Analysis

  • max time kernel
    120s
  • max time network
    119s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    14/09/2024, 21:09

General

  • Target

    012700e21c3cc4338748404110d10910N.exe

  • Size

    468KB

  • MD5

    012700e21c3cc4338748404110d10910

  • SHA1

    e63467ec792245fce7b3ff17808add006ef33d48

  • SHA256

    0e2fe8851a3d3699dded9fdd95cf815b44554f458a5c4120fa865f6e9f784a06

  • SHA512

    91e53951f2d3b768a62a8223ee9532b99e5dc8c50ccb26d5e87c0e28663b5951db5a623f88f1f3762e95ded638f44f3d23f6a4eb30d4b02e0eb4a0b0567a5b49

  • SSDEEP

    3072:GRcSogE1PU8UwbY4PzrjSf8FEC5dQZpCndH2ZVTqKzf3fhONEeVJ:GRZozZUwvPPjSf5v5SKzfZONE

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 38 IoCs
  • Loads dropped DLL 64 IoCs
  • Program crash 39 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 40 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 39 IoCs
  • Suspicious use of WriteProcessMemory 64 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\012700e21c3cc4338748404110d10910N.exe
    "C:\Users\Admin\AppData\Local\Temp\012700e21c3cc4338748404110d10910N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2148
    • C:\Users\Admin\AppData\Local\Temp\Unicorn-31390.exe
      C:\Users\Admin\AppData\Local\Temp\Unicorn-31390.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2044
      • C:\Users\Admin\AppData\Local\Temp\Unicorn-43725.exe
        C:\Users\Admin\AppData\Local\Temp\Unicorn-43725.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2656
        • C:\Users\Admin\AppData\Local\Temp\Unicorn-54078.exe
          C:\Users\Admin\AppData\Local\Temp\Unicorn-54078.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2720
          • C:\Users\Admin\AppData\Local\Temp\Unicorn-42786.exe
            C:\Users\Admin\AppData\Local\Temp\Unicorn-42786.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:1912
            • C:\Users\Admin\AppData\Local\Temp\Unicorn-40923.exe
              C:\Users\Admin\AppData\Local\Temp\Unicorn-40923.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:648
              • C:\Users\Admin\AppData\Local\Temp\Unicorn-14062.exe
                C:\Users\Admin\AppData\Local\Temp\Unicorn-14062.exe
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:900
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-14145.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-14145.exe
                  8⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:1236
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-34805.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-34805.exe
                    9⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of SetWindowsHookEx
                    PID:1988
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-50155.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-50155.exe
                      10⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of SetWindowsHookEx
                      PID:444
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-33902.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-33902.exe
                        11⤵
                        • Executes dropped EXE
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of SetWindowsHookEx
                        PID:1556
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-23871.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-23871.exe
                          12⤵
                          • Executes dropped EXE
                          • System Location Discovery: System Language Discovery
                          • Suspicious use of SetWindowsHookEx
                          PID:932
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-33191.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-33191.exe
                            13⤵
                            • Executes dropped EXE
                            • System Location Discovery: System Language Discovery
                            • Suspicious use of SetWindowsHookEx
                            PID:1456
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-18848.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-18848.exe
                              14⤵
                              • Executes dropped EXE
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of SetWindowsHookEx
                              PID:2076
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-45573.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-45573.exe
                                15⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                • Suspicious use of SetWindowsHookEx
                                PID:2200
                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-22221.exe
                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-22221.exe
                                  16⤵
                                  • Executes dropped EXE
                                  • System Location Discovery: System Language Discovery
                                  PID:2272
                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-10051.exe
                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-10051.exe
                                    17⤵
                                    • System Location Discovery: System Language Discovery
                                    • Suspicious use of SetWindowsHookEx
                                    PID:2940
                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-52044.exe
                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-52044.exe
                                      18⤵
                                      • Executes dropped EXE
                                      • System Location Discovery: System Language Discovery
                                      • Suspicious use of SetWindowsHookEx
                                      PID:2776
                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-5028.exe
                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-5028.exe
                                        19⤵
                                        • Executes dropped EXE
                                        • System Location Discovery: System Language Discovery
                                        • Suspicious use of SetWindowsHookEx
                                        PID:2692
                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-19502.exe
                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-19502.exe
                                          20⤵
                                          • Executes dropped EXE
                                          • System Location Discovery: System Language Discovery
                                          • Suspicious use of SetWindowsHookEx
                                          PID:2552
                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-61686.exe
                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-61686.exe
                                            21⤵
                                            • Executes dropped EXE
                                            • System Location Discovery: System Language Discovery
                                            • Suspicious use of SetWindowsHookEx
                                            PID:540
                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-53601.exe
                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-53601.exe
                                              22⤵
                                              • Executes dropped EXE
                                              • System Location Discovery: System Language Discovery
                                              • Suspicious use of SetWindowsHookEx
                                              PID:1688
                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-25672.exe
                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-25672.exe
                                                23⤵
                                                • Executes dropped EXE
                                                • System Location Discovery: System Language Discovery
                                                • Suspicious use of SetWindowsHookEx
                                                PID:2604
                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-55568.exe
                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-55568.exe
                                                  24⤵
                                                  • Executes dropped EXE
                                                  • System Location Discovery: System Language Discovery
                                                  • Suspicious use of SetWindowsHookEx
                                                  PID:2788
                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-4504.exe
                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-4504.exe
                                                    25⤵
                                                    • Executes dropped EXE
                                                    • System Location Discovery: System Language Discovery
                                                    • Suspicious use of SetWindowsHookEx
                                                    PID:268
                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-23939.exe
                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-23939.exe
                                                      26⤵
                                                      • Executes dropped EXE
                                                      • System Location Discovery: System Language Discovery
                                                      • Suspicious use of SetWindowsHookEx
                                                      PID:1868
                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-46580.exe
                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-46580.exe
                                                        27⤵
                                                        • Executes dropped EXE
                                                        • System Location Discovery: System Language Discovery
                                                        • Suspicious use of SetWindowsHookEx
                                                        PID:2912
                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-40633.exe
                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-40633.exe
                                                          28⤵
                                                          • Executes dropped EXE
                                                          • System Location Discovery: System Language Discovery
                                                          • Suspicious use of SetWindowsHookEx
                                                          PID:2716
                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-29341.exe
                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-29341.exe
                                                            29⤵
                                                            • Executes dropped EXE
                                                            • System Location Discovery: System Language Discovery
                                                            • Suspicious use of SetWindowsHookEx
                                                            PID:2932
                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-55057.exe
                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-55057.exe
                                                              30⤵
                                                              • Executes dropped EXE
                                                              • System Location Discovery: System Language Discovery
                                                              • Suspicious use of SetWindowsHookEx
                                                              PID:1780
                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-61362.exe
                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-61362.exe
                                                                31⤵
                                                                • Executes dropped EXE
                                                                • System Location Discovery: System Language Discovery
                                                                • Suspicious use of SetWindowsHookEx
                                                                PID:2464
                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-7091.exe
                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-7091.exe
                                                                  32⤵
                                                                  • Executes dropped EXE
                                                                  • System Location Discovery: System Language Discovery
                                                                  • Suspicious use of SetWindowsHookEx
                                                                  PID:1104
                                                                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-35955.exe
                                                                    C:\Users\Admin\AppData\Local\Temp\Unicorn-35955.exe
                                                                    33⤵
                                                                    • Executes dropped EXE
                                                                    • System Location Discovery: System Language Discovery
                                                                    • Suspicious use of SetWindowsHookEx
                                                                    PID:2832
                                                                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-2296.exe
                                                                      C:\Users\Admin\AppData\Local\Temp\Unicorn-2296.exe
                                                                      34⤵
                                                                      • Executes dropped EXE
                                                                      • System Location Discovery: System Language Discovery
                                                                      • Suspicious use of SetWindowsHookEx
                                                                      PID:2888
                                                                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-47460.exe
                                                                        C:\Users\Admin\AppData\Local\Temp\Unicorn-47460.exe
                                                                        35⤵
                                                                        • Executes dropped EXE
                                                                        • System Location Discovery: System Language Discovery
                                                                        • Suspicious use of SetWindowsHookEx
                                                                        PID:808
                                                                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-11362.exe
                                                                          C:\Users\Admin\AppData\Local\Temp\Unicorn-11362.exe
                                                                          36⤵
                                                                          • Executes dropped EXE
                                                                          • System Location Discovery: System Language Discovery
                                                                          • Suspicious use of SetWindowsHookEx
                                                                          PID:112
                                                                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-20683.exe
                                                                            C:\Users\Admin\AppData\Local\Temp\Unicorn-20683.exe
                                                                            37⤵
                                                                            • Executes dropped EXE
                                                                            • System Location Discovery: System Language Discovery
                                                                            • Suspicious use of SetWindowsHookEx
                                                                            PID:3044
                                                                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-14735.exe
                                                                              C:\Users\Admin\AppData\Local\Temp\Unicorn-14735.exe
                                                                              38⤵
                                                                              • Executes dropped EXE
                                                                              • System Location Discovery: System Language Discovery
                                                                              • Suspicious use of SetWindowsHookEx
                                                                              PID:1124
                                                                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-59935.exe
                                                                                C:\Users\Admin\AppData\Local\Temp\Unicorn-59935.exe
                                                                                39⤵
                                                                                • Executes dropped EXE
                                                                                • System Location Discovery: System Language Discovery
                                                                                • Suspicious use of SetWindowsHookEx
                                                                                PID:2732
                                                                                • C:\Users\Admin\AppData\Local\Temp\Unicorn-56967.exe
                                                                                  C:\Users\Admin\AppData\Local\Temp\Unicorn-56967.exe
                                                                                  40⤵
                                                                                  • Executes dropped EXE
                                                                                  • System Location Discovery: System Language Discovery
                                                                                  • Suspicious use of SetWindowsHookEx
                                                                                  PID:984
                                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 2732 -s 236
                                                                                  40⤵
                                                                                  • Program crash
                                                                                  PID:1636
                                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 1124 -s 236
                                                                                39⤵
                                                                                • Program crash
                                                                                PID:1352
                                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 3044 -s 236
                                                                              38⤵
                                                                              • Program crash
                                                                              PID:1872
                                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 112 -s 236
                                                                            37⤵
                                                                            • Program crash
                                                                            PID:1188
                                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                                          C:\Windows\SysWOW64\WerFault.exe -u -p 808 -s 236
                                                                          36⤵
                                                                          • Program crash
                                                                          PID:2216
                                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 2888 -s 236
                                                                        35⤵
                                                                        • Program crash
                                                                        PID:2312
                                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 2832 -s 236
                                                                      34⤵
                                                                      • Program crash
                                                                      PID:2784
                                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 1104 -s 236
                                                                    33⤵
                                                                    • Program crash
                                                                    PID:912
                                                                • C:\Windows\SysWOW64\WerFault.exe
                                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 2464 -s 236
                                                                  32⤵
                                                                  • Program crash
                                                                  PID:3048
                                                              • C:\Windows\SysWOW64\WerFault.exe
                                                                C:\Windows\SysWOW64\WerFault.exe -u -p 1780 -s 236
                                                                31⤵
                                                                • Program crash
                                                                PID:1972
                                                            • C:\Windows\SysWOW64\WerFault.exe
                                                              C:\Windows\SysWOW64\WerFault.exe -u -p 2932 -s 236
                                                              30⤵
                                                              • Program crash
                                                              PID:2512
                                                          • C:\Windows\SysWOW64\WerFault.exe
                                                            C:\Windows\SysWOW64\WerFault.exe -u -p 2716 -s 236
                                                            29⤵
                                                            • Program crash
                                                            PID:1684
                                                        • C:\Windows\SysWOW64\WerFault.exe
                                                          C:\Windows\SysWOW64\WerFault.exe -u -p 2912 -s 236
                                                          28⤵
                                                          • Program crash
                                                          PID:2596
                                                      • C:\Windows\SysWOW64\WerFault.exe
                                                        C:\Windows\SysWOW64\WerFault.exe -u -p 1868 -s 236
                                                        27⤵
                                                        • Program crash
                                                        PID:2804
                                                    • C:\Windows\SysWOW64\WerFault.exe
                                                      C:\Windows\SysWOW64\WerFault.exe -u -p 268 -s 236
                                                      26⤵
                                                      • Program crash
                                                      PID:2176
                                                  • C:\Windows\SysWOW64\WerFault.exe
                                                    C:\Windows\SysWOW64\WerFault.exe -u -p 2788 -s 236
                                                    25⤵
                                                    • Program crash
                                                    PID:2292
                                                • C:\Windows\SysWOW64\WerFault.exe
                                                  C:\Windows\SysWOW64\WerFault.exe -u -p 2604 -s 236
                                                  24⤵
                                                  • Program crash
                                                  PID:2032
                                              • C:\Windows\SysWOW64\WerFault.exe
                                                C:\Windows\SysWOW64\WerFault.exe -u -p 1688 -s 236
                                                23⤵
                                                • Program crash
                                                PID:2580
                                            • C:\Windows\SysWOW64\WerFault.exe
                                              C:\Windows\SysWOW64\WerFault.exe -u -p 540 -s 236
                                              22⤵
                                              • Program crash
                                              PID:2040
                                          • C:\Windows\SysWOW64\WerFault.exe
                                            C:\Windows\SysWOW64\WerFault.exe -u -p 2552 -s 236
                                            21⤵
                                            • Program crash
                                            PID:2268
                                        • C:\Windows\SysWOW64\WerFault.exe
                                          C:\Windows\SysWOW64\WerFault.exe -u -p 2692 -s 236
                                          20⤵
                                          • Program crash
                                          PID:2468
                                      • C:\Windows\SysWOW64\WerFault.exe
                                        C:\Windows\SysWOW64\WerFault.exe -u -p 2776 -s 236
                                        19⤵
                                        • Program crash
                                        PID:2644
                                    • C:\Windows\SysWOW64\WerFault.exe
                                      C:\Windows\SysWOW64\WerFault.exe -u -p 2940 -s 236
                                      18⤵
                                      • Program crash
                                      PID:2740
                                  • C:\Windows\SysWOW64\WerFault.exe
                                    C:\Windows\SysWOW64\WerFault.exe -u -p 2272 -s 236
                                    17⤵
                                    • Program crash
                                    PID:2836
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -u -p 2200 -s 236
                                  16⤵
                                  • Program crash
                                  PID:1644
                              • C:\Windows\SysWOW64\WerFault.exe
                                C:\Windows\SysWOW64\WerFault.exe -u -p 2076 -s 236
                                15⤵
                                • Program crash
                                PID:904
                            • C:\Windows\SysWOW64\WerFault.exe
                              C:\Windows\SysWOW64\WerFault.exe -u -p 1456 -s 236
                              14⤵
                              • Program crash
                              PID:2408
                          • C:\Windows\SysWOW64\WerFault.exe
                            C:\Windows\SysWOW64\WerFault.exe -u -p 932 -s 236
                            13⤵
                            • Program crash
                            PID:280
                        • C:\Windows\SysWOW64\WerFault.exe
                          C:\Windows\SysWOW64\WerFault.exe -u -p 1556 -s 236
                          12⤵
                          • Program crash
                          PID:1480
                      • C:\Windows\SysWOW64\WerFault.exe
                        C:\Windows\SysWOW64\WerFault.exe -u -p 444 -s 236
                        11⤵
                        • Loads dropped DLL
                        • Program crash
                        PID:1844
                    • C:\Windows\SysWOW64\WerFault.exe
                      C:\Windows\SysWOW64\WerFault.exe -u -p 1988 -s 236
                      10⤵
                      • Loads dropped DLL
                      • Program crash
                      PID:1400
                  • C:\Windows\SysWOW64\WerFault.exe
                    C:\Windows\SysWOW64\WerFault.exe -u -p 1236 -s 236
                    9⤵
                    • Loads dropped DLL
                    • Program crash
                    PID:2252
                • C:\Windows\SysWOW64\WerFault.exe
                  C:\Windows\SysWOW64\WerFault.exe -u -p 900 -s 236
                  8⤵
                  • Loads dropped DLL
                  • Program crash
                  PID:856
              • C:\Windows\SysWOW64\WerFault.exe
                C:\Windows\SysWOW64\WerFault.exe -u -p 648 -s 236
                7⤵
                • Loads dropped DLL
                • Program crash
                PID:2364
            • C:\Windows\SysWOW64\WerFault.exe
              C:\Windows\SysWOW64\WerFault.exe -u -p 1912 -s 236
              6⤵
              • Loads dropped DLL
              • Program crash
              PID:1048
          • C:\Windows\SysWOW64\WerFault.exe
            C:\Windows\SysWOW64\WerFault.exe -u -p 2720 -s 236
            5⤵
            • Loads dropped DLL
            • Program crash
            PID:2668
        • C:\Windows\SysWOW64\WerFault.exe
          C:\Windows\SysWOW64\WerFault.exe -u -p 2656 -s 236
          4⤵
          • Loads dropped DLL
          • Program crash
          PID:2708
      • C:\Windows\SysWOW64\WerFault.exe
        C:\Windows\SysWOW64\WerFault.exe -u -p 2044 -s 236
        3⤵
        • Loads dropped DLL
        • Program crash
        PID:2848
    • C:\Windows\SysWOW64\WerFault.exe
      C:\Windows\SysWOW64\WerFault.exe -u -p 2148 -s 236
      2⤵
      • Program crash
      PID:2460

Network

        MITRE ATT&CK Enterprise v15

        Replay Monitor

        Loading Replay Monitor...

        Downloads

        • \Users\Admin\AppData\Local\Temp\Unicorn-14062.exe

          Filesize

          468KB

          MD5

          a9b61c746e02a9646fa11b1158583cc1

          SHA1

          b9b85a8ed9cea5c526000d88354a4565ccb55ec2

          SHA256

          ecd8b3cf7abce1dd78cf7741e8a7ae3704c802bf0e79f1eecdc42592a278fe0d

          SHA512

          9fb32809466760f87a4083a829fb121cb1f5c2a883948960e4503f83f4f01880eb7d07e360331ab8590328d1a4109ed96f718f97c414091dfb3ce4172856cee6

        • \Users\Admin\AppData\Local\Temp\Unicorn-14145.exe

          Filesize

          468KB

          MD5

          7b30b168af668f07cbd5f5fe0395e2e4

          SHA1

          609c32dd859a486e6ea24d0cc306e98b30ef6df1

          SHA256

          a35e22b35cb9898e45bd72224ca7db1cd292ec4523a8a50074be03b6dd5c3227

          SHA512

          524a34f8828c1bd85122ff1734bc88670db149d5c0f053bebd9722f6e4c2e9bba5583af42176aaaf90fa40d0f871a9ad49243d677bc25a054e90a1a001b1a869

        • \Users\Admin\AppData\Local\Temp\Unicorn-31390.exe

          Filesize

          468KB

          MD5

          fe801671d776641ab149457c04fef832

          SHA1

          3537227282032fed20704e4f2630e14eba58fa7d

          SHA256

          93109f7afad4189640355f9aac0a9ee4bfd1c7e675ce9ef5a51fc49d0b35eea5

          SHA512

          235fec4613627962ab83b5560e9070b2d522432018d8205e6362d8402493afc679bac1e0a34bd6138acd883e72fd30cae6ef8056a61b426f7f30000785591d31

        • \Users\Admin\AppData\Local\Temp\Unicorn-34805.exe

          Filesize

          468KB

          MD5

          7ea3c0f605a93d1d642bb5e03274b3f6

          SHA1

          efea155d377efdd1c3d48c519da45a9756dfd51b

          SHA256

          db2e23bfa9bd18e5b7c3364d7b2df46a7cbce9daa77f16dc613d8d0f9f0eb238

          SHA512

          cf740c889d31b44411f68bb2689dfc13c801eda6612ca273e439a1194e48ffe3b910713468d052aeaeb0528d3c9ab1e4e5d419b6a5228825cf88b3e7c5722231

        • \Users\Admin\AppData\Local\Temp\Unicorn-40923.exe

          Filesize

          468KB

          MD5

          60c9792c4818da145674d2a67f0d51c2

          SHA1

          42663dfe5e0ad74e04fbe1bca682c91c8f6ac7cf

          SHA256

          97f63b87070e32509a3529d932bb1753fc259d0cb69fb262b1aeaed8b2285bf6

          SHA512

          c2564336b42dba0c7f2e8fa8b74ffd824243d754f1945b54a9ff16f5731594faab9ff0257a2a4b280d7e8befe8fc16072dfcddd3d5c2a7ad2947aaef5254ba7b

        • \Users\Admin\AppData\Local\Temp\Unicorn-42786.exe

          Filesize

          468KB

          MD5

          7bc6fabdc1991deced9b10e90c79fe1c

          SHA1

          9917f7b2631d89554dec36fa2d77b2267845d21b

          SHA256

          c6897ac91bac77972982867710a2725eaedea35baef81797a66238991dd8fef6

          SHA512

          0985dc7517caa57b06474e452086868b0020a856ca6e18ef79232d736c670d0b2d9f398ac514fbf03bb76ce9308a12a5afb79a47ce41d9c813d8229b698ae5a8

        • \Users\Admin\AppData\Local\Temp\Unicorn-43725.exe

          Filesize

          468KB

          MD5

          585ec9604f35b0787c1d29539829f6f0

          SHA1

          6ab4ce2a841d365f66357f77c879e210f27e848f

          SHA256

          e7b5c76eda5ae221cab49cd0bd57b96111fae5005c79c5c9af0da355bb5b5764

          SHA512

          e776aeba8b0680429dbbeb283f39302c16804624bf23f319615c50a9536f0fcb9c498a8317763a64b6253515055c9482a1a1966ee6ca41b23e34211827b7f7b7

        • \Users\Admin\AppData\Local\Temp\Unicorn-54078.exe

          Filesize

          468KB

          MD5

          7e6d13028cc0350d29df706c4416d560

          SHA1

          cf8cccdc96454580333ee0ee18fd8dfbe3687cb7

          SHA256

          76a02102bbffae1de810e3b941961be33d418f9f70742e65590311d77107d354

          SHA512

          f7a6a7d8a8b0e3dce8ae200e465a8ab5bb859cb4779ac4488ab63402807c738c4a9cbc703a3c51f268518870f2c6dd7537ca827a6d442e659170e2ebe0c51246

        • memory/268-292-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/268-302-0x00000000033D0000-0x0000000003445000-memory.dmp

          Filesize

          468KB

        • memory/444-332-0x00000000026D0000-0x0000000002745000-memory.dmp

          Filesize

          468KB

        • memory/444-329-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/444-150-0x00000000026D0000-0x0000000002745000-memory.dmp

          Filesize

          468KB

        • memory/444-143-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/540-247-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/540-256-0x00000000025E0000-0x0000000002655000-memory.dmp

          Filesize

          468KB

        • memory/648-77-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/648-92-0x0000000000480000-0x00000000004F5000-memory.dmp

          Filesize

          468KB

        • memory/648-277-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/648-283-0x0000000000480000-0x00000000004F5000-memory.dmp

          Filesize

          468KB

        • memory/900-95-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/900-110-0x0000000002710000-0x0000000002785000-memory.dmp

          Filesize

          468KB

        • memory/900-284-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/900-298-0x0000000002710000-0x0000000002785000-memory.dmp

          Filesize

          468KB

        • memory/932-354-0x0000000000380000-0x00000000003F5000-memory.dmp

          Filesize

          468KB

        • memory/932-346-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/932-162-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/932-169-0x0000000000380000-0x00000000003F5000-memory.dmp

          Filesize

          468KB

        • memory/932-171-0x0000000000380000-0x00000000003F5000-memory.dmp

          Filesize

          468KB

        • memory/932-353-0x0000000000380000-0x00000000003F5000-memory.dmp

          Filesize

          468KB

        • memory/1236-307-0x00000000025E0000-0x0000000002655000-memory.dmp

          Filesize

          468KB

        • memory/1236-303-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/1236-128-0x00000000025E0000-0x0000000002655000-memory.dmp

          Filesize

          468KB

        • memory/1236-112-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/1456-173-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/1456-179-0x0000000003430000-0x00000000034A5000-memory.dmp

          Filesize

          468KB

        • memory/1456-180-0x0000000003430000-0x00000000034A5000-memory.dmp

          Filesize

          468KB

        • memory/1456-360-0x0000000003430000-0x00000000034A5000-memory.dmp

          Filesize

          468KB

        • memory/1456-357-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/1456-366-0x0000000003430000-0x00000000034A5000-memory.dmp

          Filesize

          468KB

        • memory/1556-344-0x0000000003480000-0x00000000034F5000-memory.dmp

          Filesize

          468KB

        • memory/1556-333-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/1556-153-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/1556-159-0x0000000003480000-0x00000000034F5000-memory.dmp

          Filesize

          468KB

        • memory/1556-160-0x0000000003480000-0x00000000034F5000-memory.dmp

          Filesize

          468KB

        • memory/1556-345-0x0000000003480000-0x00000000034F5000-memory.dmp

          Filesize

          468KB

        • memory/1688-257-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/1688-267-0x0000000000750000-0x00000000007C5000-memory.dmp

          Filesize

          468KB

        • memory/1688-268-0x0000000000750000-0x00000000007C5000-memory.dmp

          Filesize

          468KB

        • memory/1780-367-0x0000000000480000-0x00000000004F5000-memory.dmp

          Filesize

          468KB

        • memory/1780-365-0x0000000000480000-0x00000000004F5000-memory.dmp

          Filesize

          468KB

        • memory/1868-313-0x0000000001E60000-0x0000000001ED5000-memory.dmp

          Filesize

          468KB

        • memory/1868-304-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/1912-255-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/1912-59-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/1988-324-0x0000000002460000-0x00000000024D5000-memory.dmp

          Filesize

          468KB

        • memory/1988-317-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/1988-130-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/1988-141-0x0000000002460000-0x00000000024D5000-memory.dmp

          Filesize

          468KB

        • memory/2044-18-0x0000000001DC0000-0x0000000001E35000-memory.dmp

          Filesize

          468KB

        • memory/2044-207-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/2076-189-0x0000000002630000-0x00000000026A5000-memory.dmp

          Filesize

          468KB

        • memory/2076-191-0x0000000002630000-0x00000000026A5000-memory.dmp

          Filesize

          468KB

        • memory/2076-364-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/2076-371-0x0000000002630000-0x00000000026A5000-memory.dmp

          Filesize

          468KB

        • memory/2076-182-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/2148-201-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/2148-206-0x00000000024C0000-0x0000000002535000-memory.dmp

          Filesize

          468KB

        • memory/2148-8-0x00000000024C0000-0x0000000002535000-memory.dmp

          Filesize

          468KB

        • memory/2148-11-0x00000000024C0000-0x0000000002535000-memory.dmp

          Filesize

          468KB

        • memory/2148-0-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/2200-199-0x00000000025A0000-0x0000000002615000-memory.dmp

          Filesize

          468KB

        • memory/2200-198-0x00000000025A0000-0x0000000002615000-memory.dmp

          Filesize

          468KB

        • memory/2200-372-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/2272-202-0x00000000026A0000-0x0000000002715000-memory.dmp

          Filesize

          468KB

        • memory/2272-203-0x00000000026A0000-0x0000000002715000-memory.dmp

          Filesize

          468KB

        • memory/2272-200-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/2464-368-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/2552-248-0x0000000003460000-0x00000000034D5000-memory.dmp

          Filesize

          468KB

        • memory/2552-245-0x0000000003460000-0x00000000034D5000-memory.dmp

          Filesize

          468KB

        • memory/2552-237-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/2604-282-0x0000000002600000-0x0000000002675000-memory.dmp

          Filesize

          468KB

        • memory/2604-278-0x0000000002600000-0x0000000002675000-memory.dmp

          Filesize

          468KB

        • memory/2604-270-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/2656-221-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/2656-35-0x0000000001D20000-0x0000000001D95000-memory.dmp

          Filesize

          468KB

        • memory/2692-235-0x0000000002600000-0x0000000002675000-memory.dmp

          Filesize

          468KB

        • memory/2692-233-0x0000000002600000-0x0000000002675000-memory.dmp

          Filesize

          468KB

        • memory/2692-224-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/2716-327-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/2716-337-0x0000000001D80000-0x0000000001DF5000-memory.dmp

          Filesize

          468KB

        • memory/2716-338-0x0000000001D80000-0x0000000001DF5000-memory.dmp

          Filesize

          468KB

        • memory/2720-57-0x00000000033A0000-0x0000000003415000-memory.dmp

          Filesize

          468KB

        • memory/2720-254-0x00000000033A0000-0x0000000003415000-memory.dmp

          Filesize

          468KB

        • memory/2720-243-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/2776-213-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/2776-225-0x0000000000480000-0x00000000004F5000-memory.dmp

          Filesize

          468KB

        • memory/2788-290-0x0000000002720000-0x0000000002795000-memory.dmp

          Filesize

          468KB

        • memory/2788-281-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/2912-323-0x0000000002680000-0x00000000026F5000-memory.dmp

          Filesize

          468KB

        • memory/2912-316-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/2912-325-0x0000000002680000-0x00000000026F5000-memory.dmp

          Filesize

          468KB

        • memory/2932-339-0x0000000000400000-0x0000000000475000-memory.dmp

          Filesize

          468KB

        • memory/2932-352-0x0000000002660000-0x00000000026D5000-memory.dmp

          Filesize

          468KB