Analysis

  • max time kernel
    120s
  • max time network
    18s
  • platform
    windows7_x64
  • resource
    win7-20240903-en
  • resource tags

    arch:x64arch:x86image:win7-20240903-enlocale:en-usos:windows7-x64system
  • submitted
    21-09-2024 16:44

General

  • Target

    84e5f4b67e94a2c22fe6c9529c0f7f654787d7f42e234c306292dd956a3d65f6N.exe

  • Size

    468KB

  • MD5

    127f4361317411334a5fd883d171d090

  • SHA1

    25c5a959cde29854b751d5eedaf38f0d0e163744

  • SHA256

    84e5f4b67e94a2c22fe6c9529c0f7f654787d7f42e234c306292dd956a3d65f6

  • SHA512

    156847c3b45671c3f91fa980da3f61ec5d6257f3f11f58da96fba9a4c07cc5021c658a7b5efc0f2c553d2a3775507888faa3571a3b0beb3500869020b8471270

  • SSDEEP

    3072:d/KCogKxja8PFbYOP+eyzf8/vpB8XSpXjmHxXlFGw0w+FdtNa8ln:d/3otjPFFPByzf162ew0H3tNa

Score
7/10

Malware Config

Signatures

  • Executes dropped EXE 14 IoCs
  • Loads dropped DLL 35 IoCs
  • Program crash 1 IoCs
  • System Location Discovery: System Language Discovery 1 TTPs 15 IoCs

    Attempt gather information about the system language of a victim in order to infer the geographical location of that host.

  • Suspicious use of SetWindowsHookEx 15 IoCs
  • Suspicious use of WriteProcessMemory 60 IoCs

Processes

  • C:\Users\Admin\AppData\Local\Temp\84e5f4b67e94a2c22fe6c9529c0f7f654787d7f42e234c306292dd956a3d65f6N.exe
    "C:\Users\Admin\AppData\Local\Temp\84e5f4b67e94a2c22fe6c9529c0f7f654787d7f42e234c306292dd956a3d65f6N.exe"
    1⤵
    • Loads dropped DLL
    • System Location Discovery: System Language Discovery
    • Suspicious use of SetWindowsHookEx
    • Suspicious use of WriteProcessMemory
    PID:2952
    • C:\Users\Admin\AppData\Local\Temp\Unicorn-56307.exe
      C:\Users\Admin\AppData\Local\Temp\Unicorn-56307.exe
      2⤵
      • Executes dropped EXE
      • Loads dropped DLL
      • System Location Discovery: System Language Discovery
      • Suspicious use of SetWindowsHookEx
      • Suspicious use of WriteProcessMemory
      PID:2292
      • C:\Users\Admin\AppData\Local\Temp\Unicorn-39452.exe
        C:\Users\Admin\AppData\Local\Temp\Unicorn-39452.exe
        3⤵
        • Executes dropped EXE
        • Loads dropped DLL
        • System Location Discovery: System Language Discovery
        • Suspicious use of SetWindowsHookEx
        • Suspicious use of WriteProcessMemory
        PID:2928
        • C:\Users\Admin\AppData\Local\Temp\Unicorn-43593.exe
          C:\Users\Admin\AppData\Local\Temp\Unicorn-43593.exe
          4⤵
          • Executes dropped EXE
          • Loads dropped DLL
          • System Location Discovery: System Language Discovery
          • Suspicious use of SetWindowsHookEx
          • Suspicious use of WriteProcessMemory
          PID:2836
          • C:\Users\Admin\AppData\Local\Temp\Unicorn-63951.exe
            C:\Users\Admin\AppData\Local\Temp\Unicorn-63951.exe
            5⤵
            • Executes dropped EXE
            • Loads dropped DLL
            • System Location Discovery: System Language Discovery
            • Suspicious use of SetWindowsHookEx
            • Suspicious use of WriteProcessMemory
            PID:2576
            • C:\Users\Admin\AppData\Local\Temp\Unicorn-53401.exe
              C:\Users\Admin\AppData\Local\Temp\Unicorn-53401.exe
              6⤵
              • Executes dropped EXE
              • Loads dropped DLL
              • System Location Discovery: System Language Discovery
              • Suspicious use of SetWindowsHookEx
              • Suspicious use of WriteProcessMemory
              PID:340
              • C:\Users\Admin\AppData\Local\Temp\Unicorn-65098.exe
                C:\Users\Admin\AppData\Local\Temp\Unicorn-65098.exe
                7⤵
                • Executes dropped EXE
                • Loads dropped DLL
                • System Location Discovery: System Language Discovery
                • Suspicious use of SetWindowsHookEx
                • Suspicious use of WriteProcessMemory
                PID:1972
                • C:\Users\Admin\AppData\Local\Temp\Unicorn-54356.exe
                  C:\Users\Admin\AppData\Local\Temp\Unicorn-54356.exe
                  8⤵
                  • Executes dropped EXE
                  • Loads dropped DLL
                  • System Location Discovery: System Language Discovery
                  • Suspicious use of SetWindowsHookEx
                  • Suspicious use of WriteProcessMemory
                  PID:1264
                  • C:\Users\Admin\AppData\Local\Temp\Unicorn-900.exe
                    C:\Users\Admin\AppData\Local\Temp\Unicorn-900.exe
                    9⤵
                    • Executes dropped EXE
                    • Loads dropped DLL
                    • System Location Discovery: System Language Discovery
                    • Suspicious use of SetWindowsHookEx
                    • Suspicious use of WriteProcessMemory
                    PID:3048
                    • C:\Users\Admin\AppData\Local\Temp\Unicorn-42867.exe
                      C:\Users\Admin\AppData\Local\Temp\Unicorn-42867.exe
                      10⤵
                      • Executes dropped EXE
                      • Loads dropped DLL
                      • System Location Discovery: System Language Discovery
                      • Suspicious use of SetWindowsHookEx
                      • Suspicious use of WriteProcessMemory
                      PID:2960
                      • C:\Users\Admin\AppData\Local\Temp\Unicorn-65241.exe
                        C:\Users\Admin\AppData\Local\Temp\Unicorn-65241.exe
                        11⤵
                        • Executes dropped EXE
                        • Loads dropped DLL
                        • System Location Discovery: System Language Discovery
                        • Suspicious use of SetWindowsHookEx
                        • Suspicious use of WriteProcessMemory
                        PID:1632
                        • C:\Users\Admin\AppData\Local\Temp\Unicorn-50031.exe
                          C:\Users\Admin\AppData\Local\Temp\Unicorn-50031.exe
                          12⤵
                          • Executes dropped EXE
                          • Loads dropped DLL
                          • System Location Discovery: System Language Discovery
                          • Suspicious use of SetWindowsHookEx
                          • Suspicious use of WriteProcessMemory
                          PID:2220
                          • C:\Users\Admin\AppData\Local\Temp\Unicorn-51697.exe
                            C:\Users\Admin\AppData\Local\Temp\Unicorn-51697.exe
                            13⤵
                            • Executes dropped EXE
                            • Loads dropped DLL
                            • System Location Discovery: System Language Discovery
                            • Suspicious use of SetWindowsHookEx
                            • Suspicious use of WriteProcessMemory
                            PID:2580
                            • C:\Users\Admin\AppData\Local\Temp\Unicorn-11946.exe
                              C:\Users\Admin\AppData\Local\Temp\Unicorn-11946.exe
                              14⤵
                              • Executes dropped EXE
                              • Loads dropped DLL
                              • System Location Discovery: System Language Discovery
                              • Suspicious use of SetWindowsHookEx
                              • Suspicious use of WriteProcessMemory
                              PID:2080
                              • C:\Users\Admin\AppData\Local\Temp\Unicorn-29046.exe
                                C:\Users\Admin\AppData\Local\Temp\Unicorn-29046.exe
                                15⤵
                                • Executes dropped EXE
                                • System Location Discovery: System Language Discovery
                                • Suspicious use of SetWindowsHookEx
                                • Suspicious use of WriteProcessMemory
                                PID:2312
                                • C:\Windows\SysWOW64\WerFault.exe
                                  C:\Windows\SysWOW64\WerFault.exe -u -p 2312 -s 240
                                  16⤵
                                  • Loads dropped DLL
                                  • Program crash
                                  PID:2568

Network

MITRE ATT&CK Enterprise v15

Replay Monitor

Loading Replay Monitor...

Downloads

  • C:\Users\Admin\AppData\Local\Temp\Unicorn-43593.exe

    Filesize

    468KB

    MD5

    45e633988117d17e79ba1d39c6a46666

    SHA1

    7a6361858821a8b891b7089d6ce6d442f424c69d

    SHA256

    187760db01b8585eca4bf25ae75f2f4bf688c1472470004aeae13497b8b8a2ac

    SHA512

    7d2707804efbb94506acac742e083f52960fd9c8aa997deeb2b5151b13d537a57bff9d7c2b6b0ac846c05f50e0cc1bc27431d104d1551bffafc8e4b5b7a4c600

  • C:\Users\Admin\AppData\Local\Temp\Unicorn-50031.exe

    Filesize

    468KB

    MD5

    62daaa26f01c96e563fdb8a8f6a26fb6

    SHA1

    587fe84a9d5d2521f1a232420d45cb7bc2c4b142

    SHA256

    f997ded0b83505107288916e7994ad170b630f8067e526058efcfca3733b7271

    SHA512

    934a42ec4fc1e76d701c526fc3a3644e1b4f2737287ebdda3f90c65c9e7f0757f28099374440ddfe02cf910cebfec155d45efa74093f563d8250248981ff9e23

  • C:\Users\Admin\AppData\Local\Temp\Unicorn-54356.exe

    Filesize

    468KB

    MD5

    8dbac6c299d48777f233aa30663d7b61

    SHA1

    31b2b9df6ad97d6703c48a3a8b979404206df521

    SHA256

    1ce59578963d5f7cd916b94418fbdde9cf82926abebcaafb12dbd2f33eb22e7a

    SHA512

    c64c948a1267e162696f24cc4e9347aca904ef1cbad0a1263ede6d7679f35fd0308949c80c0e0c0c7c59e792be0e10c9d940b4364e3b9a653d57116acf60deea

  • \Users\Admin\AppData\Local\Temp\Unicorn-11946.exe

    Filesize

    468KB

    MD5

    ee6543ef7b5f3120d844c450eec9b2d5

    SHA1

    0840fa478bd50b552ac3c526f21d4611fea612a5

    SHA256

    5b481c9c65544f99ed1d0e2cd96f12e50d4e7a3f978aff8186b71b15bbd2a070

    SHA512

    c1f1ce510dbe1219fe5b760298e18bf5acbda32c18d1512c71b43dd45303941d4438ec07630ec67c48ad92f6c1c42b19bd8ceaf63da1564f15176d5c762ed283

  • \Users\Admin\AppData\Local\Temp\Unicorn-29046.exe

    Filesize

    468KB

    MD5

    79ded282aa374b812ddf1ae48c4ae06a

    SHA1

    90a81f8aba406349ffa76516af46ff1c9d62094e

    SHA256

    60a7f2300e332353c149f5114b774ce940deb06c1b95291d82994ca55f528edf

    SHA512

    286222a2b06529ea9d1e00ed7109026ff0ea77fd41e6fdb1398b2d6af87389cb0af24848218d059f645697b5d77a85a0a50abb84c3de5becbb5fa165288c16b0

  • \Users\Admin\AppData\Local\Temp\Unicorn-39452.exe

    Filesize

    468KB

    MD5

    f34de28a89dc87ad93f5c73d94291d26

    SHA1

    dc504537c9377bbe596646041520e103083e2480

    SHA256

    4b632e13b6f9b8df8d8043f63c203cbf3d79501654774ec74da16c74f587570b

    SHA512

    3d9595509f2c2c72d63efa285a936793b92d50b3add9cff066bc5b1ea547f83eea448f4e76693484a2a5474eafd4ea1131a1f5c179936f8bb8fc54101da60f61

  • \Users\Admin\AppData\Local\Temp\Unicorn-42867.exe

    Filesize

    468KB

    MD5

    1dd9c50b0d3bb62d8a7549f8c96baf54

    SHA1

    b8b6fe5d632ecbc3a0e56b098ce0477e27df7464

    SHA256

    59cff82dae84de4844a9cef988b84347ae9846c295993a8d4b769741d3a569d5

    SHA512

    219a7db1224808e38772cc93d2be04622fa54c0849ed5bd49351ebea256b2c290b301fd3b7e9425222d4b80cb4d425361de24558e7899ac19ea4bee17b9905ec

  • \Users\Admin\AppData\Local\Temp\Unicorn-51697.exe

    Filesize

    468KB

    MD5

    c76ba158e0c5eb97da488531fe148cce

    SHA1

    1ab25bc5b062660f3f68dff5667920dc244f83c2

    SHA256

    532222d6268716a5b8509fc0c44ea3f17dfaa1837b015600ba8b0a124ad3169a

    SHA512

    5109ff64827eed51013272daa6dfe9f23d449e6b5f19c1157eedaca2eef62e6ba652f0fcb236d71e20008765f9d9ab4d54361ac0fc18700186704e1a2549c7fd

  • \Users\Admin\AppData\Local\Temp\Unicorn-53401.exe

    Filesize

    468KB

    MD5

    a12866012d66d5de10739a3f4db82221

    SHA1

    bf4ab6535313fc98aafb79ec7bc579a007b2d1f8

    SHA256

    f6434a4586b705452dfbb57b43aa83e7d750d4b77a77a4b98690610d2ba83573

    SHA512

    6fdd13d4b002580c944f329ece5c3c2d5ff58b101757ee9bde96baea4c494bbe421fd091444f6bb6f73d966be9c9cd53900202372519bec43a903efc8210869b

  • \Users\Admin\AppData\Local\Temp\Unicorn-56307.exe

    Filesize

    468KB

    MD5

    6e6bbefab1c881d53d6b6c5419be0138

    SHA1

    d0f249512bfa783b48cc2da6960a1b00769c9d41

    SHA256

    1c65b632499d0f9bee1a033d60be518dd86431c83ef7b7ee2139ba2c3623e6d0

    SHA512

    3afe94fe3cce9fa31e35ebfd68d7509636d6f2a5dccc0fed626f043ebd40769cb7ed89e12ecd0d3d8010ecb2c16f3b26825b824c2854130a349c81eab211c797

  • \Users\Admin\AppData\Local\Temp\Unicorn-63951.exe

    Filesize

    468KB

    MD5

    374543671032257208761fb7fd356b67

    SHA1

    bc8d36d4a03ca7f1aa9dde03b9b735b6291354cf

    SHA256

    624126dff5868a1f04b0501c7ebe51c6191c69476e3605dc9a2323659bc29174

    SHA512

    ed9dd8085b1bb06960f9ad2915b7ddd30173267aed4aa3970edd8c8bc44fe0574c5803f9b4d035a6cb9e1f56d03fd7ba44083aabb6e350a486f21b11c4301060

  • \Users\Admin\AppData\Local\Temp\Unicorn-65098.exe

    Filesize

    468KB

    MD5

    0bfdb86f04278d9777eb1ccfcf84b4a6

    SHA1

    106c059c13c6cfcd40539658060248a917a1931d

    SHA256

    4caa35c6f9ea6a6586bb6602393453e3beeda92cd175d01b32e5e5269bd8e388

    SHA512

    f5602bb8e7227686f54e023035de134aa6d88bc888f9447906af4351ebd8ce5400e1420dbb811a200d25dd70c974611592c387839e2fc1558bbb5e8ee14809f7

  • \Users\Admin\AppData\Local\Temp\Unicorn-65241.exe

    Filesize

    468KB

    MD5

    d9b269a1e426155b3584a9403a809958

    SHA1

    8d35e2a8af96005dd65d083af939b1645b5266dd

    SHA256

    1d8371e99089ccfe32cea2c91846fe32375582497a4e1da39085c719e6d5c1c7

    SHA512

    526a655bbdfd120290097c16cf7b0e0b9ab1d1ad329a25191b127840864e6458025f1ed58202dfb7328ab8dbb48211b2f00a90b80d75efc4bc46ab67be4fa1c8

  • \Users\Admin\AppData\Local\Temp\Unicorn-900.exe

    Filesize

    468KB

    MD5

    bf7c783d7cf68760651a173c49e205f9

    SHA1

    ffbb34815ad26c9b9782353838b93a7967b698ba

    SHA256

    393061983d6ba8718a64a8b52877028046d978589aa8080892e4c98625ec5ec7

    SHA512

    166ed263243e2ff43564d459e2073b0cea186e1c8e85738eda33b0ba14a8692cf1e9db14128ee95c83872e966450839e58fb24b310b08b54649cd618fd251ace

  • memory/340-192-0x0000000000400000-0x0000000000475000-memory.dmp

    Filesize

    468KB

  • memory/340-193-0x0000000002410000-0x0000000002485000-memory.dmp

    Filesize

    468KB

  • memory/340-62-0x0000000000400000-0x0000000000475000-memory.dmp

    Filesize

    468KB

  • memory/1264-195-0x0000000000400000-0x0000000000475000-memory.dmp

    Filesize

    468KB

  • memory/1264-86-0x0000000000400000-0x0000000000475000-memory.dmp

    Filesize

    468KB

  • memory/1264-196-0x00000000035D0000-0x0000000003645000-memory.dmp

    Filesize

    468KB

  • memory/1632-133-0x0000000002760000-0x00000000027D5000-memory.dmp

    Filesize

    468KB

  • memory/1632-134-0x0000000002760000-0x00000000027D5000-memory.dmp

    Filesize

    468KB

  • memory/1972-74-0x0000000000400000-0x0000000000475000-memory.dmp

    Filesize

    468KB

  • memory/1972-194-0x0000000000400000-0x0000000000475000-memory.dmp

    Filesize

    468KB

  • memory/2080-176-0x00000000024C0000-0x0000000002535000-memory.dmp

    Filesize

    468KB

  • memory/2220-136-0x0000000000400000-0x0000000000475000-memory.dmp

    Filesize

    468KB

  • memory/2220-149-0x0000000000360000-0x00000000003D5000-memory.dmp

    Filesize

    468KB

  • memory/2220-148-0x0000000000360000-0x00000000003D5000-memory.dmp

    Filesize

    468KB

  • memory/2292-23-0x0000000001E40000-0x0000000001EB5000-memory.dmp

    Filesize

    468KB

  • memory/2292-186-0x0000000000400000-0x0000000000475000-memory.dmp

    Filesize

    468KB

  • memory/2292-187-0x0000000001E40000-0x0000000001EB5000-memory.dmp

    Filesize

    468KB

  • memory/2312-177-0x0000000000400000-0x0000000000475000-memory.dmp

    Filesize

    468KB

  • memory/2576-190-0x0000000000400000-0x0000000000475000-memory.dmp

    Filesize

    468KB

  • memory/2576-50-0x0000000000400000-0x0000000000475000-memory.dmp

    Filesize

    468KB

  • memory/2580-150-0x0000000000400000-0x0000000000475000-memory.dmp

    Filesize

    468KB

  • memory/2580-157-0x0000000001EF0000-0x0000000001F65000-memory.dmp

    Filesize

    468KB

  • memory/2580-162-0x0000000001EF0000-0x0000000001F65000-memory.dmp

    Filesize

    468KB

  • memory/2836-189-0x0000000000400000-0x0000000000475000-memory.dmp

    Filesize

    468KB

  • memory/2836-38-0x0000000000400000-0x0000000000475000-memory.dmp

    Filesize

    468KB

  • memory/2928-36-0x0000000002730000-0x00000000027A5000-memory.dmp

    Filesize

    468KB

  • memory/2928-188-0x0000000000400000-0x0000000000475000-memory.dmp

    Filesize

    468KB

  • memory/2928-25-0x0000000000400000-0x0000000000475000-memory.dmp

    Filesize

    468KB

  • memory/2952-175-0x0000000000400000-0x0000000000475000-memory.dmp

    Filesize

    468KB

  • memory/2952-0-0x0000000000400000-0x0000000000475000-memory.dmp

    Filesize

    468KB

  • memory/2952-10-0x0000000002620000-0x0000000002695000-memory.dmp

    Filesize

    468KB

  • memory/2952-11-0x0000000002620000-0x0000000002695000-memory.dmp

    Filesize

    468KB

  • memory/2960-110-0x0000000000400000-0x0000000000475000-memory.dmp

    Filesize

    468KB

  • memory/2960-117-0x00000000024E0000-0x0000000002555000-memory.dmp

    Filesize

    468KB

  • memory/3048-98-0x0000000000400000-0x0000000000475000-memory.dmp

    Filesize

    468KB

  • memory/3048-197-0x0000000000400000-0x0000000000475000-memory.dmp

    Filesize

    468KB