Analysis
-
max time kernel
120s -
max time network
119s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
14/09/2024, 21:09
Static task
static1
Behavioral task
behavioral1
Sample
012700e21c3cc4338748404110d10910N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
012700e21c3cc4338748404110d10910N.exe
Resource
win10v2004-20240802-en
General
-
Target
012700e21c3cc4338748404110d10910N.exe
-
Size
468KB
-
MD5
012700e21c3cc4338748404110d10910
-
SHA1
e63467ec792245fce7b3ff17808add006ef33d48
-
SHA256
0e2fe8851a3d3699dded9fdd95cf815b44554f458a5c4120fa865f6e9f784a06
-
SHA512
91e53951f2d3b768a62a8223ee9532b99e5dc8c50ccb26d5e87c0e28663b5951db5a623f88f1f3762e95ded638f44f3d23f6a4eb30d4b02e0eb4a0b0567a5b49
-
SSDEEP
3072:GRcSogE1PU8UwbY4PzrjSf8FEC5dQZpCndH2ZVTqKzf3fhONEeVJ:GRZozZUwvPPjSf5v5SKzfZONE
Malware Config
Signatures
-
Executes dropped EXE 38 IoCs
pid Process 2044 Unicorn-31390.exe 2656 Unicorn-43725.exe 2720 Unicorn-54078.exe 1912 Unicorn-42786.exe 648 Unicorn-40923.exe 900 Unicorn-14062.exe 1236 Unicorn-14145.exe 1988 Unicorn-34805.exe 444 Unicorn-50155.exe 1556 Unicorn-33902.exe 932 Unicorn-23871.exe 1456 Unicorn-33191.exe 2076 Unicorn-18848.exe 2200 Unicorn-45573.exe 2272 Unicorn-22221.exe 2776 Unicorn-52044.exe 2692 Unicorn-5028.exe 2552 Unicorn-19502.exe 540 Unicorn-61686.exe 1688 Unicorn-53601.exe 2604 Unicorn-25672.exe 2788 Unicorn-55568.exe 268 Unicorn-4504.exe 1868 Unicorn-23939.exe 2912 Unicorn-46580.exe 2716 Unicorn-40633.exe 2932 Unicorn-29341.exe 1780 Unicorn-55057.exe 2464 Unicorn-61362.exe 1104 Unicorn-7091.exe 2832 Unicorn-35955.exe 2888 Unicorn-2296.exe 808 Unicorn-47460.exe 112 Unicorn-11362.exe 3044 Unicorn-20683.exe 1124 Unicorn-14735.exe 2732 Unicorn-59935.exe 984 Unicorn-56967.exe -
Loads dropped DLL 64 IoCs
pid Process 2148 012700e21c3cc4338748404110d10910N.exe 2148 012700e21c3cc4338748404110d10910N.exe 2044 Unicorn-31390.exe 2044 Unicorn-31390.exe 2848 WerFault.exe 2848 WerFault.exe 2848 WerFault.exe 2848 WerFault.exe 2848 WerFault.exe 2656 Unicorn-43725.exe 2656 Unicorn-43725.exe 2708 WerFault.exe 2708 WerFault.exe 2708 WerFault.exe 2708 WerFault.exe 2708 WerFault.exe 2720 Unicorn-54078.exe 2720 Unicorn-54078.exe 2668 WerFault.exe 2668 WerFault.exe 2668 WerFault.exe 2668 WerFault.exe 2668 WerFault.exe 1912 Unicorn-42786.exe 1912 Unicorn-42786.exe 1048 WerFault.exe 1048 WerFault.exe 1048 WerFault.exe 1048 WerFault.exe 1048 WerFault.exe 648 Unicorn-40923.exe 648 Unicorn-40923.exe 2364 WerFault.exe 2364 WerFault.exe 2364 WerFault.exe 2364 WerFault.exe 2364 WerFault.exe 900 Unicorn-14062.exe 900 Unicorn-14062.exe 856 WerFault.exe 856 WerFault.exe 856 WerFault.exe 856 WerFault.exe 856 WerFault.exe 1236 Unicorn-14145.exe 1236 Unicorn-14145.exe 2252 WerFault.exe 2252 WerFault.exe 2252 WerFault.exe 2252 WerFault.exe 2252 WerFault.exe 1988 Unicorn-34805.exe 1988 Unicorn-34805.exe 1400 WerFault.exe 1400 WerFault.exe 1400 WerFault.exe 1400 WerFault.exe 1400 WerFault.exe 444 Unicorn-50155.exe 444 Unicorn-50155.exe 1844 WerFault.exe 1844 WerFault.exe 1844 WerFault.exe 1844 WerFault.exe -
Program crash 39 IoCs
pid pid_target Process procid_target 2460 2148 WerFault.exe 30 2848 2044 WerFault.exe 31 2708 2656 WerFault.exe 33 2668 2720 WerFault.exe 35 1048 1912 WerFault.exe 37 2364 648 WerFault.exe 39 856 900 WerFault.exe 41 2252 1236 WerFault.exe 43 1400 1988 WerFault.exe 45 1844 444 WerFault.exe 47 1480 1556 WerFault.exe 49 280 932 WerFault.exe 51 2408 1456 WerFault.exe 53 904 2076 WerFault.exe 55 1644 2200 WerFault.exe 57 2836 2272 WerFault.exe 59 2740 2940 WerFault.exe 61 2644 2776 WerFault.exe 63 2468 2692 WerFault.exe 65 2268 2552 WerFault.exe 67 2040 540 WerFault.exe 69 2580 1688 WerFault.exe 71 2032 2604 WerFault.exe 73 2292 2788 WerFault.exe 75 2176 268 WerFault.exe 78 2804 1868 WerFault.exe 80 2596 2912 WerFault.exe 82 1684 2716 WerFault.exe 84 2512 2932 WerFault.exe 86 1972 1780 WerFault.exe 88 3048 2464 WerFault.exe 90 912 1104 WerFault.exe 92 2784 2832 WerFault.exe 94 2312 2888 WerFault.exe 96 2216 808 WerFault.exe 98 1188 112 WerFault.exe 100 1872 3044 WerFault.exe 102 1352 1124 WerFault.exe 104 1636 2732 WerFault.exe 106 -
System Location Discovery: System Language Discovery 1 TTPs 40 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-29341.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-7091.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-11362.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-18848.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-54078.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-14145.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-33191.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-10051.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-61686.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-55568.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-23939.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-31390.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-14062.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-23871.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-19502.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-4504.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-61362.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-59935.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-56967.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-40923.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-43725.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-22221.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-2296.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-14735.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 012700e21c3cc4338748404110d10910N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-35955.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-55057.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-25672.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-20683.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-53601.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-34805.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-50155.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-45573.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-52044.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-46580.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-42786.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-5028.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-40633.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-47460.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-33902.exe -
Suspicious use of SetWindowsHookEx 39 IoCs
pid Process 2148 012700e21c3cc4338748404110d10910N.exe 2044 Unicorn-31390.exe 2656 Unicorn-43725.exe 2720 Unicorn-54078.exe 1912 Unicorn-42786.exe 648 Unicorn-40923.exe 900 Unicorn-14062.exe 1236 Unicorn-14145.exe 1988 Unicorn-34805.exe 444 Unicorn-50155.exe 1556 Unicorn-33902.exe 932 Unicorn-23871.exe 1456 Unicorn-33191.exe 2076 Unicorn-18848.exe 2200 Unicorn-45573.exe 2940 Unicorn-10051.exe 2776 Unicorn-52044.exe 2692 Unicorn-5028.exe 2552 Unicorn-19502.exe 540 Unicorn-61686.exe 1688 Unicorn-53601.exe 2604 Unicorn-25672.exe 2788 Unicorn-55568.exe 268 Unicorn-4504.exe 1868 Unicorn-23939.exe 2912 Unicorn-46580.exe 2716 Unicorn-40633.exe 2932 Unicorn-29341.exe 1780 Unicorn-55057.exe 2464 Unicorn-61362.exe 1104 Unicorn-7091.exe 2832 Unicorn-35955.exe 2888 Unicorn-2296.exe 808 Unicorn-47460.exe 112 Unicorn-11362.exe 3044 Unicorn-20683.exe 1124 Unicorn-14735.exe 2732 Unicorn-59935.exe 984 Unicorn-56967.exe -
Suspicious use of WriteProcessMemory 64 IoCs
description pid Process procid_target PID 2148 wrote to memory of 2044 2148 012700e21c3cc4338748404110d10910N.exe 31 PID 2148 wrote to memory of 2044 2148 012700e21c3cc4338748404110d10910N.exe 31 PID 2148 wrote to memory of 2044 2148 012700e21c3cc4338748404110d10910N.exe 31 PID 2148 wrote to memory of 2044 2148 012700e21c3cc4338748404110d10910N.exe 31 PID 2148 wrote to memory of 2460 2148 012700e21c3cc4338748404110d10910N.exe 32 PID 2148 wrote to memory of 2460 2148 012700e21c3cc4338748404110d10910N.exe 32 PID 2148 wrote to memory of 2460 2148 012700e21c3cc4338748404110d10910N.exe 32 PID 2148 wrote to memory of 2460 2148 012700e21c3cc4338748404110d10910N.exe 32 PID 2044 wrote to memory of 2656 2044 Unicorn-31390.exe 33 PID 2044 wrote to memory of 2656 2044 Unicorn-31390.exe 33 PID 2044 wrote to memory of 2656 2044 Unicorn-31390.exe 33 PID 2044 wrote to memory of 2656 2044 Unicorn-31390.exe 33 PID 2044 wrote to memory of 2848 2044 Unicorn-31390.exe 34 PID 2044 wrote to memory of 2848 2044 Unicorn-31390.exe 34 PID 2044 wrote to memory of 2848 2044 Unicorn-31390.exe 34 PID 2044 wrote to memory of 2848 2044 Unicorn-31390.exe 34 PID 2656 wrote to memory of 2720 2656 Unicorn-43725.exe 35 PID 2656 wrote to memory of 2720 2656 Unicorn-43725.exe 35 PID 2656 wrote to memory of 2720 2656 Unicorn-43725.exe 35 PID 2656 wrote to memory of 2720 2656 Unicorn-43725.exe 35 PID 2656 wrote to memory of 2708 2656 Unicorn-43725.exe 36 PID 2656 wrote to memory of 2708 2656 Unicorn-43725.exe 36 PID 2656 wrote to memory of 2708 2656 Unicorn-43725.exe 36 PID 2656 wrote to memory of 2708 2656 Unicorn-43725.exe 36 PID 2720 wrote to memory of 1912 2720 Unicorn-54078.exe 37 PID 2720 wrote to memory of 1912 2720 Unicorn-54078.exe 37 PID 2720 wrote to memory of 1912 2720 Unicorn-54078.exe 37 PID 2720 wrote to memory of 1912 2720 Unicorn-54078.exe 37 PID 2720 wrote to memory of 2668 2720 Unicorn-54078.exe 38 PID 2720 wrote to memory of 2668 2720 Unicorn-54078.exe 38 PID 2720 wrote to memory of 2668 2720 Unicorn-54078.exe 38 PID 2720 wrote to memory of 2668 2720 Unicorn-54078.exe 38 PID 1912 wrote to memory of 648 1912 Unicorn-42786.exe 39 PID 1912 wrote to memory of 648 1912 Unicorn-42786.exe 39 PID 1912 wrote to memory of 648 1912 Unicorn-42786.exe 39 PID 1912 wrote to memory of 648 1912 Unicorn-42786.exe 39 PID 1912 wrote to memory of 1048 1912 Unicorn-42786.exe 40 PID 1912 wrote to memory of 1048 1912 Unicorn-42786.exe 40 PID 1912 wrote to memory of 1048 1912 Unicorn-42786.exe 40 PID 1912 wrote to memory of 1048 1912 Unicorn-42786.exe 40 PID 648 wrote to memory of 900 648 Unicorn-40923.exe 41 PID 648 wrote to memory of 900 648 Unicorn-40923.exe 41 PID 648 wrote to memory of 900 648 Unicorn-40923.exe 41 PID 648 wrote to memory of 900 648 Unicorn-40923.exe 41 PID 648 wrote to memory of 2364 648 Unicorn-40923.exe 42 PID 648 wrote to memory of 2364 648 Unicorn-40923.exe 42 PID 648 wrote to memory of 2364 648 Unicorn-40923.exe 42 PID 648 wrote to memory of 2364 648 Unicorn-40923.exe 42 PID 900 wrote to memory of 1236 900 Unicorn-14062.exe 43 PID 900 wrote to memory of 1236 900 Unicorn-14062.exe 43 PID 900 wrote to memory of 1236 900 Unicorn-14062.exe 43 PID 900 wrote to memory of 1236 900 Unicorn-14062.exe 43 PID 900 wrote to memory of 856 900 Unicorn-14062.exe 44 PID 900 wrote to memory of 856 900 Unicorn-14062.exe 44 PID 900 wrote to memory of 856 900 Unicorn-14062.exe 44 PID 900 wrote to memory of 856 900 Unicorn-14062.exe 44 PID 1236 wrote to memory of 1988 1236 Unicorn-14145.exe 45 PID 1236 wrote to memory of 1988 1236 Unicorn-14145.exe 45 PID 1236 wrote to memory of 1988 1236 Unicorn-14145.exe 45 PID 1236 wrote to memory of 1988 1236 Unicorn-14145.exe 45 PID 1236 wrote to memory of 2252 1236 Unicorn-14145.exe 46 PID 1236 wrote to memory of 2252 1236 Unicorn-14145.exe 46 PID 1236 wrote to memory of 2252 1236 Unicorn-14145.exe 46 PID 1236 wrote to memory of 2252 1236 Unicorn-14145.exe 46
Processes
-
C:\Users\Admin\AppData\Local\Temp\012700e21c3cc4338748404110d10910N.exe"C:\Users\Admin\AppData\Local\Temp\012700e21c3cc4338748404110d10910N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2148 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-31390.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-31390.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2044 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-43725.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43725.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2656 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54078.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54078.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2720 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-42786.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42786.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1912 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40923.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40923.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:648 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14062.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14062.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:900 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14145.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14145.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1236 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-34805.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-34805.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1988 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50155.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50155.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:444 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-33902.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33902.exe11⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1556 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23871.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23871.exe12⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:932 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-33191.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-33191.exe13⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1456 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-18848.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-18848.exe14⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2076 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-45573.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-45573.exe15⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2200 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-22221.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-22221.exe16⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
PID:2272 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-10051.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-10051.exe17⤵
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2940 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-52044.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-52044.exe18⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2776 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-5028.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-5028.exe19⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2692 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-19502.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-19502.exe20⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2552 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61686.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61686.exe21⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:540 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-53601.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53601.exe22⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1688 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-25672.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-25672.exe23⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2604 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-55568.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55568.exe24⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2788 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-4504.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-4504.exe25⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:268 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-23939.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-23939.exe26⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1868 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-46580.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-46580.exe27⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2912 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-40633.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-40633.exe28⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2716 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-29341.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29341.exe29⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2932 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-55057.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-55057.exe30⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1780 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-61362.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-61362.exe31⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2464 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-7091.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-7091.exe32⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1104 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-35955.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-35955.exe33⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2832 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-2296.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-2296.exe34⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2888 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-47460.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-47460.exe35⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:808 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11362.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11362.exe36⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:112 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-20683.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-20683.exe37⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:3044 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-14735.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-14735.exe38⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:1124 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-59935.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-59935.exe39⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:2732 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-56967.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56967.exe40⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
PID:984
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2732 -s 23640⤵
- Program crash
PID:1636
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1124 -s 23639⤵
- Program crash
PID:1352
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 3044 -s 23638⤵
- Program crash
PID:1872
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 112 -s 23637⤵
- Program crash
PID:1188
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 808 -s 23636⤵
- Program crash
PID:2216
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2888 -s 23635⤵
- Program crash
PID:2312
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2832 -s 23634⤵
- Program crash
PID:2784
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1104 -s 23633⤵
- Program crash
PID:912
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2464 -s 23632⤵
- Program crash
PID:3048
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1780 -s 23631⤵
- Program crash
PID:1972
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2932 -s 23630⤵
- Program crash
PID:2512
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2716 -s 23629⤵
- Program crash
PID:1684
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2912 -s 23628⤵
- Program crash
PID:2596
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1868 -s 23627⤵
- Program crash
PID:2804
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 268 -s 23626⤵
- Program crash
PID:2176
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2788 -s 23625⤵
- Program crash
PID:2292
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2604 -s 23624⤵
- Program crash
PID:2032
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1688 -s 23623⤵
- Program crash
PID:2580
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 540 -s 23622⤵
- Program crash
PID:2040
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2552 -s 23621⤵
- Program crash
PID:2268
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2692 -s 23620⤵
- Program crash
PID:2468
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2776 -s 23619⤵
- Program crash
PID:2644
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2940 -s 23618⤵
- Program crash
PID:2740
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2272 -s 23617⤵
- Program crash
PID:2836
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2200 -s 23616⤵
- Program crash
PID:1644
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2076 -s 23615⤵
- Program crash
PID:904
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1456 -s 23614⤵
- Program crash
PID:2408
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 932 -s 23613⤵
- Program crash
PID:280
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1556 -s 23612⤵
- Program crash
PID:1480
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 444 -s 23611⤵
- Loads dropped DLL
- Program crash
PID:1844
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1988 -s 23610⤵
- Loads dropped DLL
- Program crash
PID:1400
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1236 -s 2369⤵
- Loads dropped DLL
- Program crash
PID:2252
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 900 -s 2368⤵
- Loads dropped DLL
- Program crash
PID:856
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 648 -s 2367⤵
- Loads dropped DLL
- Program crash
PID:2364
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 1912 -s 2366⤵
- Loads dropped DLL
- Program crash
PID:1048
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2720 -s 2365⤵
- Loads dropped DLL
- Program crash
PID:2668
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2656 -s 2364⤵
- Loads dropped DLL
- Program crash
PID:2708
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2044 -s 2363⤵
- Loads dropped DLL
- Program crash
PID:2848
-
-
-
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2148 -s 2362⤵
- Program crash
PID:2460
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
468KB
MD5a9b61c746e02a9646fa11b1158583cc1
SHA1b9b85a8ed9cea5c526000d88354a4565ccb55ec2
SHA256ecd8b3cf7abce1dd78cf7741e8a7ae3704c802bf0e79f1eecdc42592a278fe0d
SHA5129fb32809466760f87a4083a829fb121cb1f5c2a883948960e4503f83f4f01880eb7d07e360331ab8590328d1a4109ed96f718f97c414091dfb3ce4172856cee6
-
Filesize
468KB
MD57b30b168af668f07cbd5f5fe0395e2e4
SHA1609c32dd859a486e6ea24d0cc306e98b30ef6df1
SHA256a35e22b35cb9898e45bd72224ca7db1cd292ec4523a8a50074be03b6dd5c3227
SHA512524a34f8828c1bd85122ff1734bc88670db149d5c0f053bebd9722f6e4c2e9bba5583af42176aaaf90fa40d0f871a9ad49243d677bc25a054e90a1a001b1a869
-
Filesize
468KB
MD5fe801671d776641ab149457c04fef832
SHA13537227282032fed20704e4f2630e14eba58fa7d
SHA25693109f7afad4189640355f9aac0a9ee4bfd1c7e675ce9ef5a51fc49d0b35eea5
SHA512235fec4613627962ab83b5560e9070b2d522432018d8205e6362d8402493afc679bac1e0a34bd6138acd883e72fd30cae6ef8056a61b426f7f30000785591d31
-
Filesize
468KB
MD57ea3c0f605a93d1d642bb5e03274b3f6
SHA1efea155d377efdd1c3d48c519da45a9756dfd51b
SHA256db2e23bfa9bd18e5b7c3364d7b2df46a7cbce9daa77f16dc613d8d0f9f0eb238
SHA512cf740c889d31b44411f68bb2689dfc13c801eda6612ca273e439a1194e48ffe3b910713468d052aeaeb0528d3c9ab1e4e5d419b6a5228825cf88b3e7c5722231
-
Filesize
468KB
MD560c9792c4818da145674d2a67f0d51c2
SHA142663dfe5e0ad74e04fbe1bca682c91c8f6ac7cf
SHA25697f63b87070e32509a3529d932bb1753fc259d0cb69fb262b1aeaed8b2285bf6
SHA512c2564336b42dba0c7f2e8fa8b74ffd824243d754f1945b54a9ff16f5731594faab9ff0257a2a4b280d7e8befe8fc16072dfcddd3d5c2a7ad2947aaef5254ba7b
-
Filesize
468KB
MD57bc6fabdc1991deced9b10e90c79fe1c
SHA19917f7b2631d89554dec36fa2d77b2267845d21b
SHA256c6897ac91bac77972982867710a2725eaedea35baef81797a66238991dd8fef6
SHA5120985dc7517caa57b06474e452086868b0020a856ca6e18ef79232d736c670d0b2d9f398ac514fbf03bb76ce9308a12a5afb79a47ce41d9c813d8229b698ae5a8
-
Filesize
468KB
MD5585ec9604f35b0787c1d29539829f6f0
SHA16ab4ce2a841d365f66357f77c879e210f27e848f
SHA256e7b5c76eda5ae221cab49cd0bd57b96111fae5005c79c5c9af0da355bb5b5764
SHA512e776aeba8b0680429dbbeb283f39302c16804624bf23f319615c50a9536f0fcb9c498a8317763a64b6253515055c9482a1a1966ee6ca41b23e34211827b7f7b7
-
Filesize
468KB
MD57e6d13028cc0350d29df706c4416d560
SHA1cf8cccdc96454580333ee0ee18fd8dfbe3687cb7
SHA25676a02102bbffae1de810e3b941961be33d418f9f70742e65590311d77107d354
SHA512f7a6a7d8a8b0e3dce8ae200e465a8ab5bb859cb4779ac4488ab63402807c738c4a9cbc703a3c51f268518870f2c6dd7537ca827a6d442e659170e2ebe0c51246