Analysis
-
max time kernel
120s -
max time network
18s -
platform
windows7_x64 -
resource
win7-20240903-en -
resource tags
arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system -
submitted
21-09-2024 16:44
Static task
static1
Behavioral task
behavioral1
Sample
84e5f4b67e94a2c22fe6c9529c0f7f654787d7f42e234c306292dd956a3d65f6N.exe
Resource
win7-20240903-en
Behavioral task
behavioral2
Sample
84e5f4b67e94a2c22fe6c9529c0f7f654787d7f42e234c306292dd956a3d65f6N.exe
Resource
win10v2004-20240802-en
General
-
Target
84e5f4b67e94a2c22fe6c9529c0f7f654787d7f42e234c306292dd956a3d65f6N.exe
-
Size
468KB
-
MD5
127f4361317411334a5fd883d171d090
-
SHA1
25c5a959cde29854b751d5eedaf38f0d0e163744
-
SHA256
84e5f4b67e94a2c22fe6c9529c0f7f654787d7f42e234c306292dd956a3d65f6
-
SHA512
156847c3b45671c3f91fa980da3f61ec5d6257f3f11f58da96fba9a4c07cc5021c658a7b5efc0f2c553d2a3775507888faa3571a3b0beb3500869020b8471270
-
SSDEEP
3072:d/KCogKxja8PFbYOP+eyzf8/vpB8XSpXjmHxXlFGw0w+FdtNa8ln:d/3otjPFFPByzf162ew0H3tNa
Malware Config
Signatures
-
Executes dropped EXE 14 IoCs
pid Process 2292 Unicorn-56307.exe 2928 Unicorn-39452.exe 2836 Unicorn-43593.exe 2576 Unicorn-63951.exe 340 Unicorn-53401.exe 1972 Unicorn-65098.exe 1264 Unicorn-54356.exe 3048 Unicorn-900.exe 2960 Unicorn-42867.exe 1632 Unicorn-65241.exe 2220 Unicorn-50031.exe 2580 Unicorn-51697.exe 2080 Unicorn-11946.exe 2312 Unicorn-29046.exe -
Loads dropped DLL 35 IoCs
pid Process 2952 84e5f4b67e94a2c22fe6c9529c0f7f654787d7f42e234c306292dd956a3d65f6N.exe 2952 84e5f4b67e94a2c22fe6c9529c0f7f654787d7f42e234c306292dd956a3d65f6N.exe 2292 Unicorn-56307.exe 2292 Unicorn-56307.exe 2928 Unicorn-39452.exe 2928 Unicorn-39452.exe 2836 Unicorn-43593.exe 2836 Unicorn-43593.exe 2576 Unicorn-63951.exe 2576 Unicorn-63951.exe 340 Unicorn-53401.exe 340 Unicorn-53401.exe 1972 Unicorn-65098.exe 1972 Unicorn-65098.exe 1264 Unicorn-54356.exe 1264 Unicorn-54356.exe 3048 Unicorn-900.exe 3048 Unicorn-900.exe 2960 Unicorn-42867.exe 2960 Unicorn-42867.exe 1632 Unicorn-65241.exe 1632 Unicorn-65241.exe 2220 Unicorn-50031.exe 2220 Unicorn-50031.exe 2580 Unicorn-51697.exe 2580 Unicorn-51697.exe 2080 Unicorn-11946.exe 2080 Unicorn-11946.exe 2568 WerFault.exe 2568 WerFault.exe 2568 WerFault.exe 2568 WerFault.exe 2568 WerFault.exe 2568 WerFault.exe 2568 WerFault.exe -
Program crash 1 IoCs
pid pid_target Process procid_target 2568 2312 WerFault.exe 42 -
System Location Discovery: System Language Discovery 1 TTPs 15 IoCs
Attempt gather information about the system language of a victim in order to infer the geographical location of that host.
description ioc Process Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-65098.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-54356.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-65241.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-11946.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-29046.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-43593.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-63951.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-50031.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-56307.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-53401.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-900.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language 84e5f4b67e94a2c22fe6c9529c0f7f654787d7f42e234c306292dd956a3d65f6N.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-39452.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-42867.exe Key opened \REGISTRY\MACHINE\SYSTEM\ControlSet001\Control\NLS\Language Unicorn-51697.exe -
Suspicious use of SetWindowsHookEx 15 IoCs
pid Process 2952 84e5f4b67e94a2c22fe6c9529c0f7f654787d7f42e234c306292dd956a3d65f6N.exe 2292 Unicorn-56307.exe 2928 Unicorn-39452.exe 2836 Unicorn-43593.exe 2576 Unicorn-63951.exe 340 Unicorn-53401.exe 1972 Unicorn-65098.exe 1264 Unicorn-54356.exe 3048 Unicorn-900.exe 2960 Unicorn-42867.exe 1632 Unicorn-65241.exe 2220 Unicorn-50031.exe 2580 Unicorn-51697.exe 2080 Unicorn-11946.exe 2312 Unicorn-29046.exe -
Suspicious use of WriteProcessMemory 60 IoCs
description pid Process procid_target PID 2952 wrote to memory of 2292 2952 84e5f4b67e94a2c22fe6c9529c0f7f654787d7f42e234c306292dd956a3d65f6N.exe 29 PID 2952 wrote to memory of 2292 2952 84e5f4b67e94a2c22fe6c9529c0f7f654787d7f42e234c306292dd956a3d65f6N.exe 29 PID 2952 wrote to memory of 2292 2952 84e5f4b67e94a2c22fe6c9529c0f7f654787d7f42e234c306292dd956a3d65f6N.exe 29 PID 2952 wrote to memory of 2292 2952 84e5f4b67e94a2c22fe6c9529c0f7f654787d7f42e234c306292dd956a3d65f6N.exe 29 PID 2292 wrote to memory of 2928 2292 Unicorn-56307.exe 30 PID 2292 wrote to memory of 2928 2292 Unicorn-56307.exe 30 PID 2292 wrote to memory of 2928 2292 Unicorn-56307.exe 30 PID 2292 wrote to memory of 2928 2292 Unicorn-56307.exe 30 PID 2928 wrote to memory of 2836 2928 Unicorn-39452.exe 31 PID 2928 wrote to memory of 2836 2928 Unicorn-39452.exe 31 PID 2928 wrote to memory of 2836 2928 Unicorn-39452.exe 31 PID 2928 wrote to memory of 2836 2928 Unicorn-39452.exe 31 PID 2836 wrote to memory of 2576 2836 Unicorn-43593.exe 32 PID 2836 wrote to memory of 2576 2836 Unicorn-43593.exe 32 PID 2836 wrote to memory of 2576 2836 Unicorn-43593.exe 32 PID 2836 wrote to memory of 2576 2836 Unicorn-43593.exe 32 PID 2576 wrote to memory of 340 2576 Unicorn-63951.exe 33 PID 2576 wrote to memory of 340 2576 Unicorn-63951.exe 33 PID 2576 wrote to memory of 340 2576 Unicorn-63951.exe 33 PID 2576 wrote to memory of 340 2576 Unicorn-63951.exe 33 PID 340 wrote to memory of 1972 340 Unicorn-53401.exe 34 PID 340 wrote to memory of 1972 340 Unicorn-53401.exe 34 PID 340 wrote to memory of 1972 340 Unicorn-53401.exe 34 PID 340 wrote to memory of 1972 340 Unicorn-53401.exe 34 PID 1972 wrote to memory of 1264 1972 Unicorn-65098.exe 35 PID 1972 wrote to memory of 1264 1972 Unicorn-65098.exe 35 PID 1972 wrote to memory of 1264 1972 Unicorn-65098.exe 35 PID 1972 wrote to memory of 1264 1972 Unicorn-65098.exe 35 PID 1264 wrote to memory of 3048 1264 Unicorn-54356.exe 36 PID 1264 wrote to memory of 3048 1264 Unicorn-54356.exe 36 PID 1264 wrote to memory of 3048 1264 Unicorn-54356.exe 36 PID 1264 wrote to memory of 3048 1264 Unicorn-54356.exe 36 PID 3048 wrote to memory of 2960 3048 Unicorn-900.exe 37 PID 3048 wrote to memory of 2960 3048 Unicorn-900.exe 37 PID 3048 wrote to memory of 2960 3048 Unicorn-900.exe 37 PID 3048 wrote to memory of 2960 3048 Unicorn-900.exe 37 PID 2960 wrote to memory of 1632 2960 Unicorn-42867.exe 38 PID 2960 wrote to memory of 1632 2960 Unicorn-42867.exe 38 PID 2960 wrote to memory of 1632 2960 Unicorn-42867.exe 38 PID 2960 wrote to memory of 1632 2960 Unicorn-42867.exe 38 PID 1632 wrote to memory of 2220 1632 Unicorn-65241.exe 39 PID 1632 wrote to memory of 2220 1632 Unicorn-65241.exe 39 PID 1632 wrote to memory of 2220 1632 Unicorn-65241.exe 39 PID 1632 wrote to memory of 2220 1632 Unicorn-65241.exe 39 PID 2220 wrote to memory of 2580 2220 Unicorn-50031.exe 40 PID 2220 wrote to memory of 2580 2220 Unicorn-50031.exe 40 PID 2220 wrote to memory of 2580 2220 Unicorn-50031.exe 40 PID 2220 wrote to memory of 2580 2220 Unicorn-50031.exe 40 PID 2580 wrote to memory of 2080 2580 Unicorn-51697.exe 41 PID 2580 wrote to memory of 2080 2580 Unicorn-51697.exe 41 PID 2580 wrote to memory of 2080 2580 Unicorn-51697.exe 41 PID 2580 wrote to memory of 2080 2580 Unicorn-51697.exe 41 PID 2080 wrote to memory of 2312 2080 Unicorn-11946.exe 42 PID 2080 wrote to memory of 2312 2080 Unicorn-11946.exe 42 PID 2080 wrote to memory of 2312 2080 Unicorn-11946.exe 42 PID 2080 wrote to memory of 2312 2080 Unicorn-11946.exe 42 PID 2312 wrote to memory of 2568 2312 Unicorn-29046.exe 43 PID 2312 wrote to memory of 2568 2312 Unicorn-29046.exe 43 PID 2312 wrote to memory of 2568 2312 Unicorn-29046.exe 43 PID 2312 wrote to memory of 2568 2312 Unicorn-29046.exe 43
Processes
-
C:\Users\Admin\AppData\Local\Temp\84e5f4b67e94a2c22fe6c9529c0f7f654787d7f42e234c306292dd956a3d65f6N.exe"C:\Users\Admin\AppData\Local\Temp\84e5f4b67e94a2c22fe6c9529c0f7f654787d7f42e234c306292dd956a3d65f6N.exe"1⤵
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2952 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-56307.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-56307.exe2⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2292 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-39452.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-39452.exe3⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2928 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-43593.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-43593.exe4⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2836 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-63951.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-63951.exe5⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2576 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-53401.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-53401.exe6⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:340 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-65098.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65098.exe7⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1972 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-54356.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-54356.exe8⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1264 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-900.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-900.exe9⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:3048 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-42867.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-42867.exe10⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2960 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-65241.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-65241.exe11⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1632 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-50031.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-50031.exe12⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2220 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-51697.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-51697.exe13⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2580 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-11946.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-11946.exe14⤵
- Executes dropped EXE
- Loads dropped DLL
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2080 -
C:\Users\Admin\AppData\Local\Temp\Unicorn-29046.exeC:\Users\Admin\AppData\Local\Temp\Unicorn-29046.exe15⤵
- Executes dropped EXE
- System Location Discovery: System Language Discovery
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:2312 -
C:\Windows\SysWOW64\WerFault.exeC:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 24016⤵
- Loads dropped DLL
- Program crash
PID:2568
-
-
-
-
-
-
-
-
-
-
-
-
-
-
-
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
468KB
MD545e633988117d17e79ba1d39c6a46666
SHA17a6361858821a8b891b7089d6ce6d442f424c69d
SHA256187760db01b8585eca4bf25ae75f2f4bf688c1472470004aeae13497b8b8a2ac
SHA5127d2707804efbb94506acac742e083f52960fd9c8aa997deeb2b5151b13d537a57bff9d7c2b6b0ac846c05f50e0cc1bc27431d104d1551bffafc8e4b5b7a4c600
-
Filesize
468KB
MD562daaa26f01c96e563fdb8a8f6a26fb6
SHA1587fe84a9d5d2521f1a232420d45cb7bc2c4b142
SHA256f997ded0b83505107288916e7994ad170b630f8067e526058efcfca3733b7271
SHA512934a42ec4fc1e76d701c526fc3a3644e1b4f2737287ebdda3f90c65c9e7f0757f28099374440ddfe02cf910cebfec155d45efa74093f563d8250248981ff9e23
-
Filesize
468KB
MD58dbac6c299d48777f233aa30663d7b61
SHA131b2b9df6ad97d6703c48a3a8b979404206df521
SHA2561ce59578963d5f7cd916b94418fbdde9cf82926abebcaafb12dbd2f33eb22e7a
SHA512c64c948a1267e162696f24cc4e9347aca904ef1cbad0a1263ede6d7679f35fd0308949c80c0e0c0c7c59e792be0e10c9d940b4364e3b9a653d57116acf60deea
-
Filesize
468KB
MD5ee6543ef7b5f3120d844c450eec9b2d5
SHA10840fa478bd50b552ac3c526f21d4611fea612a5
SHA2565b481c9c65544f99ed1d0e2cd96f12e50d4e7a3f978aff8186b71b15bbd2a070
SHA512c1f1ce510dbe1219fe5b760298e18bf5acbda32c18d1512c71b43dd45303941d4438ec07630ec67c48ad92f6c1c42b19bd8ceaf63da1564f15176d5c762ed283
-
Filesize
468KB
MD579ded282aa374b812ddf1ae48c4ae06a
SHA190a81f8aba406349ffa76516af46ff1c9d62094e
SHA25660a7f2300e332353c149f5114b774ce940deb06c1b95291d82994ca55f528edf
SHA512286222a2b06529ea9d1e00ed7109026ff0ea77fd41e6fdb1398b2d6af87389cb0af24848218d059f645697b5d77a85a0a50abb84c3de5becbb5fa165288c16b0
-
Filesize
468KB
MD5f34de28a89dc87ad93f5c73d94291d26
SHA1dc504537c9377bbe596646041520e103083e2480
SHA2564b632e13b6f9b8df8d8043f63c203cbf3d79501654774ec74da16c74f587570b
SHA5123d9595509f2c2c72d63efa285a936793b92d50b3add9cff066bc5b1ea547f83eea448f4e76693484a2a5474eafd4ea1131a1f5c179936f8bb8fc54101da60f61
-
Filesize
468KB
MD51dd9c50b0d3bb62d8a7549f8c96baf54
SHA1b8b6fe5d632ecbc3a0e56b098ce0477e27df7464
SHA25659cff82dae84de4844a9cef988b84347ae9846c295993a8d4b769741d3a569d5
SHA512219a7db1224808e38772cc93d2be04622fa54c0849ed5bd49351ebea256b2c290b301fd3b7e9425222d4b80cb4d425361de24558e7899ac19ea4bee17b9905ec
-
Filesize
468KB
MD5c76ba158e0c5eb97da488531fe148cce
SHA11ab25bc5b062660f3f68dff5667920dc244f83c2
SHA256532222d6268716a5b8509fc0c44ea3f17dfaa1837b015600ba8b0a124ad3169a
SHA5125109ff64827eed51013272daa6dfe9f23d449e6b5f19c1157eedaca2eef62e6ba652f0fcb236d71e20008765f9d9ab4d54361ac0fc18700186704e1a2549c7fd
-
Filesize
468KB
MD5a12866012d66d5de10739a3f4db82221
SHA1bf4ab6535313fc98aafb79ec7bc579a007b2d1f8
SHA256f6434a4586b705452dfbb57b43aa83e7d750d4b77a77a4b98690610d2ba83573
SHA5126fdd13d4b002580c944f329ece5c3c2d5ff58b101757ee9bde96baea4c494bbe421fd091444f6bb6f73d966be9c9cd53900202372519bec43a903efc8210869b
-
Filesize
468KB
MD56e6bbefab1c881d53d6b6c5419be0138
SHA1d0f249512bfa783b48cc2da6960a1b00769c9d41
SHA2561c65b632499d0f9bee1a033d60be518dd86431c83ef7b7ee2139ba2c3623e6d0
SHA5123afe94fe3cce9fa31e35ebfd68d7509636d6f2a5dccc0fed626f043ebd40769cb7ed89e12ecd0d3d8010ecb2c16f3b26825b824c2854130a349c81eab211c797
-
Filesize
468KB
MD5374543671032257208761fb7fd356b67
SHA1bc8d36d4a03ca7f1aa9dde03b9b735b6291354cf
SHA256624126dff5868a1f04b0501c7ebe51c6191c69476e3605dc9a2323659bc29174
SHA512ed9dd8085b1bb06960f9ad2915b7ddd30173267aed4aa3970edd8c8bc44fe0574c5803f9b4d035a6cb9e1f56d03fd7ba44083aabb6e350a486f21b11c4301060
-
Filesize
468KB
MD50bfdb86f04278d9777eb1ccfcf84b4a6
SHA1106c059c13c6cfcd40539658060248a917a1931d
SHA2564caa35c6f9ea6a6586bb6602393453e3beeda92cd175d01b32e5e5269bd8e388
SHA512f5602bb8e7227686f54e023035de134aa6d88bc888f9447906af4351ebd8ce5400e1420dbb811a200d25dd70c974611592c387839e2fc1558bbb5e8ee14809f7
-
Filesize
468KB
MD5d9b269a1e426155b3584a9403a809958
SHA18d35e2a8af96005dd65d083af939b1645b5266dd
SHA2561d8371e99089ccfe32cea2c91846fe32375582497a4e1da39085c719e6d5c1c7
SHA512526a655bbdfd120290097c16cf7b0e0b9ab1d1ad329a25191b127840864e6458025f1ed58202dfb7328ab8dbb48211b2f00a90b80d75efc4bc46ab67be4fa1c8
-
Filesize
468KB
MD5bf7c783d7cf68760651a173c49e205f9
SHA1ffbb34815ad26c9b9782353838b93a7967b698ba
SHA256393061983d6ba8718a64a8b52877028046d978589aa8080892e4c98625ec5ec7
SHA512166ed263243e2ff43564d459e2073b0cea186e1c8e85738eda33b0ba14a8692cf1e9db14128ee95c83872e966450839e58fb24b310b08b54649cd618fd251ace