0x0000000002700000-0x0000000002775000-memory.dmp

          Filesize

          468KB

        • memory/2376-324-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/2444-313-0x0000000000830000-0x00000000008A5000-memory.dmp

          Filesize

          468KB

        • memory/2444-304-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/2444-312-0x0000000000830000-0x00000000008A5000-memory.dmp

          Filesize

          468KB

        • memory/2568-214-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/2568-220-0x0000000000480000-0x00000000004F5000-memory.dmp

          Filesize

          468KB

        • memory/2568-221-0x0000000000480000-0x00000000004F5000-memory.dmp

          Filesize

          468KB

        • memory/2584-292-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/2584-302-0x0000000002490000-0x0000000002505000-memory.dmp

          Filesize

          468KB

        • memory/2584-303-0x0000000002490000-0x0000000002505000-memory.dmp

          Filesize

          468KB

        • memory/2624-344-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/2624-353-0x00000000033C0000-0x0000000003435000-memory.dmp

          Filesize

          468KB

        • memory/2624-352-0x00000000033C0000-0x0000000003435000-memory.dmp

          Filesize

          468KB

        • memory/2644-161-0x00000000033E0000-0x0000000003455000-memory.dmp

          Filesize

          468KB

        • memory/2644-153-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/2644-160-0x00000000033E0000-0x0000000003455000-memory.dmp

          Filesize

          468KB

        • memory/2660-240-0x00000000026B0000-0x0000000002725000-memory.dmp

          Filesize

          468KB

        • memory/2660-234-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/2660-242-0x00000000026B0000-0x0000000002725000-memory.dmp

          Filesize

          468KB

        • memory/2668-83-0x0000000002690000-0x0000000002705000-memory.dmp

          Filesize

          468KB

        • memory/2668-65-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/2740-390-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/2740-43-0x0000000000480000-0x00000000004F5000-memory.dmp

          Filesize

          468KB

        • memory/2740-394-0x0000000000480000-0x00000000004F5000-memory.dmp

          Filesize

          468KB

        • memory/2792-404-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/2796-334-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/2796-343-0x0000000000480000-0x00000000004F5000-memory.dmp

          Filesize

          468KB

        • memory/2796-342-0x0000000000480000-0x00000000004F5000-memory.dmp

          Filesize

          468KB

        • memory/2864-222-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/2864-232-0x00000000033C0000-0x0000000003435000-memory.dmp

          Filesize

          468KB

        • memory/2864-233-0x00000000033C0000-0x0000000003435000-memory.dmp

          Filesize

          468KB

        • memory/2888-123-0x0000000001CC0000-0x0000000001D35000-memory.dmp

          Filesize

          468KB

        • memory/2924-63-0x0000000002510000-0x0000000002585000-memory.dmp

          Filesize

          468KB

        • memory/2924-411-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/2924-45-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/2952-272-0x0000000000530000-0x00000000005A5000-memory.dmp

          Filesize

          468KB

        • memory/2952-264-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/2952-270-0x0000000000530000-0x00000000005A5000-memory.dmp

          Filesize

          468KB

        • memory/3044-190-0x00000000025B0000-0x0000000002625000-memory.dmp

          Filesize

          468KB

        • memory/3044-191-0x00000000025B0000-0x0000000002625000-memory.dmp

          Filesize

          468KB

        • memory/3044-184-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB