Analysis
-
max time kernel
147s -
max time network
123s -
platform
windows7_x64 -
resource
win7-20240708-en -
resource tags
arch:x64arch:x86image:win7-20240708-enlocale:en-usos:windows7-x64system -
submitted
03-09-2024 23:14
Static task
static1
Behavioral task
behavioral1
Sample
70b4f5765edc8b6a2e22ae135a1a0c29b9a605b19ff0e24ff0f9082e00ee51ff.exe
Resource
win7-20240708-en
Behavioral task
behavioral2
Sample
70b4f5765edc8b6a2e22ae135a1a0c29b9a605b19ff0e24ff0f9082e00ee51ff.exe
Resource
win10v2004-20240802-en
General
-
Target
70b4f5765edc8b6a2e22ae135a1a0c29b9a605b19ff0e24ff0f9082e00ee51ff.exe
-
Size
468KB
-
MD5
6041dde9e1e634189650bd70458f741f
-
SHA1
5d7075a58d58ba8ad6aceb7c36365df8a6943b37
-
SHA256
70b4f5765edc8b6a2e22ae135a1a0c29b9a605b19ff0e24ff0f9082e00ee51ff
-
SHA512
af0a90609684327b736dc2bca0d5307bbf40b918b4dcc7c5e3e1cd65ecf03649e0a500e3c1caa7791070f58cc5ee4614a7f02b2e8930177526c1778177caf490
-
SSDEEP
3072:MTANoSKVI95UCbY2PzPjcf8/PrMDRgpwVmHeefsampN8XrUukflB:MTqow7UClP7jcfRcQwmpi7Uuk
Malware Config
Signatures
-
Executes dropped EXE 54 IoCs
pid Process 2708 Unicorn-14428.exe 2796 Unicorn-63484.exe 2664 Unicorn-59483.exe 3028 Unicorn-11434.exe 1492 Unicorn-42436.exe 2180 Unicorn-59924.exe 2080 Unicorn-13484.exe 2144 Unicorn-44294.exe 1980 Unicorn-22888.exe 3012 Unicorn-23163.exe 1296 Unicorn-53972.exe 2276 Unicorn-36458.exe 2280 Unicorn-20169.exe 2964 Unicorn-33573.exe 604 Unicorn-64574.exe 1680 Unicorn-60573.exe 796 Unicorn-39743.exe 1560 Unicorn-21412.exe 2500 Unicorn-13326.exe 1916 Unicorn-57457.exe 2476 Unicorn-45288.exe 696 Unicorn-54800.exe 1288 Unicorn-3700.exe 1504 Unicorn-30426.exe 1576 Unicorn-851.exe 2840 Unicorn-54219.exe 2764 Unicorn-50026.exe 2616 Unicorn-47058.exe 2644 Unicorn-34889.exe 348 Unicorn-5314.exe 2024 Unicorn-1313.exe 2172 Unicorn-54873.exe 1080 Unicorn-25299.exe 1960 Unicorn-9009.exe 2428 Unicorn-62377.exe 2892 Unicorn-32803.exe 2884 Unicorn-28802.exe 2580 Unicorn-65340.exe 760 Unicorn-40883.exe 1536 Unicorn-40966.exe 2940 Unicorn-11391.exe 1296 Unicorn-38117.exe 2260 Unicorn-26140.exe 1476 Unicorn-10358.exe 2280 Unicorn-23172.exe 1100 Unicorn-613.exe 1752 Unicorn-11002.exe 408 Unicorn-19171.exe 1252 Unicorn-7001.exe 1520 Unicorn-45896.exe 756 Unicorn-24298.exe 1556 Unicorn-42964.exe 344 Unicorn-51023.exe 1032 Unicorn-55107.exe -
Loads dropped DLL 64 IoCs
pid Process 2856 70b4f5765edc8b6a2e22ae135a1a0c29b9a605b19ff0e24ff0f9082e00ee51ff.exe 2856 70b4f5765edc8b6a2e22ae135a1a0c29b9a605b19ff0e24ff0f9082e00ee51ff.exe 2708 Unicorn-14428.exe 2708 Unicorn-14428.exe 2796 Unicorn-63484.exe 2796 Unicorn-63484.exe 2664 Unicorn-59483.exe 2664 Unicorn-59483.exe 3028 Unicorn-11434.exe 3028 Unicorn-11434.exe 1492 Unicorn-42436.exe 1492 Unicorn-42436.exe 2180 Unicorn-59924.exe 2180 Unicorn-59924.exe 2080 Unicorn-13484.exe 2080 Unicorn-13484.exe 2144 Unicorn-44294.exe 2144 Unicorn-44294.exe 1980 Unicorn-22888.exe 1980 Unicorn-22888.exe 3012 Unicorn-23163.exe 3012 Unicorn-23163.exe 1296 Unicorn-53972.exe 1296 Unicorn-53972.exe 2276 Unicorn-36458.exe 2276 Unicorn-36458.exe 2280 Unicorn-20169.exe 2280 Unicorn-20169.exe 2964 Unicorn-33573.exe 2964 Unicorn-33573.exe 604 Unicorn-64574.exe 604 Unicorn-64574.exe 1680 Unicorn-60573.exe 1680 Unicorn-60573.exe 796 Unicorn-39743.exe 796 Unicorn-39743.exe 1560 Unicorn-21412.exe 1560 Unicorn-21412.exe 2500 Unicorn-13326.exe 2500 Unicorn-13326.exe 1916 Unicorn-57457.exe 1916 Unicorn-57457.exe 2476 Unicorn-45288.exe 2476 Unicorn-45288.exe 696 Unicorn-54800.exe 696 Unicorn-54800.exe 1288 Unicorn-3700.exe 1288 Unicorn-3700.exe 1504 Unicorn-30426.exe 1504 Unicorn-30426.exe 1576 Unicorn-851.exe 1576 Unicorn-851.exe 2840 Unicorn-54219.exe 2840 Unicorn-54219.exe 2764 Unicorn-50026.exe 2764 Unicorn-50026.exe 2616 Unicorn-47058.exe 2616 Unicorn-47058.exe 2644 Unicorn-34889.exe 2644 Unicorn-34889.exe 348 Unicorn-5314.exe 348 Unicorn-5314.exe 2024 Unicorn-1313.exe 2024 Unicorn-1313.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2792 2856 WerFault.exe 29 -
System Location Discovery: System Language Discovery 1 TTPs 55 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-59483.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-22888.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-28802.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-40966.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-10358.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-24298.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-14428.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-63484.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-54873.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-59924.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-53972.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-9009.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-7001.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-44294.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-33573.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-64574.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-851.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-47058.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-26140.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-42436.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-54800.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-3700.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-51023.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 70b4f5765edc8b6a2e22ae135a1a0c29b9a605b19ff0e24ff0f9082e00ee51ff.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-21412.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-45288.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-34889.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-45896.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-42964.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-11434.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-20169.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-11391.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-19171.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-1313.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-62377.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-40883.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-36458.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-5314.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-25299.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-13326.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-50026.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-32803.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-55107.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-57457.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-54219.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-13484.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-23172.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-60573.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-30426.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-11002.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-23163.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-39743.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-65340.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-38117.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-613.exe -
Suspicious use of SetWindowsHookEx 55 IoCs
pid Process 2856 70b4f5765edc8b6a2e22ae135a1a0c29b9a605b19ff0e24ff0f9082e00ee51ff.exe 2708 Unicorn-14428.exe 2796 Unicorn-63484.exe 2664 Unicorn-59483.exe 3028 Unicorn-11434.exe 1492 Unicorn-42436.exe 2180 Unicorn-59924.exe 2080 Unicorn-13484.exe 2144 Unicorn-44294.exe 1980 Unicorn-22888.exe 3012 Unicorn-23163.exe 1296 Unicorn-53972.exe 2276 Unicorn-36458.exe 2280 Unicorn-20169.exe 2964 Unicorn-33573.exe 604 Unicorn-64574.exe 1680 Unicorn-60573.exe 796 Unicorn-39743.exe 1560 Unicorn-21412.exe 2500 Unicorn-13326.exe 1916 Unicorn-57457.exe 2476 Unicorn-45288.exe 696 Unicorn-54800.exe 1288 Unicorn-3700.exe 1504 Unicorn-30426.exe 1576 Unicorn-851.exe 2840 Unicorn-54219.exe 2764 Unicorn-50026.exe 2616 Unicorn-47058.exe 2644 Unicorn-34889.exe 348 Unicorn-5314.exe 2024 Unicorn-1313.exe 2172 Unicorn-54873.exe 1080 Unicorn-25299.exe 1960 Unicorn-9009.exe 2428 Unicorn-62377.exe 2892 Unicorn-32803.exe 2884 Unicorn-28802.exe 2580 Unicorn-65340.exe 760 Unicorn-40883.exe 1536 Unicorn-40966.exe 2940 Unicorn-11391.exe 1296 Unicorn-38117.exe 2260 Unicorn-26140.exe 1476 Unicorn-10358.exe 2280 Unicorn-23172.exe 1100 Unicorn-613.exe 1752 Unicorn-11002.exe 408 Unicorn-19171.exe 1252 Unicorn-7001.exe 1520 Unicorn-45896.exe 756 Unicorn-24298.exe 1556 Unicorn-42964.exe 344 Unicorn-51023.exe 1032 Unicorn-55107.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2856 wrote to memory of 2708 2856 70b4f5765edc8b6a2e22ae135a1a0c29b9a605b19ff0e24ff0f9082e00ee51ff.exe 30 PID 2856 wrote to memory of 2708 2856 70b4f5765edc8b6a2e22ae135a1a0c29b9a605b19ff0e24ff0f9082e00ee51ff.exe 30 PID 2856 wrote to memory of 2708 2856 70b4f5765edc8b6a2e22ae135a1a0c29b9a605b19ff0e24ff0f9082e00ee51ff.exe 30 PID 2856 wrote to memory of 2708 2856 70b4f5765edc8b6a2e22ae135a1a0c29b9a605b19ff0e24ff0f9082e00ee51ff.exe 30 PID 2856 wrote to memory of 2792 2856 70b4f5765edc8b6a2e22ae135a1a0c29b9a605b19ff0e24ff0f9082e00ee51ff.exe 31 PID 2856 wrote to memory of 2792 2856 70b4f5765edc8b6a2e22ae135a1a0c29b9a605b19ff0e24ff0f9082e00ee51ff.exe 31 PID 2856 wrote to memory of 2792 2856 70b4f5765edc8b6a2e22ae135a1a0c29b9a605b19ff0e24ff0f9082e00ee51ff.exe 31 PID 2856 wrote to memory of 2792 2856 70b4f5765edc8b6a2e22ae135a1a0c29b9a605b19ff0e24ff0f9082e00ee51ff.exe 31 PID 2708 wrote to memory of 2796 2708 Unicorn-14428.exe 32 PID 2708 wrote to memory of 2796 2708 Unicorn-14428.exe 32 PID 2708 wrote to memory of 2796 2708 Unicorn-14428.exe 32 PID 2708 wrote to memory of 2796 2708 Unicorn-14428.exe 32 PID 2796 wrote to memory of 2664 2796 Unicorn-63484.exe 33 PID 2796 wrote to memory of 2664 2796 Unicorn-63484.exe 33 PID 2796 wrote to memory of 2664 2796 Unicorn-63484.exe 33 PID 2796 wrote to memory of 2664 2796 Unicorn-63484.exe 33 PID 2664 wrote to memory of 3028 2664 Unicorn-59483.exe 34 PID 2664 wrote to memory of 3028 2664 Unicorn-59483.exe 34 PID 2664 wrote to memory of 3028 2664 Unicorn-59483.exe 34 PID 2664 wrote to memory of 3028 2664 Unicorn-59483.exe 34 PID 3028 wrote to memory of 1492 3028 Unicorn-11434.exe 35 PID 3028 wrote to memory of 1492 3028 Unicorn-11434.exe 35 PID 3028 wrote to memory of 1492 3028 Unicorn-11434.exe 35 PID 3028 wrote to memory of 1492 3028 Unicorn-11434.exe 35 PID 1492 wrote to memory of 2180 1492 Unicorn-42436.exe 36 PID 1492 wrote to memory of 2180 1492 Unicorn-42436.exe 36 PID 1492 wrote to memory of 2180 1492 Unicorn-42436.exe 36 PID 1492 wrote to memory of 2180 1492 Unicorn-42436.exe 36 PID 2180 wrote to memory of 2080 2180 Unicorn-59924.exe 37 PID 2180 wrote to memory of 2080 2180 Unicorn-59924.exe 37 PID 2180 wrote to memory of 2080 2180 Unicorn-59924.exe 37 PID 2180 wrote to memory of 2080 2180 Unicorn-59924.exe 37 PID 2080 wrote to memory of 2144 2080 Unicorn-13484.exe 38 PID 2080 wrote to memory of 2144 2080 Unicorn-13484.exe 38 PID 2080 wrote to memory of 2144 2080 Unicorn-13484.exe 38 PID 2080 wrote to memory of 2144 2080 Unicorn-13484.exe 38 PID 2144 wrote to memory of 1980 2144 Unicorn-44294.exe 40 PID 2144 wrote to memory of 1980 2144 Unicorn-44294.exe 40 PID 2144 wrote to memory of 1980 2144 Unicorn-44294.exe 40 PID 2144 wrote to memory of 1980 2144 Unicorn-44294.exe 40 PID 1980 wrote to memory of 3012 1980 Unicorn-22888.exe 41 PID 1980 wrote to memory of 3012 1980 Unicorn-22888.exe 41 PID 1980 wrote to memory of 3012 1980 Unicorn-22888.exe 41 PID 1980 wrote to memory of 3012 1980 Unicorn-22888.exe 41 PID 3012 wrote to memory of 1296 3012 Unicorn-23163.exe 42 PID 3012 wrote to memory of 1296 3012 Unicorn-23163.exe 42 PID 3012 wrote to memory of 1296 3012 Unicorn-23163.exe 42 PID 3012 wrote to memory of 1296 3012 Unicorn-23163.exe 42 PID 1296 wrote to memory of 2276 1296 Unicorn-53972.exe 43 PID 1296 wrote to memory of 2276 1296 Unicorn-53972.exe 43 PID 1296 wrote to memory of 2276 1296 Unicorn-53972.exe 43 PID 1296 wrote to memory of 2276 1296 Unicorn-53972.exe 43 PID 2276 wrote to memory of 2280 2276 Unicorn-36458.exe 44 PID 2276 wrote to memory of 2280 2276 Unicorn-36458.exe 44 PID 2276 wrote to memory of 2280 2276 Unicorn-36458.exe 44 PID 2276 wrote to memory of 2280 2276 Unicorn-36458.exe 44 PID 2280 wrote to memory of 2964 2280 Unicorn-20169.exe 45 PID 2280 wrote to memory of 2964 2280 Unicorn-20169.exe 45 PID 2280 wrote to memory of 2964 2280 Unicorn-20169.exe 45 PID 2280 wrote to memory of 2964 2280 Unicorn-20169.exe 45 PID 2964 wrote to memory of 604 2964 Unicorn-33573.exe 46 PID 2964 wrote to memory of 604 2964 Unicorn-33573.exe 46 PID 2964 wrote to memory of 604 2964 Unicorn-33573.exe 46 PID 2964 wrote to memory of 604 2964 Unicorn-33573.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\70b4f5765edc8b6a2e22ae135a1a0c29b9a605b19ff0e24ff0f9082e00ee51ff.exe"C:\Users\Admin\AppData\Local\Temp\70b4f5765edc8b6a2e22ae135a1a0c29b9a605b19ff0e24ff0f9082e00ee51ff.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2856 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14428.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14428.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2708 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-63484.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63484.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2796 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-59483.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59483.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2664 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11434.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11434.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3028 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-42436.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42436.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1492 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-59924.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59924.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2180 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13484.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13484.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-44294.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-44294.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2144 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22888.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22888.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1980 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23163.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23163.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3012 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-53972.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53972.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1296 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-36458.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-36458.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2276 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-20169.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20169.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-33573.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33573.exe15⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2964 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-64574.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-64574.exe16⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:604 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-60573.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-60573.exe17⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1680 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-39743.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39743.exe18⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:796 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-21412.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-21412.exe19⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1560 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-13326.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-13326.exe20⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2500 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-57457.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-57457.exe21⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1916 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45288.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45288.exe22⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2476 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54800.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54800.exe23⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:696 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-3700.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-3700.exe24⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1288 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-30426.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-30426.exe25⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1504 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-851.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-851.exe26⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1576 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54219.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54219.exe27⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2840 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50026.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50026.exe28⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2764 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47058.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47058.exe29⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2616 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34889.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34889.exe30⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2644 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5314.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5314.exe31⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:348 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-1313.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-1313.exe32⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2024 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54873.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54873.exe33⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2172 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-25299.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25299.exe34⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1080 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-9009.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-9009.exe35⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1960 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-62377.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-62377.exe36⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2428 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-32803.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-32803.exe37⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2892 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-28802.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-28802.exe38⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2884 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-65340.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65340.exe39⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2580 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40883.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40883.exe40⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:760 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40966.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40966.exe41⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1536 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11391.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11391.exe42⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-38117.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-38117.exe43⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1296 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-26140.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-26140.exe44⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2260 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23172.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23172.exe45⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2280 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11002.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11002.exe46⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1752 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-7001.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7001.exe47⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1252 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-42964.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42964.exe48⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-55107.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55107.exe49⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1032
-
-
-
-
-
-
-
-
C:\Users\Admin\AppData\Local\Temp\Unicorn-10358.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10358.exe43⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1476 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-613.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-613.exe44⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1100 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-19171.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19171.exe45⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:408 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45896.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45896.exe46⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1520 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-24298.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-24298.exe47⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:756 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51023.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51023.exe48⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:344
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2856 -s 2362⤵
- Program crash
PID:2792
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
468KB
MD53b34b122758962205b1c2cb40b909560
SHA1d751a5e7c5711653df4b603aacd1a383da0ebf1c
SHA2567493d870a67ea9f3c95f57659b8da1f9792add624322ca13cb840d76ef55839b
SHA512dab4ec51d353200bfbff581f0daa9290f1d69f7e5f1ad5f6751c3143642e28890c1fde643d04b9123cd8cc96bef6a188d9985e86faa5ec17c6a432e2d8d196b4
-
Filesize
468KB
MD55b8b25b83ba9ab37c82ab4c0c2169d05
SHA16d0e99721606863d6cacc3f5f086ea0817abc362
SHA256e380dcd3b07ff91218afaf4ebd189c72f9b0dcaad4436babaa1062d29ac9c7f7
SHA5121fdca8abcf4828979afe88284b06a4f2413dc1f3e9577e13577125c0041c438a81f91ccaf4ffb4e439a3d5192aefaee56adadd0498f63c01719258f5c58e70c9
-
Filesize
468KB
MD5bd8c1eb760f6fa11e4078b16f69eae69
SHA11dd66441fa49e394870ad63f2bff21979f716f1e
SHA256c2702f53b3f17f45bbc18593bf727924f964362f37c14883318a93c15fc8d80e
SHA5124af1f869895f274944a61a3c9231a7a414f23776fe59fc0c409feeaa66de1e585d916c8d58d461b6bb63741239a3fd61dd912d74326e996ac9eec1dbb6631337
-
Filesize
468KB
MD5dc76fb14909ebd7d192fa0f07b296143
SHA159d0cc5ecabeeaa97120947db208379a27ae60a8
SHA25694644bd205c854965a2fd6814ea9278a9077e7b2719c91374323dfac15646fdf
SHA512bf9cbd6e15bbe2190ef3274b1bf17ce783aa8ddaa3eab7d5d3a34a4810fce9ecc1be84940886c7a9570db3ec3e54d42dd4ee8b468e9f4c781811cf015a2ac0f0
-
Filesize
468KB
MD5ddb10f554fdfee93592f033440d99873
SHA170fbbd137a402147d92b2400937dae0f4e333653
SHA256864165654c1cb289911ccc7d078c02c176f0c4c97d875adb9e5cdb6fdf272c00
SHA51227070a206c9ed566c9fc601e9a170b07ec98b715f66ae13252e86407bf82b65cf75a2d502d840d032397a2e9fc8e4f9324c7e9c99389e825a21ffcb3c97620d3
-
Filesize
468KB
MD51752f6496c4520f3482cd73b7c7e484c
SHA1ce74cd93085b88848948c349fd010d92018a9b21
SHA256b6d5db5d5afefea8d6a86c3fc07798a2307d73d543a398eef5a4a49f584098b6
SHA512ecdf8637360244fde829c759a02f1674dab4fc523382d0c0e63f0efceb3032c9b8573d307bfceb295c6159021102c88195745b24c9c994f53c48a07519a69178
-
Filesize
468KB
MD58878ea91dac47c4d996d9a2890f80c1b
SHA1f5d5c8992e44896addd8947d1bee07fc7b165caa
SHA25619d11a9b237c0f64ac12a4012cd9a9f535c1504773e971f5152444a66f4e1570
SHA5127bb085e65c47353d6e2eae4d071147a6f46632c9f36df64995a32cd8d3c1549078b900dccc46d55260479833f90fbe90c8e9a7e23f17e774e895625e458301e4
-
Filesize
468KB
MD539c332a4b2c93e6515b4589cc4ba5e06
SHA1a0ba50f51518b23cac9612ff6e93e45ca55988a8
SHA256c353de59ed764ecdd72154496dad9e4bf80a9aa7e593c5df3febfe44ecbd0b1d
SHA512ddacdfe811c2836ab687bd9526923b4920febcd8e6107c3d686eb7a3c22daa083b53bc720e9954ddfccb45563d517822c965db7fca891d18c75d09bf5006f538
-
Filesize
468KB
MD5ab197e037b63f552546faae42f69cb9e
SHA1046e3a2cd2d84e01471e8eb7063f4d5750f2fbc7
SHA256bbc8715fc97384c601c0e53034f8b00ef8ab1c94042ee9af96dd1fbcffb08bd6
SHA512a8e8218f28c4bb2de7c02fdd8c98bbc26d1356e7f7937cb6a87cf351ad849ba5a8a667c521f5ee92acd433686296eccd4a287546b642e2d4cc8acd169cef39e1
-
Filesize
468KB
MD5d8fd6e0d046d5b921a20004a80d37400
SHA15ab31a11deeebc232ed9a411211165a0a1a11659
SHA2566e471a468642f178d407fdd64af8cb5caa5ab81d8dd01dde5dec71e93a984936
SHA512707c95dfdd1705fcaf9bcc7d59f0ba2c1db6fd1c06fa76cc7e8b7aff3cd40646ff25cbff647561c6984dfcba1c8ab12df4905d8476b4dc7598d02d5556fc38d0
-
Filesize
468KB
MD55dc43565dc6a02ec21b745440cce0974
SHA16c8b02a37ed7955a37b30ed8ab0c41a6ea72216e
SHA256464a403c337cf654cc8c758060cd65e90dcb1ef820af9a1ce20ef92a05f39593
SHA51278169043964019c3537063e64fddd6322960d147cded17aa02e5efa5ca3de6e4901ab5996f6f420429e9249e011bcd8b6bde65f6c6341183cecfb531b6b60bc0
-
Filesize
468KB
MD542ff23351e8b37f0225cc15ea2106e00
SHA18e6bf8ef7d0a419de46aa94498064cd3d273fa8d
SHA256a766c783dc9200a2a4e6f61f1ea9d704457dd28e28ed07d188ef0fff6651fc26
SHA5121f3dbe507fa24fb3112369a97763df5751f68da6b923ff577bdcccb43ba041c03a08c29d31f3116aeb0e9889a6b5d9f2bd28a63af93c243b08322003bc2a8aa8
-
Filesize
468KB
MD52f7ec6a3e92d7b6d20f077c0b31ba9e0
SHA18a43fd0f86eed9ae0baf7d28c5358a967378c9ee
SHA256e21ac8422e96c4a1f93d7d3fb31825dff5d7193a23c27d95abc0ed4845bb8cc0
SHA512b6e9f02789ea6ea3dc214ff14fc12b60af5ec892d94ef08b37950855ca6a2bd42bc898b69accf3587889ccbd83beef98f6506084212e08a696ac1592780b1fa7
-
Filesize
468KB
MD5aea83aa0949985c66a9083fd2a47f577
SHA15a9b4edf2ba3fd858a926c4ff43c9719d84a9fd6
SHA256f1fdc3f9aaca9e8d17cea3d48301f24b87d098440255c0e86163f166f72af621
SHA5122505a0a1cc4a57f99c588da83597fbd42e693868ce85c4e6d3f86582d7d1b502d70f2336c555bc1040335255188dd0485ad1b6bd58018c151db758efbc44a670
-
Filesize
468KB
MD5cffd34792c8895d815d788fc91a5e734
SHA14aaace08fd272b280331c87ea048315eaffbc614
SHA2567baaf835204d552cbbc58ab28c2ea567ebc07b56d8e42b0499c480c1d50f03da
SHA512d990fe47d3b81e3149cf4c3796e0eb67aad2bb8a999868e938872a4dd9def85dde8e1a9adaf562f0bfa44eb698f329ea2aeaf8457416c3acde4688499ac42444
-
Filesize
468KB
MD51108a2b104c69db5f59e868d7e8f732e
SHA1cf0e2e1733e68f178e160b10abcc7cebeecec54f
SHA256202f22839564be61da91632639fcac700b259333d8c2932b5645368d148be4e0
SHA512bd464c0eff983fe736a2db53c3915850c2a16cabfe516426ab1a5820d66a6d11750fa30e3737b68eb2aa5636bd51154556e76e7fb2ad229132dfe37372b7ac4b