| File name: | 1 (1101) |
| Full analysis: | https://app.any.run/tasks/123b0b37-e119-4183-a6ab-892a3a90b41b |
| Verdict: | Malicious activity |
| Analysis date: | March 24, 2025, 09:43:14 |
| OS: | Windows 10 Professional (build: 19045, 64 bit) |
| Indicators: | |
| MIME: | application/vnd.microsoft.portable-executable |
| File info: | PE32 executable (GUI) Intel 80386, for MS Windows, 3 sections |
| MD5: | 687813B9D17E5131860C9D523D6F7920 |
| SHA1: | B60C41F9D6E6E46B90F824BDFBBD54C2788A3BEF |
| SHA256: | B81DCCC7D5548BFC238165735A90E6BCFB9419491C832CB659B70F56E4BC81DD |
| SSDEEP: | 6144:jSN9UsItiDdoA5lHpSYQOofx5tBqZvJGBC/W0eelnk/8S3jwpyAAEgF6fH6peBmT:jkebWoA51pXGBghaCO0eel8u4DxmDsR |
| .exe | | | Win32 Executable (generic) (52.9) |
|---|---|---|
| .exe | | | Generic Win/DOS Executable (23.5) |
| .exe | | | DOS Executable Generic (23.5) |
| MachineType: | Intel 386 or later, and compatibles |
|---|---|
| TimeStamp: | 2019:01:19 13:34:56+00:00 |
| ImageFileCharacteristics: | No relocs, Executable, No line numbers, No symbols, 32-bit |
| PEType: | PE32 |
| LinkerVersion: | 6 |
| CodeSize: | 176128 |
| InitializedDataSize: | 299008 |
| UninitializedDataSize: | - |
| EntryPoint: | 0x13d4 |
| OSVersion: | 4 |
| ImageVersion: | 1 |
| SubsystemVersion: | 4 |
| Subsystem: | Windows GUI |
| FileVersionNumber: | 1.0.0.0 |
| ProductVersionNumber: | 1.0.0.0 |
| FileFlagsMask: | 0x003f |
| FileFlags: | (none) |
| FileOS: | Win32 |
| ObjectFileType: | Executable application |
| FileSubtype: | - |
| LanguageCode: | Chinese (Simplified) |
| CharacterSet: | Unicode |
| CompanyName: | UEFI |
| ProductName: | Kawaii-Unicorn |
| FileVersion: | 1 |
| ProductVersion: | 1 |
| InternalName: | Kawaii-Unicorn |
| OriginalFileName: | Kawaii-Unicorn.exe |
PID | CMD | Path | Indicators | Parent process | |||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| 456 | C:\Users\admin\AppData\Local\Temp\Unicorn-15292.exe | C:\Users\admin\AppData\Local\Temp\Unicorn-15292.exe | Unicorn-5655.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Modules
| |||||||||||||||
| 632 | C:\Users\admin\AppData\Local\Temp\Unicorn-4124.exe | C:\Users\admin\AppData\Local\Temp\Unicorn-4124.exe | Unicorn-2012.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Modules
| |||||||||||||||
| 672 | C:\Users\admin\AppData\Local\Temp\Unicorn-22391.exe | C:\Users\admin\AppData\Local\Temp\Unicorn-22391.exe | — | Unicorn-175.exe | |||||||||||
User: admin Integrity Level: MEDIUM Modules
| |||||||||||||||
| 900 | C:\Users\admin\AppData\Local\Temp\Unicorn-36127.exe | C:\Users\admin\AppData\Local\Temp\Unicorn-36127.exe | — | Unicorn-860.exe | |||||||||||
User: admin Integrity Level: MEDIUM Modules
| |||||||||||||||
| 968 | C:\Users\admin\AppData\Local\Temp\Unicorn-13268.exe | C:\Users\admin\AppData\Local\Temp\Unicorn-13268.exe | Unicorn-19091.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Modules
| |||||||||||||||
| 1040 | C:\Users\admin\AppData\Local\Temp\Unicorn-11820.exe | C:\Users\admin\AppData\Local\Temp\Unicorn-11820.exe | Unicorn-4124.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Modules
| |||||||||||||||
| 1052 | C:\Users\admin\AppData\Local\Temp\Unicorn-47212.exe | C:\Users\admin\AppData\Local\Temp\Unicorn-47212.exe | Unicorn-64020.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Modules
| |||||||||||||||
| 1228 | C:\Users\admin\AppData\Local\Temp\Unicorn-2012.exe | C:\Users\admin\AppData\Local\Temp\Unicorn-2012.exe | Unicorn-31937.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Modules
| |||||||||||||||
| 1240 | C:\Users\admin\AppData\Local\Temp\Unicorn-46339.exe | C:\Users\admin\AppData\Local\Temp\Unicorn-46339.exe | Unicorn-31937.exe | ||||||||||||
User: admin Integrity Level: MEDIUM Modules
| |||||||||||||||
| 1324 | C:\Users\admin\AppData\Local\Temp\Unicorn-60372.exe | C:\Users\admin\AppData\Local\Temp\Unicorn-60372.exe | 1 (1101).exe | ||||||||||||
User: admin Integrity Level: MEDIUM Modules
| |||||||||||||||
| (PID) Process: | (5084) BackgroundTransferHost.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.contentdeliverymanager_cw5n1h2txyewy\Internet Settings\Cache\Content |
| Operation: | write | Name: | CachePrefix |
Value: | |||
| (PID) Process: | (5084) BackgroundTransferHost.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.contentdeliverymanager_cw5n1h2txyewy\Internet Settings\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (5084) BackgroundTransferHost.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.contentdeliverymanager_cw5n1h2txyewy\Internet Settings\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
| (PID) Process: | (7608) BackgroundTransferHost.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.contentdeliverymanager_cw5n1h2txyewy\Internet Settings\Cache\Content |
| Operation: | write | Name: | CachePrefix |
Value: | |||
| (PID) Process: | (7608) BackgroundTransferHost.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.contentdeliverymanager_cw5n1h2txyewy\Internet Settings\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (7608) BackgroundTransferHost.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.contentdeliverymanager_cw5n1h2txyewy\Internet Settings\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
| (PID) Process: | (7880) BackgroundTransferHost.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.contentdeliverymanager_cw5n1h2txyewy\Internet Settings\Cache\Content |
| Operation: | write | Name: | CachePrefix |
Value: | |||
| (PID) Process: | (7880) BackgroundTransferHost.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.contentdeliverymanager_cw5n1h2txyewy\Internet Settings\Cache\Cookies |
| Operation: | write | Name: | CachePrefix |
Value: Cookie: | |||
| (PID) Process: | (7880) BackgroundTransferHost.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.contentdeliverymanager_cw5n1h2txyewy\Internet Settings\Cache\History |
| Operation: | write | Name: | CachePrefix |
Value: Visited: | |||
| (PID) Process: | (7212) BackgroundTransferHost.exe | Key: | HKEY_CLASSES_ROOT\Local Settings\Software\Microsoft\Windows\CurrentVersion\AppContainer\Storage\microsoft.windows.contentdeliverymanager_cw5n1h2txyewy\Internet Settings\Cache\Content |
| Operation: | write | Name: | CachePrefix |
Value: | |||
PID | Process | Filename | Type | |
|---|---|---|---|---|
| 4976 | Unicorn-31937.exe | C:\Users\admin\AppData\Local\Temp\Unicorn-2012.exe | executable | |
MD5:93A74C8EF001628EC7E1270D12555068 | SHA256:1A3F41BCB79E38A6F2A576A7DC70BE3375527C75F0E5290C1207B32D7631778D | |||
| 4208 | 1 (1101).exe | C:\Users\admin\AppData\Local\Temp\Unicorn-26582.exe | executable | |
MD5:76962BC7E271A5FB246DB55BD469B1D1 | SHA256:366EE8917961C99B279FEF5058E409E52441D168526BB432B6DAA910383E4D82 | |||
| 4208 | 1 (1101).exe | C:\Users\admin\AppData\Local\Temp\Unicorn-31937.exe | executable | |
MD5:62DA52855C2F09E7188B07AD3249B134 | SHA256:F6D88FECBE30E55BE5AC829262753D4326D9CAB5F3B75BC8CA0BFEE0639F11C5 | |||
| 4208 | 1 (1101).exe | C:\Users\admin\AppData\Local\Temp\Unicorn-64020.exe | executable | |
MD5:B1B8EDA210E09123E3FFA222DB42A9A7 | SHA256:29BAEAF39807880397F3DF4A1A23B2CF8B2BD038C4126CC808F978BD2D27D156 | |||
| 2772 | Unicorn-21015.exe | C:\Users\admin\AppData\Local\Temp\Unicorn-36133.exe | executable | |
MD5:965D496814521BCD1F52E558FC453E96 | SHA256:A20BF245AF218C16C93E1E408FB53BE6A135D612C6283A9E16FF5A6AEB014902 | |||
| 1040 | Unicorn-11820.exe | C:\Users\admin\AppData\Local\Temp\Unicorn-22101.exe | executable | |
MD5:91D2517BBF7E03BC62FB0A19B27E37B6 | SHA256:651F0DFD4BF5A2477A8A53F39F680F90FB01C79F876348C16EE782CFB9A88521 | |||
| 4976 | Unicorn-31937.exe | C:\Users\admin\AppData\Local\Temp\Unicorn-21015.exe | executable | |
MD5:359971ED4046F397204CE0B366C76266 | SHA256:4071A9B2E058526F87F693DEE9E7FBB315523119DDA5DC27C1F73C75DBDDD2E7 | |||
| 6080 | Unicorn-36133.exe | C:\Users\admin\AppData\Local\Temp\Unicorn-55925.exe | executable | |
MD5:432F6509F2618FA4892788EC44B4852C | SHA256:11F5D7245BE0B16D88004BE2CDBBCE91824B3B62DA7EEEF85FABD9855CE3D4FB | |||
| 3008 | Unicorn-24627.exe | C:\Users\admin\AppData\Local\Temp\Unicorn-62941.exe | executable | |
MD5:1A26F774BB204ADE60D204AE8F772166 | SHA256:3A1BD93D4EA5D6639B62206E022FB6BD9682D6586B69E4165D0E881A922E6E1C | |||
| 2772 | Unicorn-21015.exe | C:\Users\admin\AppData\Local\Temp\Unicorn-40143.exe | executable | |
MD5:6FCB49F7A42C6456ABC4F0C0DFA9E484 | SHA256:E5036B696D81E82B93E5E36251D6CE92E7E1D2C7497E7CE6B8C03415392117A4 | |||
PID | Process | Method | HTTP Code | IP | URL | CN | Type | Size | Reputation |
|---|---|---|---|---|---|---|---|---|---|
— | — | GET | 200 | 23.48.23.143:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
6544 | svchost.exe | GET | 200 | 2.23.77.188:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBSAUQYBMq2awn1Rh6Doh%2FsBYgFV7gQUA95QNVbRTLtm8KPiGxvDl7I90VUCEAJ0LqoXyo4hxxe7H%2Fz9DKA%3D | unknown | — | — | whitelisted |
— | — | GET | 200 | 23.48.23.143:80 | http://crl.microsoft.com/pki/crl/products/MicRooCerAut2011_2011_03_22.crl | unknown | — | — | whitelisted |
4220 | backgroundTaskHost.exe | GET | 200 | 184.30.131.245:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBQ50otx%2Fh0Ztl%2Bz8SiPI7wEWVxDlQQUTiJUIBiV5uNu5g%2F6%2BrkS7QYXjzkCEAUZZSZEml49Gjh0j13P68w%3D | unknown | — | — | whitelisted |
8312 | SIHClient.exe | GET | 200 | 2.23.246.101:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Product%20Root%20Certificate%20Authority%202018.crl | unknown | — | — | whitelisted |
8312 | SIHClient.exe | GET | 200 | 2.23.246.101:80 | http://www.microsoft.com/pkiops/crl/Microsoft%20ECC%20Update%20Secure%20Server%20CA%202.1.crl | unknown | — | — | whitelisted |
7608 | BackgroundTransferHost.exe | GET | 200 | 184.30.131.245:80 | http://ocsp.digicert.com/MFEwTzBNMEswSTAJBgUrDgMCGgUABBTrjrydRyt%2BApF3GSPypfHBxR5XtQQUs9tIpPmhxdiuNkHMEWNpYim8S8YCEAI5PUjXAkJafLQcAAsO18o%3D | unknown | — | — | whitelisted |
PID | Process | IP | Domain | ASN | CN | Reputation |
|---|---|---|---|---|---|---|
— | — | 4.231.128.59:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
2104 | svchost.exe | 4.231.128.59:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
— | — | 23.48.23.143:80 | crl.microsoft.com | Akamai International B.V. | DE | whitelisted |
4 | System | 192.168.100.255:138 | — | — | — | whitelisted |
5496 | MoUsoCoreWorker.exe | 4.231.128.59:443 | — | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
6544 | svchost.exe | 20.190.160.66:443 | login.live.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
6544 | svchost.exe | 2.23.77.188:80 | ocsp.digicert.com | AKAMAI-AS | DE | whitelisted |
3216 | svchost.exe | 40.113.110.67:443 | client.wns.windows.com | MICROSOFT-CORP-MSN-AS-BLOCK | NL | whitelisted |
2112 | svchost.exe | 40.127.240.158:443 | settings-win.data.microsoft.com | MICROSOFT-CORP-MSN-AS-BLOCK | IE | whitelisted |
4220 | backgroundTaskHost.exe | 20.74.47.205:443 | arc.msn.com | MICROSOFT-CORP-MSN-AS-BLOCK | FR | whitelisted |
Domain | IP | Reputation |
|---|---|---|
google.com |
| whitelisted |
crl.microsoft.com |
| whitelisted |
login.live.com |
| whitelisted |
ocsp.digicert.com |
| whitelisted |
client.wns.windows.com |
| whitelisted |
settings-win.data.microsoft.com |
| whitelisted |
arc.msn.com |
| whitelisted |
www.bing.com |
| whitelisted |
slscr.update.microsoft.com |
| whitelisted |
www.microsoft.com |
| whitelisted |